Free Essay

Intro Mainframe Exercise

In:

Submitted By jimmym
Words 2097
Pages 9
PROBLEM TWO SPRING 2014
INTRODUCTORY MAINFRAME EXERCISE
[BE VERY CAREFUL AS YOU WORK THRU THIS PROBLEM]

Logon to your account and open ISPF. The default setting in ISPF is for the command line to be at the bottom of the screen. Most systems programmers, though, prefer to have the command line at the top of the screen. Let's quickly change this so you'll look like an old pro. On the command line, type 0 and press Enter.

This takes you to the ISPF Settings menu. Go to the field beside Command line at bottom. Delete the "/" using the delete key (the backspace key will bring you back a space but will not delete characters). Press Enter. The command line jumps to the top of the screen.

:

To get back to the ISPF Primary Option Menu, press F3. F3 almost always takes you one screen back If you accidentally hit F3 too many times, you'll be taken all the way back to the TSO READY prompt - to get back to the ISPF Primary Option Menu from here, type ISPF and press Enter.

Log off of z/OS, by pressing F3 until you arrive at the TSO READY prompt. Type LOGOFF and press Enter:

IF you have done more extensive work during your session, you will see this Specify Disposition of Log Data Set screen when you attempt to F3 past the ISPF Primary Option Menu:

Whenever you encounter this screen, select option 2: "Delete data set without printing," and press Enter. You will then be taken to the TSO READY prompt, and the system informs you that a log that you don't need has been deleted. Type LOGOFF and press Enter to end your session. Should you not follow this logoff procedure, you will get a LOGON REJECTED error when you try to log back in:

If this happens to you, enter LOGON on this screen, then supply your user ID at the next prompt.

Once you get to this screen:

enter your password (but don't press Enter yet). Now Tab down until the cursor is beside -Reconnect, and put an S there. press Enter.

When you get the ‘LOGON RECONNECT SUCCESSFUL’ prompt:, press enter

Use ISPF facilities to locate data sets
If you are not already there, log back in to ISPF.

select option 3 (Utilities), and press Enter. On the next screen:

select option 4 (Dslist - short for data set list) and press Enter. Several data sets have already been created for your z/OS user ID. Let's go take a look at them. On the line Dsname Level, type your user ID: - press enter

You'll be presented with a list of all of the system-generated data sets that have been created for you: NOTE: A partitioned data set (PDS) is the mainframe equivalent of a folder. A partitioned data set (PDS) set contains members, which you are probably used to calling files. Let's have a look at a member that contains a copy of a program that you'll be running a little later. Tab down until your cursor is beside the ‘YOURUSERID.JCL’ line, then type a B (for browse): and press Enter.

You'll see a list of all of the members in the data set. You then browse members by entering a B on the field next to them. Try this on the member named COUNT (NOTE: if you were going to Edit a member, you'd enter it using E instead — but we're not doing that just yet):

The COUNT member contains a copy of some code that you'll be running shortly. You don't need to do anything here now, but you've just learned how to navigate into data sets and members Now press F3 until you're back at the ISPF Primary Option menu. Let's create a new member for you to check out.

Populate your data set with a member
Right now, most of your data sets (folders) contain data that you'll need later in the contest. But you also need to know how to create your own data. A member (file) can be anything you'd like it to be - flat text, executables, program output - just like the files on your home computer. Let's create a simple flat text member. F3 all the way back to the ISPF Primary Option Menu. Select option 2 (Edit). Let's name the new member after the person who's going to create it - you. Data sets are named with 1-8 character identifiers separated by periods, like this: USERID.COMPETE.PARTONE. When you're creating or editing new members, the

system automatically assumes that you want the first identifier (called the high level qualifier or HLQ) to be your user ID, unless you put single quotes around the entire data set name, which you will rarely do.. Tab down until your cursor is on the Name field. The data set we're going to populate is your USERID.COMPETE.PARTONE data set. Enter COMPETE.PARTONE as the data set name, then type your new member name in parentheses directly following the data set name. Your new member name must be the first eight letters [or less] of your last name. [NOTE: In our example, we use the name Hal for demonstration purposes].

Press Enter to continue. The system creates a new member named after you in the data set USERID.COMPETE.PARTONE and automatically opens it in an editor session.

You are now in the ISPF editor, looking at a blank member:

Tab your cursor to the first line of blank space (two lines under the first "-" in “Warning”)

Now type in three lines worth of whatever you'd like to say, using the tab key to move to the second line when you're done with the first, and so on. When you are finished entering the text, press Enter. (If at any point you mess up and would like a clean slate, enter CAN (short for cancel) on the command line. Your work will not be saved, and you will return to the previous screen. Press Enter on that screen, and you will have a fresh data set member again. You can also enter HELP at any time on the command line for more information about the ISPF editor.) Your screen should now have three lines of text:

The ISPF editor has made the member exactly three lines long and chopped off the excess blank lines. To save your work, type SAVE on the command line and press Enter.

Use the ISPF editor to manipulate text
Now let's practice some simple ISPF editor commands - the basic tools for editing and modifying members. To insert more blank lines, you will use the I command (for insert). Line commands go in the numbered field beside the lines of text, right on top of the existing line numbers. Let's insert two lines by putting the I2 command on the third line (go ahead and type right over the line numbers that are there):

Now press Enter. Two blank lines have been created:

Let's now copy your brilliant text fifty times over. To do this, put a CC on the first line you want to copy, and a CC on the last line you want to copy (the first and third lines of your text, respectively). To tell the editor to paste the copied section fifty times, go to the last line, and put an A50 in the last line's command field - the A

stands for paste After this line. before a given line.]

[NOTE: B50 would mean paste

Your screen should now have the two CC commands and the A50 command correctly placed:

Now press Enter. Your 3 lines have now repeated fifty times, off the bottom of the screen:

Notice you still have one blank line. Paging up and down using F7 and F8, respectively, will automatically delete ALL blank lines. [OR you can also delete a blank line by putting a D to the left of it and pressing enter, if you prefer. Delete the line now by either paging with F7/F8 or by using a D.

The line should now be gone:

[FYI: You can use DD the same way you used CC to delete multiple lines of text, but we will not do that at this point]

Now let's repeat the command.

first line of text 10 times. To do this, use the R (repeat)

Type R10 on the first line:

B Now press Enter, and your first line repeats ten times, with new line numbers to match: [Note: your line numbers are probably different than the example]

On the command line, enter the command BOTTOM. This takes you to the bottom of the member. Tab down and use the I command to insert one more line after the last line of the member. On the new line, enter BCIS 3620 - SYSTEM Z TOPICS Press Enter after you've added the new line:

On the blank line at the bottom, type your first and last name, followed by UNT, and press Enter:

You've now learned how to log onto a mainframe, to navigate the ISPF panels and to create and edit your own data set members. Let's save your work and move on. F3 out of your data set member - it will save automatically (if you ever want to quit without saving, remember that CAN for cancel will do the trick). Now let's run an executable program against the member you just created.

Run an executable against your new data set member
From the ISPF Primary Option screen, select option 6: Command.

This screen lets you enter TSO commands from ISPF. We need to execute a REXX program that is stored in the member ZOS.CONTEST.REXX(COUNT) against the member you created in the steps above using the first eight letters of your first name

To execute the REXX program, type on the command line:

EX

'ZOS.CONTEST.REXX(COUNT)'

'your_last name'

Remember, this example uses ‘HAL’

Press enter

The program will begin running, giving you the following message:

Remember, the *** means that the system is waiting for your input. Press Enter to continue executing the program.

Press Enter again to clear the system output. The program has now executed. Let's go see what it did! Instead of using F3 to back out to the ISPF Primary Option Menu, let's use a shortcut. On the command line, enter =3.4 :

This is the same as choosing option 3 from the Primary Option Menu, then choosing 4 on the next screen. You should recognize the screen you are now looking at as the Data Set List Utility screen:

Make sure your user ID is specified on the Dsname Level field, and press Enter. On the next screen, put an E for edit beside the data set :

YOURUSERID.COMPETE.PARTONE

Press Enter. There is a new member in your data set now, named after your user ID. Put an E beside it and press Enter to have a look.

When the REXX program ran, it counted each occurrence of the lines of your MEMBER and generated output back to your PDS:

YOURUSERID.COMPETE.PARTONE
IMPORTANT: Type SAVE on the command line and press Enter. Doing this will timestamp the member so IBM can tell when you completed this step. You must do this, so that your entry may be judged: [NOTE: BCIS 3620 PROJECTS WILL NOT BE SUBMITTED TO IBM]

After you save the member, you can verify that it was saved correctly by the white message in the upper right-hand corner, Member YOURUSERID saved:

F3 back one screen. The prompt informs you that the member was edited:

You've now completed all the steps for this exercise except for sending your work to GUYNES/ IBM. Let's do that now!

Transmit your data set member to WINDSOR/IBM
On the command line, type =6 , which is a shortcut for going back to the ISPF Primary Option Menu and selecting option 6: Command.

Now you need to submit all your hard work to WINDSOR/IBM, which, for this contest, is using the user UNTA002. To transmit your REXX output member to this ID, type the following command on the command line :
XMIT N1.UNTA002 DA(COMPETE.PARTONE(YOURUSERID)) The system will generate a message to let you know that the member has been submitted for processing: Press Enter to continue. At the next set of messages, verify that "0 WAS THE HIGHEST SEVERITY CODE": LEAVE EVERYTHING ON THE SYSZ, AS I WILL GRADE THE OUTPUT FROM WHAT IS IN THE ‘PARTONE FOLDER’ ON THE SYSZ

END OF PROBLEM TWO

Similar Documents

Free Essay

Rakamakafoo

...C O U R S E 5 6 5 Networking Technologies Volume 1 This document should only be used by a Novell-certified instructor. Ifyouthinkthisdocumentwaspirated,call1-800-PIRATESor1-801-861-7101. Networking Technologies Instructor Guide (Volume 1) Education INSTRUCTOR GUIDE 100-004273-001 Revision 1.0 Proprietary Statement Copyright © Novell, Inc. 1994, 1997, 1998. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the express prior consent of the publisher. This manual, and any portion thereof, may not be copied without the express written permission of Novell, Inc. Novell, Inc. 1555 North Technology Way Orem, Utah 84097-2399 Disclaimer Novell, Inc. makes no representations or warranties with respect to the contents or use of this manual, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to revise this publication and to make changes in its content at any time, without obligation to notify any person or entity of such revisions or changes. Further, Novell, Inc. makes no representations or warranties with respect to any NetWare software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to make changes to any and all parts of NetWare software...

Words: 27853 - Pages: 112

Premium Essay

Kkswmddkmdkemwekdemkedmkdemkmdkmdkew

...MODERN DATABASE MANAGEMENT / JfFFREY A. HOFFER . Warehousing Success 426 Data Warehouse Architectures 428 Generic Two-Level Architecture 428 Independent Data Mart Data Warehousing Environment 426 429 C O NTENTS Dependent Data Mart and Operational Data Store Architecture: A Three-Level Approach Logical Data Mart and Real-Time Data Warehouse Architecture 432 Three-Layer Data Architecture 435 Role of the Enterprise Data Model 435 Role of Metadata 436 Some Characteristics of Data Warehouse Data Status Versus Event Data 437 Transient Versus Periodic Data 438 An Example of Transient and Periodic Data 438 Transient Data 438 Periodic Data 439 Other Data VVarehouse Changes 440 The Reconciled Data Layer 441 Characteristics of Data after ETL 441 The ETL Process 442 Extract 442 Cleanse 444 Load and Index 446 Data Transformation 447 Data Transformation Functions 448 Record-Level Functions 448 Field-Level Functions 449 More Complex Transformations 451 Tools to Support Data Reconciliation 451 Data Quality Tools 451 Data Conversion Tools 452 Data Cleansing Tools 452 Selecting Tools 452 The Derived Data Layer 452 Characteristics of Derived Data 452 The Star Schema 453 Fact Tables and Dimension Tables 453 Example Star Schema 454 Surrogate Key 455 Grain of Fact Table 456 Duration of the Database 456 Size of the Fact Table 457 Modeling Date and Time 458 Variations of the Star Schema 458 Multiple Fact Tables 458 Factless Fact Tables...

Words: 80097 - Pages: 321

Premium Essay

B2B Advantages and Disadvantages

...This page intentionally left blank Te n t h E d i t i o n MODERN DATABASE MANAGEMENT Editorial Director: Sally Yagan Editor in Chief: Eric Svendsen Executive Editor: Bob Horan Editorial Project Manager: Kelly Loftus Editorial Assistant: Jason Calcano Director of Marketing: Patrice Lumumba Jones Marketing Manager: Anne Fahlgren Marketing Assistant: Melinda Jensen Senior Managing Editor: Judy Leale Project Manager: Becca Richter Senior Operations Supervisor: Arnold Vila Operations Specialist: Ilene Kahn Senior Art Director: Jayne Conte Cover Designer: Suzanne Behnke Cover Art: Fotolia © vuifah Manager, Visual Research: Karen Sanatar Permissions Project Manager: Shannon Barbe Media Project Manager, Editorial: Denise Vaughn Media Project Manager, Production: Lisa Rinaldi Supplements Editor: Kelly Loftus Full-Service Project Management: PreMediaGlobal Composition: PreMediaGlobal Printer/Binder: Edwards Brothers Cover Printer: Lehigh-Phoenix Color/Hagerstown Text Font: Palatino Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear on appropriate page within text. Microsoft® and Windows® are registered trademarks of the Microsoft Corporation in the U.S.A. and other countries. Screen shots and icons reprinted with permission from the Microsoft Corporation. This book is not sponsored or endorsed by or affiliated with the Microsoft Corporation. Copyright © 2011, 2009, 2007, 2005, 2002...

Words: 193467 - Pages: 774

Premium Essay

Damsel

...2014-2015 Undergraduate Academic Calendar and Course Catalogue Published June 2014 The information contained within this document was accurate at the time of publication indicated above and is subject to change. Please consult your faculty or the Registrar’s office if you require clarification regarding the contents of this document. Note: Program map information located in the faculty sections of this document are relevant to students beginning their studies in 2014-2015, students commencing their UOIT studies during a different academic year should consult their faculty to ensure they are following the correct program map. i Message from President Tim McTiernan I am delighted to welcome you to the University of Ontario Institute of Technology (UOIT), one of Canada’s most modern and dynamic university communities. We are a university that lives by three words: challenge, innovate and connect. You have chosen a university known for how it helps students meet the challenges of the future. We have created a leading-edge, technology-enriched learning environment. We have invested in state-of-the-art research and teaching facilities. We have developed industry-ready programs that align with the university’s visionary research portfolio. UOIT is known for its innovative approaches to learning. In many cases, our undergraduate and graduate students are working alongside their professors on research projects and gaining valuable hands-on learning, which we believe is integral...

Words: 195394 - Pages: 782

Free Essay

Core Concepts of Ais

...CORE CONCEPTS OF Accounting Information Systems Twelfth Edition Mark G. Simkin, Ph.D. Professor Department of Accounting and Information Systems University of Nevada Jacob M. Rose, Ph.D. Professor Department of Accounting and Finance University of New Hampshire Carolyn Strand Norman, Ph.D., CPA Professor Department of Accounting Virginia Commonwealth University JOHN WILEY & SONS, INC. VICE PRESIDENT & PUBLISHER SENIOR ACQUISITIONS EDITOR PROJECT EDITOR ASSOCIATE EDITOR SENIOR EDITORIAL ASSISTANT PRODUCTION MANAGER PRODUCTION EDITOR MARKETING MANAGER CREATIVE DIRECTOR SENIOR DESIGNER PRODUCTION MANAGEMENT SERVICES SENIOR ILLUSTRATION EDITOR PHOTO EDITOR MEDIA EDITOR COVER PHOTO George Hoffman Michael McDonald Brian Kamins Sarah Vernon Jacqueline Kepping Dorothy Sinclair Erin Bascom Karolina Zarychta Harry Nolan Wendy Lai Laserwords Maine Anna Melhorn Elle Wagner Greg Chaput Maciej Frolow/Brand X/Getty Images, Inc. This book was set in 10/12pt Garamond by Laserwords Private Limited, and printed and bound by RR Donnelley/Jefferson City. The cover was printed by RR Donnelley/Jefferson City. This book is printed on acid free paper. Founded in 1807, John Wiley & Sons, Inc. has been a valued source of knowledge and understanding for more than 200 years, helping people around the world meet their needs and fulfill their aspirations. Our company is built on a foundation of principles that include responsibility to the...

Words: 241803 - Pages: 968

Premium Essay

Database Management System

...DATABASE S YSTEMS DESIGN, IMPLEMENTATION, AND MANAGEMENT CARLOS CORONEL • STEVEN MORRIS • PETER ROB Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Database Systems: Design, Implementation, and Management, Ninth Edition Carlos Coronel, Steven Morris, and Peter Rob Vice President of Editorial, Business: Jack W. Calhoun Publisher: Joe Sabatino Senior Acquisitions Editor: Charles McCormick, Jr. Senior Product Manager: Kate Mason Development Editor: Deb Kaufmann Editorial Assistant: Nora Heink Senior Marketing Communications Manager: Libby Shipp Marketing Coordinator: Suellen Ruttkay Content Product Manager: Matthew Hutchinson Senior Art Director: Stacy Jenkins Shirley Cover Designer: Itzhack Shelomi Cover Image: iStock Images Media Editor: Chris Valentine Manufacturing Coordinator: Julio Esperas Copyeditor: Andrea Schein Proofreader: Foxxe Editorial Indexer: Elizabeth Cunningham Composition: GEX Publishing Services © 2011 Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted...

Words: 189848 - Pages: 760

Premium Essay

Intro to Linux

...A Practical Guide to Linux Commands, Editors, and Shell Programming SECOND EDITION ® Mark G. Sobell Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Capetown • Sydney • Tokyo • Singapore • Mexico City Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals. The author and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein. The publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales, which may include electronic versions and/or custom covers and content particular to your business, training goals, marketing focus, and branding interests. For more information, please contact: U.S. Corporate and Government Sales (800) 382-3419 corpsales@pearsontechgroup.com For sales outside the United States, please contact: International Sales international@pearson.com Visit us on the Web: informit.com/ph Library of Congress Cataloging-in-Publication...

Words: 228961 - Pages: 916

Premium Essay

Manager

...Learning with Cases INTRODUCTION The case study method of teaching used in management education is quite different from most of the methods of teaching used at the school and undergraduate course levels. Unlike traditional lecture-based teaching where student participation in the classroom is minimal, the case method is an active learning method, which requires participation and involvement from the student in the classroom. For students who have been exposed only to the traditional teaching methods, this calls for a major change in their approach to learning. This introduction is intended to provide students with some basic information about the case method, and guidelines about what they must do to gain the maximum benefit from the method. We begin by taking a brief look at what case studies are, and how they are used in the classroom. Then we discuss what the student needs to do to prepare for a class, and what she can expect during the case discussion. We also explain how student performance is evaluated in a case study based course. Finally, we describe the benefits a student of management can expect to gain through the use of the case method. WHAT IS A CASE STUDY? There is no universally accepted definition for a case study, and the case method means different things to different people. Consequently, all case studies are not structured similarly, and variations abound in terms of style, structure and approach. Case material ranges from small caselets (a few paragraphs...

Words: 239776 - Pages: 960

Premium Essay

Presentation Secret of Steve Jobs

...The Presentation Secrets of Steve Jobs How to Be Insanely Great in Front of Any Audience Carmine Gallo Columnist, Businessweek.com New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Copyright © 2010 by Carmine Gallo. All rights reserved. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher. ISBN: 978-0-07-163675-9 MHID: 0-07-163675-7 The material in this eBook also appears in the print version of this title: ISBN: 978-0-07-163608-7, MHID: 0-07-163608-0. All trademarks are trademarks of their respective owners. Rather than put a trademark symbol after every occurrence of a trademarked name, we use names in an editorial fashion only, and to the benefit of the trademark owner, with no intention of infringement of the trademark. Where such designations appear in this book, they have been printed with initial caps. McGraw-Hill eBooks are available at special quantity discounts to use as premiums and sales promotions, or for use in corporate training programs. To contact a representative please e-mail us at bulksales@mcgraw-hill.com. TERMS OF USE This is a copyrighted work and The McGraw-Hill Companies, Inc. (“McGraw-Hill”) and its licensors reserve all rights in and to the work. Use of this work...

Words: 72152 - Pages: 289

Premium Essay

Library Management

...Library and Information Center Management Recent Titles in Library and Information Science Text Series Library and Information Center Management, Sixth Edition Robert D. Stueart and Barbara B. Moran United States Government Information: Policies and Sources Peter Hernon, Harold C. Relyea, Robert E. Dugan, and Joan F. Cheverie Library Information Systems: From Library Automation to Distributed Information Access Solutions Thomas R. Kochtanek and Joseph R. Matthews The Complete Guide to Acquisitions Management Frances C. Wilkinson and Linda K. Lewis Organization of Information, Second Edition Arlene G. Taylor The School Library Media Manager, Third Edition Blanche Woolls Basic Research Methods for Librarians Ronald R. Powell and Lynn Silipigni Connoway Library of Congress Subject Headings: Principles and Application, Fourth Edition Lois Mai Chan Developing Library and Information Center Collections, Fifth Edition G. Edward Evans and Margaret Zarnosky Saponaro Metadata and Its Impact on Libraries Sheila S. Intner, Susan S. Lazinger, and Jean Weihs Organizing Audiovisual and Electronic Resources for Access: A Cataloging Guide, Second Edition Ingrid Hsieh-Yee Introduction to Cataloging and Classification, Tenth Edition Arlene G. Taylor LIbRaRy and InfoRMaTIon CenTeR ManageMenT Seventh Edition Robert D. Stueart and Barbara B. Moran Library and Information Science Text Series Library of Congress Cataloging-in-Publication Data Stueart, Robert D. Library and information...

Words: 204742 - Pages: 819

Premium Essay

Esrgt

...UNDERGRADUATE REGULATIONS & SYLLABUSES 2014 - 2015 THE FACULTY OF SOCIAL SCIENCES TABLE OF CONTENTS MESSAGE FROM THE DEAN ............................................................. 3 UNDERGRADUATE PROGRAMMES ................................................ 4 ACADEMIC CALENDAR 2014-2015 ................................................ 5 DEFINITIONS ...................................................................................... 13 GENERAL INFORMATION & REGULATIONS .............................. 14 General Regulations for Bachelor of Science Degrees 14 Special Regulations for Degrees in Hospitality and Tourism Management........................................................... 27 Franchise Agreements .......................................................... 27 EVENING UNIVERSITY -GENERAL INFORMATION & REGULATIONS ................................................................................... 28 General Regulations for Bachelor of Science Degrees 28 General Regulations for Diploma Programmes ............ 36 General Regulations for Certificate Programmes ......... 37 STUDENT PRIZES .............................................................................. 38 CODE OF CONDUCT ........................................................................ 39 UNIVERSITY REGULATIONS ON PLAGIARISM .......................... 40 THE ACADEMIC SUPPORT/ DISABILITIES LIAISON UNIT (ASDLU) ..............................................................................................

Words: 77086 - Pages: 309

Premium Essay

B2B Brand Management

...B2B Brand Management Philip Kotler ´ Waldemar Pfoertsch B2B Brand Management With the Cooperation of Ines Michi With 76 Figures and 7 Tables 12 Philip Kotler S. C. Johnson & Son Distinguished Professor of International Marketing Kellogg School of Business Northwestern University 2001 Sheridan Rd. Evanston, IL 60208, USA p-kotler@kellogg.northwestern.edu Waldemar Pfoertsch Professor International Business Pforzheim University Tiefenbronnerstrasse 65 75175 Pforzheim, Germany waldemar.pfoertsch@pforzheim-university.de ISBN-10 3-540-25360-2 Springer Berlin Heidelberg New York ISBN-13 978-3-540-25360-0 Springer Berlin Heidelberg New York Cataloging-in-Publication Data Library of Congress Control Number: 2006930595 This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilm or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer-Verlag. Violations are liable for prosecution under the German Copyright Law. Springer is a part of Springer Science+Business Media springeronline.com ° Springer Berlin ´ Heidelberg 2006 Printed in Germany The use of general descriptive names, registered...

Words: 104254 - Pages: 418

Premium Essay

Strategic Alliance

...F4 Corporate & Business Law (English & Global) F5 Performance Management F6 Taxation (UK) F7 Financial Reporting F8 Audit and Assurance F9 Financial Management P1 Governance, Risk & Ethics P2 Corporate Reporting P3 Business Analysis P4 Advanced Financial Management P5 Advanced Performance Management P6 Advanced Taxation (UK) P7 Advanced Audit & Assurance THE BEST THINGS IN LIFE ARE FREE For the latest free course notes, free lectures and forum support please visit opentuition.com/acca Paper P3 JUNE 2012 EXAMINATIONS For latest course notes, free audio & video lectures, support and forums please visit Paper P3 i JUNE 2012 EXAMINATIONS Paper P3 SYLLABUS 1 Aim To apply relevant knowledge, skills, and exercise professional judgement in assessing strategic position, determining strategic choice, and implementing strategic action through beneficial business process and structural change; coordinating knowledge systems and information technology and by effectively managing quality processes, projects, and people within financial and other resource constraints. 2 Objectives On successful...

Words: 43531 - Pages: 175

Premium Essay

Netwrk Security

...Fundamentals of Network Security John E. Canavan Artech House Boston • London http://www.artechhouse.com Library of Congress Cataloging-in-Publication Data Canavan, John E. Fundamentals of network security / John E. Canavan. p. cm.—(Artech House telecommunications library) Includes bibliographical references and index. ISBN 1-58053-176-8 (alk. paper) 1. Computer security. 2. Computer networks—Security measures. I. Title. II. Series. QA76.9.A25 C364 2000 005.8—dc21 00-050810 CIP British Library Cataloguing in Publication Data Canavan, John E. Fundamentals of network security.—(Artech House telecommunications library) 1. Computer networks—Security measures I. Title 005.8 1-58053-176-8 Cover design by Yekaterina Ratner Microsoft ® screen shots reprinted by permission from Microsoft Corporation. Netscape Communicator browser window © 1999 Netscape Communications Corporation. Used with permission. Netscape Communications has not authorized, sponsored, endorsed, or approved this publication and is not responsible for its content. Permission to reproduce screen shots from the PGP and Sniffer products has been provided by Network Associates, Inc. Network Associates, PGP, Pretty Good Privacy Sniffer, and Distributed Sniffer System are registered trademarks of Network Associates, Inc. and/or its affiliates in the U.S. and/or other countries. MIT screen shots used with permission. Qualcomm's Eudora screen shots used with permission. Copyright © 2001 ARTECH HOUSE, INC. 685 Canton Street...

Words: 95027 - Pages: 381

Premium Essay

Bbm Is Here

...Praise for Succeeding with Agile “Understanding the mechanics of an agile process is just not enough. Mike Cohn has compiled a superb and comprehensive collection of advice that will help individuals and teams with the intricate task of adopting and adapting agile processes to fit their specific challenges. This book will become the definitive handbook for agile teams.” —Colin Bird, Global Head of Agile, EMC Consulting “Mike Cohn’s experience working with so many different organizations in the adoption of agile methods shines through with practical approaches and valuable insights. If you really want agile methods to stick, this is the book to read.” —Jeff Honious,Vice President, Innovation, Reed Elsevier “Mike Cohn has done it again. Succeeding with Agile is based on his experience, and all of our experience, with agile to date. He covers from the earliest days of the project up to maturity and offers advice for the individual, the team, and the enterprise. No matter where you are in the agile cycle, this book has something for you!” —Ron Jeffries, www.XProgramming.com “If you want to start or take the next step in agile software development, this book is for you. It discusses issues, great solutions, and helpful guidelines when scaling up in agile projects. We used the guidelines from this book extensively when we introduced agile in a large, FDA-regulated department.” —Christ Vriens, Department Head of MiPlaza, part of Philips Research “If making the move to agile has always...

Words: 194469 - Pages: 778