...Executive Summary 1. Background The urban cooperative banking sector has witnessed phenomenal growth during the last one and a half decades. Certain infirmities have, however, manifested in the sector resulting in erosion of public confidence and causing concern to the regulators as also to the well functioning units in the sector. One of the factors significantly affecting the financial health of the Urban Cooperative Banks (UCBs) is their inability to attract equity / quasi equity investments. At present, UCBs have limited avenues for raising such funds and even their share capital can be withdrawn. Against this backdrop, an announcement was made in the Annual Policy Statement for the year 2006-07 to constitute a Working Group to examine the issue of share capital of UCBs and identify alternate instruments / avenues for augmenting the capital funds of UCBs. Accordingly, a Working Group was constituted under the Chairmanship of Shri N.S. Vishwanathan, Chief General Manager-in-Charge, Urban Banks Department, Reserve Bank of India. 2. Methodology The Group deliberated on the various issues relating to its terms of reference on the basis of presentations made by its members. It also met Chairmen/ CEOs of a few medium/ large UCBs. The areas deliberated included international practices and structures for issue of bonds by cooperatives, adaptability of the provisions of Indian Companies Act, 1956 for issue of preference shares, State Government perspective on the issues...
Words: 11942 - Pages: 48
...Sustainability of Microfinance Self Help Groups in India: Would Federating Help? Ajai Nair, Graduate Student Woodrow Wilson School of Public and International Affairs Princeton University Abstract Self Help Group (SHG) banking is the primary mode of microfinance in India today, reaching over six million families. In spite of its considerable outreach, successful savings mobilization and high repayment rates, as with most other microfinance models, the financial viability of SHG banking has not been clear. SHG federations attempt to provide financial viability and sustainability to SHG banking. This study explores the merits of federating and finds that SHG federations create economies of scale, reduce promotional and transaction costs, enable provision of value added services and increase empowerment of the poor. Acknowledgements This study was done for the South Asia Region Finance and Private Sector Development Unit of the World Bank. The support of Sophie Sirtaine at the World Bank, who helped design the study and took time to read through the different drafts, is gratefully acknowledged. I thank all the organizations visited and individuals interviewed for their cooperation, and participants of the various fora at which the initial drafts were presented for their valuable comments. I also thank Marilou, Director, South Asia Region Finance and Private Sector Development Unit and other members of the unit for...
Words: 19349 - Pages: 78
...Research Assignment, Part One XXXXXX XXXXXXX IT221 - E-2 Fall 2011 Instructor: XXXXXXX 12-17-2011 Question 1 - Why does Windows Server 2008 come in different versions? What is the significance of each version? Most editions of Windows Server 2008 are available in x86-64 and IA-32 versions. Windows Server 2008 for Itanium-based Systems supports IA-64 processors. Microsoft has optimized the IA-64 version for high-workload scenarios like database servers and Line of Business (LOB) applications. As such it is not optimized for use as a file server or media server. Microsoft has announced that Windows Server 2008 is the last 32-bit Windows server operating system. Windows Server 2008 is available in the editions listed below, similar to Windows Server 2003. • Windows Server 2008 Standard (IA-32 and x86-64) Windows Server 2008 Standard is one of Microsoft's entry level server offerings (alongside Windows Web Server 2008) and is one of the least expensive of the various editions available. Both 32-bit and 64-bit versions are available, and in terms of hardware Standard Edition supports up to 4GB of RAM and 4 processors. Windows Server 2008 is primarily targeted and small and mid-sized businesses (SMBs) and is ideal for providing domain, web, DNS, remote access, print, file and application services. Support for clustering, however, is notably absent from this edition. An upgrade...
Words: 3579 - Pages: 15
...Data warehousing: construction of a database with only data analysis purpose • Purpose Business Intelligence (BI) Machine learning: find patterns automatically in databases 2 •1 Literature • Multidimensional Databases and Data Warehousing, Christian S. Jensen, Torben Bach Pedersen, Christian Thomsen, Morgan & Claypool Publishers, 2010 • Data Warehouse Design: Modern Principles and Methodologies, Golfarelli and Rizzi, McGraw-Hill, 2009 • Advanced Data Warehouse Design: From Conventional to Spatial and Temporal Applications, Elzbieta Malinowski, Esteban Zimányi, Springer, 2008 • The Data Warehouse Lifecycle Toolkit, Kimball et al., Wiley 1998 • The Data Warehouse Toolkit, 2nd Ed., Kimball and Ross, Wiley, 2002 3 Overview • • • • Why Business Intelligence? Data analysis problems Data Warehouse (DW) introduction DW topics Multidimensional modeling ETL Performance optimization 4 •2 What is Business Intelligence (BI)? • From Encyclopedia of Database Systems: “[BI] refers to a set of tools and techniques that enable a company to transform its business data into timely and accurate information for the decisional process, to be made available to the right persons in the most suitable form.” 5 What is Business Intelligence (BI)? • BI is different from Artificial Intelligence (AI) AI systems make decisions for...
Words: 8493 - Pages: 34
...Rafaella Rusmigo Erasmus Student MUP 12/7/2015 Kenya Abstract Throughout time, we have seen countries evolve from many different circumstances, most of which circumstances were from colonial exploitation. European colonialism dates back to the age of exploration and the discoveries that were found overseas from the mainland of Europe. The colonists were brutal to the natives called savages, ruthless to the innocent, and exploiters of the native people and their native lands. In Africa, the Europeans had penetrated it in the 1600-1700’s. In the 1800’s the entire continent did not have a single free independent nation state, all of Africa belonged to the Europeans. Kenya was significantly impact by the imperialists. The historical evidence of Kenya’s economy, culture, and social standards comes from the British rule from 1888-1963. The main purpose of this document is to understand the fundamentals of British colonialism and the British conquest in Kenya. Through examining important points in the history of Kenya, we will found out what are the legacies of the colonial period for Kenya and if they are still relevant to the country today. Republic of Kenya Kenya is a country in East Africa with its territory lying on the equator and overlies the East African Rift covering a diverse and expansive terrain that extends roughly from Lake Victoria to Lake Turkana and further south-east to the Indian Ocean. It is bordered by Tanzania to the south, Uganda to the west...
Words: 4755 - Pages: 20
...Selected Answer: | b. Mandatory Access Control | | | In the UAC dialog boxes, the color ____ indicates the lowest risk. | | Selected Answer: | c. gray | | The ____ model is the least restrictive. | Selected Answer: | d. DAC | | | ____ is considered a more “real world” access control than the other models because the access is based on a user’s job function within an organization. | | Selected Answer: | d. Role Based Access Control | | | ____ is often used for managing user access to one or more systems. | | Selected Answer: | c. Rule Based Access Control | | | ____ requires that if the fraudulent application of a process could potentially result in a breach of security, then the process should be divided between two or more individuals. | | Selected Answer: | a. Separation of duties | | | A(n) ____ is a set of permissions that are attached to an object. | | Selected Answer: | b. ACL | | | ____ accounts are user accounts that remain active after an employee has left an organization. | | Selected Answer: | b. Orphaned | | | ____ indicates when an account is no longer active. | | Selected Answer: | c. Account expiration | | A user accessing a computer system must present credentials or ____ when logging on to the system. | Selected Answer: | c. identification | | ____ is suitable for what are called “high-volume service control applications” such...
Words: 6826 - Pages: 28
...to the location. I had changed it to Michael Kors in Macy’s Plaza, but there was a misunderstanding to what I was requesting to the teacher. Little did I know that I would learn so much from Macy’s? Everything happens for a reason and this was a sign from God. I’ve learned how Macy’s was founded to their philosophies. I was so shocked about the information I was reading. Even though Macy’s wasn’t my original choice, it taught me so much and I’m very grateful that it ended up like this! |Background | Federated Department Stores, Inc (renamed Macy’s Inc.) was born through the combination of Abraham & Straus of Brooklyn, Filene’s of Boston, F&R Lazarus & Co. of Columbus, OH, and Bloomingdale’s of New York. As Federated emerged in the years of the Great Depression and World War II, it became apparent that the corporation was equipped with both resilience and flexibility. It adapted to the times by implementing innovative retail firsts, such as “pay when you can” credit policies and arranging merchandise by size rather than color, brand or price. (macysinc.com, Macy’s, Inc History) Macy’s was established in 1858, and is The Great American Department Store, but founded in 1929. The main headquarters is located in Cincinnati, OH and is considered a private ownership. It’s an iconic retailing brand with about 810 stores from...
Words: 7543 - Pages: 31
...Exchange 37 (2008) 124-155 www.brill.nl/exch Ethiopian Traditional Values versus the Social Teaching of the Church Solomon Dejene Research Student, Nijmegen Institute for Mission Studies, Nijmegen, The Netherlands Email: S.Dejene@nim.ru.nl Abstract Even if the Roman Catholic Church does not have a very long history in Ethiopia and constitutes a small minority of the society, her social significance is great in part due to the structural development programs she runs through out the country. The main aim of this paper is to identify how much the Church1 has made use of traditional systems and values in reflecting and communicating pastorally particularly in regard the Social of the Church (henceforth CST). By analyzing four selected pastoral letters, this article tries to spell out the strengths and shortcomings of the Church in employing traditional systems and values in giving form to the CST. Keywords Catholic social teaching, human dignity, common good, solidarity, reconciliation and peace, contextualization, Ethiopian traditional values Introduction Most of the current national boundaries of Africa were drawn during the colonial period and do not reflect the socio-cultural, ethno-linguistic and religious compositions of the colonies. Although Ethiopia has successfully overcome European colonial power and survived as an independent state with the exception of a five year Italian occupation (1936-41), its contemporary national boarder is a result of the scramble for Africa....
Words: 14497 - Pages: 58
...Applied SOA Service-Oriented Architecture and Design Strategies Mike Rosen Boris Lublinsky Kevin T. Smith Marc J. Balcer Wiley Publishing, Inc. Applied SOA Applied SOA Service-Oriented Architecture and Design Strategies Mike Rosen Boris Lublinsky Kevin T. Smith Marc J. Balcer Wiley Publishing, Inc. Applied SOA: Service-Oriented Architecture and Design Strategies Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright 2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: 978-0-470-22365-9 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: The publisher and...
Words: 218699 - Pages: 875
...A Cup of Coffee with the Linovamvaki Reviving ethnic and cultural integration on the island of Cyprus Michael Apicelli IRP-601 Dayton 18 December 2006 The island-nation of Cyprus, although small, serves as the location of the most long-standing UN Peace-keeping mission in the world. The UN-established “green line” divides Cyprus into two parts, the lower 2/3 of the island known as the Cypriot Republic, is almost exclusively populated by denizens whose ethnic identification is classified as Greek. The northern third of the island, occupied by self-avowed Turkish Cypriots, recognizes itself as the Turkish Republic of Northern Cyprus. The only other country in the world that recognizes the TRNC is Turkey, while the Republic of Cyprus is recognized internationally. While the international community recognizes the Republic of Cyprus as having jurisdiction over the island as a whole, in fact the Republic’s authority stops at the green line, a fact which has led at a number of confusing international issues, including Cyprus’ and Turkey’s EU accession bids. The Beginnings of Cypriot History Cyprus is an island state that has only recently achieved sovereignty. Inhabited for well over two thousand years, it has a four hundred year colonial history of shared culture, language, and mores between the Turkish and Greek Cypriots that populate its scenic mountains, plains, and beaches. These shared mores and sense of culture will prove...
Words: 11014 - Pages: 45
...[pic] Assignment on Intellectual Property Comparison Between Developed And Developing Country. Submitted to Fahmida Hasan Department of Business Administration Submitted by |Name |ID | |Rajib Kundu |2010-2-10-329 | |Rakib Hasan Rabbi |2010-2-10-300 | |Razuan Ahmed |2010-2-10-071 | |Almahmud |2010-2-10-048 | |Showrav hasin |2010-2-10-074 | |S M Mostafizur Rahman |2010-1-10-092 | Section : 1 Course No : BUS 361 Course Name: Transmittal Letter April 4,2013 Fahmida hasan Department of Business Administration, East West University Subject: Submission of an assignment on comparison...
Words: 6900 - Pages: 28
...Introduction To Cloud Computing (IT175-1601A) Colorado Technical University Individual Project 02/08/2016 Table Of Contents Cloud Providers and Cost Savings Analysis………………………………………..……3 Cost Savings of the Cloud…………………………………………………………..…...5 Cloud Providers……………………………………………………………………..…...8 Software as a service Service (SaaS)…………………………………………………....10 Identity as a Service (IDaaS) ………………………………………………………...….13 Service-Oriented Architecture (SOA)………………………………………………...…17 Platform as a Service (PaaS)………………………………………………………….…18 PaaS Provider (Engine Yard)…………………………………………………………...19 Pass Provider (Red Hat Open Shift)……………………………………………………20 PaaS Provider (Caspio)……………………………………….…………………………21 Infrastructure as a Service (IaaS)……………………………………………………….24 IaaS Provider (Google Compute Engine)………………………………………………25 IaaS Provider (Rackspace Open Cloud)………………………………………………..27 IaaS Provider (HP Enterprise Converged Infrastructure)………………………………30 Security threats in cloud-based solutions with risk management strategies……………33 Risk Management in Cloud Computing………………………………………………..35 IT Governance for cloud-based solutions………………………………………………38 Identity Management In The Cloud……………………………………………………39 References………………………………………………………………………….…..45 Cloud Providers and Cost Savings Analysis Cloud computing is a type of computing that relies on sharing computing resources rather than having local servers or personaldevices to handle applications. Cloud computing is comparable togrid...
Words: 12017 - Pages: 49
...Fundamentals of Database Systems Preface....................................................................................................................................................12 Contents of This Edition.....................................................................................................................13 Guidelines for Using This Book.........................................................................................................14 Acknowledgments ..............................................................................................................................15 Contents of This Edition.........................................................................................................................17 Guidelines for Using This Book.............................................................................................................19 Acknowledgments ..................................................................................................................................21 About the Authors ..................................................................................................................................22 Part 1: Basic Concepts............................................................................................................................23 Chapter 1: Databases and Database Users..........................................................................................23 ...
Words: 229471 - Pages: 918
...g Easier! Making Everythin ™ mputing Cloud Co Learn to: • Recognize the benefits and risks of cloud services • Understand the business impact and the economics of the cloud • Govern and manage your cloud environment • Develop your cloud services strategy Judith Hurwitz Robin Bloor Marcia Kaufman Fern Halper Get More and Do More at Dummies.com ® Start with FREE Cheat Sheets Cheat Sheets include • Checklists • Charts • Common Instructions • And Other Good Stuff! To access the Cheat Sheet created specifically for this book, go to www.dummies.com/cheatsheet/cloudcomputing Get Smart at Dummies.com Dummies.com makes your life easier with 1,000s of answers on everything from removing wallpaper to using the latest version of Windows. Check out our • Videos • Illustrated Articles • Step-by-Step Instructions Plus, each month you can win valuable prizes by entering our Dummies.com sweepstakes. * Want a weekly dose of Dummies? Sign up for Newsletters on • Digital Photography • Microsoft Windows & Office • Personal Finance & Investing • Health & Wellness • Computing, iPods & Cell Phones • eBay • Internet • Food, Home & Garden Find out “HOW” at Dummies.com *Sweepstakes not currently available in all countries; visit Dummies.com for official rules. Cloud Computing FOR DUMmIES ‰ Cloud Computing FOR DUMmIES ‰ by Judith Hurwitz, Robin Bloor, Marcia Kaufman, and Dr. Fern Halper Cloud Computing For Dummies® Published by Wiley Publishing...
Words: 96278 - Pages: 386
...[pic] Assignment on Intellectual Property Comparison Between Developed And Developing Countries. Submitted to Fahmida Hasan Senior Lecturer Department of Business Administration Submitted by |Name |ID | |Rajib Kundu |2010-2-10-329 | |Rakib Hasan Rabbi |2010-2-10-300 | |Razuan Ahmed |2010-2-10-071 | |Almahmud |2010-2-10-048 | |Showrav hasin |2010-2-10-074 | |S M Mostafizur Rahman |2010-1-10-092 | Section : 1 Course No : BUS 361 Course Name: Legal Environment of Business Transmittal Letter April 4,2013 Fahmida Hasan Senior Lecturer Department of Business Administration, East West University ...
Words: 8135 - Pages: 33