Free Essay

Snapshot

In:

Submitted By Sikandar194
Words 3467
Pages 14
Simulated Assembler-Objects and a Glass Bottom Computer
(a polytechnic approach)

William G. Verbrugge

wgverbrugge@csupomona.edu
California State Polytechnic University, Pomona
3801 West Temple Avenue
Pomona, CA 91768

Abstract

Integrated Development Environments are excellent production tools for intermediate and advanced programming students and even beginners after they have learned the core concepts (stored data, stored programs, computer instructions, and the anatomy of the computer). Most authors of introduction to programming books recognize this by their inclusion of one to twenty pages on this topic. This paper presents how using a simulated assembler (a tool for learning) with a simple assembly language can introduce the beginning student to the core concepts without having to be concerned with all the exceptions and rigor of a full assembler language. The Simulated Assembler with a full viewable Computer Machine (Glass Bottom Computer) and the easy procedures for using it in a first programming course are illustrated. Using the assembler tool described here should provide an increase in learning via a polytechnic (learn by doing) approach. A comparative analysis of using the assembler in an introduction to object programming course is provided.

Keywords: assembler, simple machine, software tools, language, programming, object oriented, machine language

1. INTRODUCTION

The growth in hardware technology has allowed the theories of modern programming languages to become a reality. In the beginning, developers of computer languages were hindered by the lack of processing speed and memory to implement their vision. Variable names and data were restricted in size and thus not very descriptive of their meaning. Most languages then followed a close representation of the function of the hardware in order to conserve on memory and be resourceful. Still, researchers continued to work on natural languages. One of the good outcomes from learning our industry’s first languages is that the concept of how the computer worked was inherited in the language. Thus the logic of the application and how the computer actually ran the program was a natural outcome of learning the language.

Most computer languages taught today are object oriented programming languages. In these languages one builds objects (black boxes that have attributes and behavior and identity (a name)) that can be used by other objects. To aid in covering all the essential topics, production tools are used so more time can be spent on logic and object concepts. Many instructors use Integrated Development Environments (IDE) to aid in writing the source code. Results of student tests in introduction to object oriented programming languages using an IDE, has indicated that many students had a weak understanding of the concepts of stored programs, memory, the difference between instructions and data, the compilation process, and simple execution logic. This poor outcome was in spite of the Instructors clearly covering these topics and providing diagrams of how a created object would be referenced in memory. What seemed to be missing were the hands on writing and viewing of a logical process in the core of a computer.

This paper presents how using a simulated assembler (a tool for learning) with a simple assembly language can introduce the beginning student to the basic concepts of how programming languages will run on the hardware. Although the Simulated Machine (SM) can solve complicated procedures (sorting, simulations, etc.), it is best used in an introduction programming course to show simple comparisons, arithmetic operations, transfers, etc. The author has found that thirty to forty minutes of class time and a simple assignment provides an excellent reference when introducing an object oriented programming language. Most authors of introduction to programming books recognize this by their inclusion of one to twenty pages on this topic (Gittleman, 2002;Koffman, 2002). The Simulated Assembler is available at www.csupomona.edu/~wgverbrugge and the easy procedures for using it in a first programming course are provided.

2. LEARN THE ANATOMY

The Simulated Machine (SM) illustrates the anatomy of the computer. Its view allows the student to see all phases of the programming cycle (writing the source, compiling the source to object code, and running the object code) in one view. And with the ability to execute one instruction at a time, the student can see the program move data (instructions, variable, or constants) from memory to registrars to memory. A common practice in introduction programming courses is for the instructor to display a small set of numbers and ask the class to tell them the average (answers come quickly). Then the class is asked to explain how they obtained the answer step by step (answers come slowly). This leads to a flow chart or pseudo code of the procedure and then how one needs to tell the computer box to perform the task (Malik, 2005). One can then describe the anatomy of the computer (Central Processing Unit (CPU) - machine instructions and registers, memory, input/output, etc.). Next with a simple assembler language, described below, the pseudo code can be translated into a computer language that represents the instructions of the CPU. Subsequently the same program could be illustrated in the language being taught. Figure 1 (in the appendix) shows a more general-purpose program that uses a loop and test to accept a sequence of numbers. Figure 1a illustrates the flow chart that set the logic for writing the assembler source code. The Java equivalent is also shown.

A sequence of machine instructions is a program. Each instruction command is represented by a binary pattern (0001010000110100). If the first 6 bits (= 5 in decimal) of this pattern represents the operation code (opCode) and the remaining 10 bits (the operand) represents the memory location (= 100 in decimal), then in the SM this instruction would mean - clear the accumulator registrar and add the value at location 100 in memory. The SM illustrates the binary using decimal so that the instructions and memory locations are easy to read. Many instructors teach binary to decimal conversion. The SM provides an answer to the question “Why are we doing this?” Programming in the machines language would be a real test of ones personal memory. Thus a programming language called an assembler was created that used a mnemonic code for the instruction operation and used numbers or variable names that represented the operand. In Figure 1 the first assembler instruction ( Start: CLA 0 ) is shown in the source code section. The compiler (translator), which is called when one presses the Compile Code button, translates this instruction to its machine instruction equivalent. “Start:” would have the value 0, since the first instruction is in location zero of memory. The operation code “CLA” is translated to a binary 5. The “0” gets stored in location 100 of memory (the first location that data is stored in this SM). The object code section of Figure 1 shows the result “00 05100” of the translation to machine code. This is the instruction CLA (5) - clear the accumulator and add to it the value at memory location 100.

Thus a source program is entered into the Source Code panel. It is then submitted by pressing the Compile Code button. Each line is read sequentially, interpreted, and stored into the Simulated Machine’s memory, which is fully viewable via the Glass Bottom Computer concept. The instructions are stored in addresses 000-099. All variables and constants are stored in addresses 100-999. This is shown in the “Object Code from Source” panel. After writing a program it is easy to execute the code using the Simple Machine - "Run Object Code" or “Run One Inst” button. The third panel shows the execution results and the values in the registrars as the program is executed in the machine.

The Simulated Machine is an Applet and thus can be run in most browsers. This makes it very deployable. However, because of security two very useful request buttons “Save_Source”, which allows one to save their source code to disk; and “Load_Source”, which allows one to load a saved source code back into the Simulated Machine are not allowed when running in the browser. “Why this is the case?” is a topic for another paper. Programs that require over fifteen lines of code probably need this feature. To accommodate the use of these two features, the web site that runs the Simulated Machine allows for the download of an executable Windows jar version. The event buttons shown in figure 1 perform the following actions: • The "Insert Row" button allows one to insert an instruction - click on the row to insert and then click the "Insert Row" button. A blank row is inserted above the selected row. Once focus is set in a table cell by clicking in it, the left or right arrow key will move the cursor. • The "Clear Code" button will clear the source code panel. • The "Compile Code" button will translate the source code into object code and display it in the Object Code from Source panel. The instructions are shown starting in memory location zero (0) and are displayed in decimal. The last three digits are the memory location of the operand and the beginning digits represent the operation code. Operands are assigned to memory locations starting at memory location one hundred (100) and their values are displayed. • The "Save_Source" button will copy the source code as a comma delimitated file to the clipboard. To save the source code so it may be reloaded at another time, open Notepad and Save (Ctrl-V) it. Then save the Notepad file with proper name to a computer disk directory. • The "Load_Source" button presents a dialog box to paste the source copied from the backup Notepad file and puts it in the Source table. • The "Print" button will print the output of the execution and the source code. • The "Run Object Code" button will run the object code starting at memory location zero. When the STP (01) operation code is executed, clicking OK will print the results in the Execution Results panel. • The "Run One Inst" button will run the object code one instruction at a time - thus letting you see the contents of the registers and memory locations change as the program runs.

3. The Hardware

The simulated machine, like most computers, consists of three major elements: core memory, instruction control unit, and registers (see figure 2). All these elements store data in a five digit numerical format. In a real computer these decimal digits are binary numbers (i.e. memory location 030 is 11110 in binary. We could make the machine all binary, but using decimal digits does not lose any concepts and it makes it much easier to visualize the internal hardware.

Figure 2

|[pic] |

The SM has: • 1000 Memory Locations (Addressed 0 - 999) o 000 - 099 Reserved for Instructions o 100 - 999 Reserved for Variables and Constants • AC -- Accumulator Register • MQ -- Multiplier-Quotient Register o Both registers can hold any positive or negative value greater than or equal to –2,147,483,648 and less than or equal to 2,147,483,647. • Two controlling Registers o Instruction Register -- Holds the binary instruction - viewed in Decimal o Instruction Location Register -- Holds the binary value of the memory location where the instruction was located - viewed in Decimal

The simple machine will execute instruction sequentially beginning with address 000, unless altered by a transfer statement.

4. THE ASSEMBLER LANGUAGE

The assembler language presents mnemonic codes that represent the machine hard wired bit code instructions. An instruction consists of an operation code and an operand. The operation code determines the action the computer should perform and the operand is the location in memory that the action is performed on. An assembler program consists of a list of instructions. Assembler instructions have the following format:

LABEL: OperationCode Operand #Comment

The assembler is not case sensitive. Thus cla, CLA, and Cla are the same.
Some different forms of an instruction are the following:

start: CLA 1 # 1 is a constant # start: is a label STO one #one is a variable # and holds 1 TRA Next: ADD one # this instruction #will be skipped Next: STP

Notice that labels and comments are not essential for an instruction. However, all operation codes except “STP” (Stop the program) require an operand.Each instruction may be comprised of the following four major elements. 1. Labels o Labels are used as a reference to a specific memory location. o Labels follow the following format. Name: ▪ "Name:" is an identifier, which refers to the current line. It can be any word followed by a colon, which is left to the programmer’s discretion. ▪ The colon, (:), is used to signify that it is a label. It follows directly after the name. 2. Operation Code o An operation code is a special three-character command, which informs the computer to perform a specific function, such as add or subtract. o At run time, the operation code has been translated into a two-digit code, which the Machine simulator can understand and manipulate. o See Table 1 for a list of the operation codes and their function. 3. Operands o Operands can consist of labels, variables, and constants. o Using a label as an operand would allow one to modify an instruction. o Variables refer to memory locations, which store binary data. o Variables are formatted as follows. variable or VARIABLE; number1 or NUMBER1 ▪ Any sequence of characters - the compiler is not case sensitive. o Constants are positive or negative numbers, which can range from negative 2,147,483,648 to positive 2,147,483,647. These do not have any distinctive characters attached. ▪ To use a constant, simply use the positive or negative number after an operation code. o At run time, the simulator will translate the operand into its numerical code and store it in the proper memory address. For example, if you had only one variable, the simulator would store that variable at address 100. Anytime it is referenced in an instruction, the variable is replaced with its address. 4. Comments o Comments are non-essential parts of a program. They are there for the sole purpose of readability of a program. The format of a comment is as follows: # this is a comment ▪ Notice that a comment may begin with a pound sign (#). ▪ The simulator will ignore anything following the pound sign. o At run time, the simulator will strip all comments from the instructions.

5. THE MACHINE INSTRUCTIONS

The machine has fourteen instructions as listed in Table 1. When reading the table, note that (x) should be read as the contents of x (e.g. (MQ) means the contents of the Multiplier-Quotient Register). The "->" symbol should be read as “is placed into". The letters “bbb” refer to the memory address of the operand. For example, the instruction “ADD one” would be interpreted as operation code (OpCode) = ADD and operand = one (a variable which is a reference to a memory location). The effect ((bbb) + (AC) -> (AC)) is read as "the contents of the memory location of the variable (one) plus the contents of AC are placed into the contents of AC." Also, all operations except STP need a memory location (represented by bbb), which can be a constant, label, or a variable. The letter sequence “iff” is read as “if and only if“.

|[pic] |

Table 1 – Instructions (Operation Codes and their Effect)

6. Preliminary Benefit Results
There is not enough data to perform a t-test assessing whether the means of the two groups (classes using the assembler and classes not using the assembler) are statistically different from each other (Newcombe, 1998). The t-test gives the probability that the difference between the two means is caused by chance. It is customary to say that if this probability is less than 0.05, that the difference is 'significant' (the difference is not caused by chance). The current data is from the author’s experience and is illustrated in Table 2. Other professors at CSU-Pomona are now using the Assembler, thus the data analysis will become more stable. Another outcome experienced by the author was that the average percent of gain of material offered using the Simulated Assembler was 9 percent.

|The results of an unpaired t-test |
|t = -1.96 ; Standard Deviation = 3.24 ; degrees of freedom = 7 |
|The probability of this result, assuming the null hypothesis, is 0.090 |
|Data: |
|Group A: Final class average without using the Simulated Machine. Number of items= 6 |
|76.0, 76.0, 77.0, 78.0, 78.0, 82.0 - Mean = 77.8 |
|95% confidence interval for Mean: 74.71 thru 80.96 |
|Standard Deviation = 2.23 |
|Hi = 82.0 Low = 76.0 |
|Median = 77.5 |
|Average Absolute Deviation from Median = 1.50 |
| |
|Group B: Final class average using the Simulated Machine. Number of items= 3 |
|79.0, 80.0, 88.0 - Mean = 82.3 |
|95% confidence interval for Mean: 77.91 thru 86.76 |
|Standard Deviation = 4.93 |
|Hi = 88.0 Low = 79.0 |
|Median = 80.0 |
|Average Absolute Deviation from Median = 3.00 |

Table 2

7. CONCLUSION
Experience has established that an understanding of how a stored program is executed by a computer is one of the main learning concepts to understanding how to write a program in a procedural oriented language. As one moves to object oriented languages, where the running program creates objects and stores them in memory, the understanding of the concept becomes even more important (McKeachie, 2002; Bransford,2000). The Simulated Assembler presented here should provide the student with the fundamental concepts of developing and running a computer program. Thus, the learning progression of defining global and local variables, operations, and objects will have a foundation to build on. The Simulated Assembler can be used as a root to many courses – providing a time saving reference as new topics are presented. The author has found that using the Simulated Assembler in an introduction to programming course using an object oriented language provided at least a full class period extra for introducing new topics. Open access to the Simulated Assembler via an applet or windows version (which can be down loaded) is on the University’s web server located at www.csupomona.edu/~wgverbrugge. Some courses of study require learning a full assembler language (IBM, 2001) as the root to their discipline. For those that do not have this requirement, the SM can be illustrated in one lecture. If a course requires more profound study, the SM can be used to illustrate topics like setting up arrays, modifying instructions, etc. The SM is easy to operate and operating instructions are provided on the web, since these will change as enhancements are added. The current version (Version 2) provides more readability with changing memory views, save/load source code to provide more productivity in larger programs, and a print capability for hard copy results.

8. REFERENCES

Bransford, J.D., A.L. Brown, and R.R. Cocking, eds. “How People Learn: Brain, Mind, Experience, and School Committee on Developments in the Science of Learning. Commission on Behavioral and Social Sciences and Education of the National Research Council”, National Academy Press, 2000, ISBN: 0-309-07036-8.

Gittleman, Art (2002). “Computing with JAVA Alternate second Edition”. Scott/Jones. pp 2-5.

IBM - International Business Machines Corporation (2001). “AIX 5L for POWER-based Systems Assembler Language Reference 2nd Edition”.

Kirk, J.J. “An Unofficial Guide to Web-based Instructional Gaming and Simulation Resources,” ERIC Document Reproduction Service ED472675, 2001.

Koffman, Elliot and Wolz, Ursala (2002). “Problem Solving with Java - 2nd Edition”. Addison Wesley. pp 1-16.

Kohn, A. “Students Don’t ‘Work’ – They Learn,” Education week, September 3, 1977.

Larman, Craig (2002). “Applying UML and Patterns: An Introduction to Object-Oriented Analysis and Design and the Unified Process (2nd Ed)”. Upper Saddle River, NJ: Prentice Hall PTR.

Malik, D.S. (2005). “Java Programming – From Problem Analysis to Program Design 2nd Edition”. Thomson Course Technology. pp 1-21.

McKeachie, W McKeachie’s “Teaching Tips: Strategies, Research and Theory for College and University Teachers, 11th ed” Boston: Houghton Mifflin, 2002.
Newcombe RG. “Two sided confidence intervals for the single proportion: Comparison of seven methods” Statistics in Medicine 1998;17:857-872.
Sim, Edward R, and Wright, George “'The Difficulties of Learning Object-Oriented Analysis and Design: An Exploratory” Journal of Computer Information Systems, XXXXII, 2, 95.

Appendix

Figure 1 -- This program finds the average of a set of numbers input until a –9999 is entered. See corresponding Java program below.

// The Java model class for the assembler find average program public class Avg
{ public void computeAvg() { double num = Double.parseDouble( JOptionPane.showInputDialog("Enter A Number")); double count = 0; double sum = 0; while (!(num == -9999)) { sum = sum + num; count = count + 1; num = Double.parseDouble( JOptionPane.showInputDialog("Enter A Number")); } JOptionPane.showMessageDialog(null, " Avg = " + sum / count); } // end computeAvg() } // end class

Figure 1a – Flow Chart for the code in figure 1
|[pic] |
| |

Similar Documents

Free Essay

Fred

...domain controllers and end-to-end replication completes in accordance with your service level agreements. * Lightweight Directory Access Protocol (LDAP) queries respond quickly. * Domain controllers do not experience high CPU usage. * The central monitoring console collects all events that can adversely affect Active Directory. Even if you are doing full backups, Windows Server Backup provides some great space efficiencies on the target disks. For instance, you might perform multiple full backups of the same volume. Since Windows Server Backup uses Volume Shadow Copy Service snapshots on the target disks where it stores the backup images, the snapshots will only store the blocks that have changed. This substantially reduces the space used by multiple full backups. This eliminates the need to perform multiple restore operations to recover an incremental backup. Even though the snapshot only stores the deltas for each backup, Volume Shadow Copy Service makes each backup appear...

Words: 269 - Pages: 2

Free Essay

Snapshot

...Let’s Take this Private: Linens’n Things versus Bed Bath & Beyond 1. Assume that you are Robert DiNicola, CEO of Linen’n things, what specific competitive strategy and implementation plan would you take to turn around LNT? * improve supply chain, lower their cost * Improve online store, online shopping * Differentiation strategy * Globalization. They can seek international partner to expand their business * Learning the successful experiences from Bed Bath & Beyond 2. Will DiNicola’s effort to turn around LNT be aided or hindered by changing economic and industry conditions (show your macro environment and industry analysis? Be aided * Industry consolidation. Business environment becomes less favorable. It’s good for LNT to turn around based on the big scope and the existed structure. * Integrate internet. It’s good for LNT to build the online store * Globalization of the fashion. It’s good for LNT because of their differentiated products. Be hindered: * Slow increasing rate with intensely competition. The maturity of the U.S. market. * Industry consolidation makes the large companies stronger, but LNT fall behind some big companies like BBBY. So it’s hard to catch up. * Financial crisis. * Government policies affect the industry performance. e.g. interest rate adjustment. High interest rate, low purchase. 3. How had Bed Bath & Beyond come to surpass Linens’n Thins over time despite its similar...

Words: 453 - Pages: 2

Premium Essay

Snapshot B

...Group Snapshot B Fill the boxes with the appropriate information. The boxes will extend as you enter data. If you need more space, use another page. Remember, this is about the groups' history and development in the USA. Student's Name |LaRhonda Jones | | | Project |My Ethnic Group and Discrimination | Ethnic Group Chosen |Black | 1.) Reason (s) for choosing that group |The reason why I chose this group because black was in the past was discriminated against. | | | | | ORIGINS 2.) How the group came to be a part of the US |Date(s) of Immigration Wave,| Reason(s) ...

Words: 711 - Pages: 3

Free Essay

Hometown Snapshot

...Citizen Alum Project: Meredith Ingram Emily West Meredith Ingram’s passion for medicine did not begin in Atlanta where she now works as a Physician’s Assistant for Atlanta Facial Plastics. Her true story of falling in love with creating change though medicine began after she graduated from Emory and decided to work as a medical missionary in northern India. Her stories from that year are raw and emotional filled with hope despite the unimaginable circumstances. After that year, Meredith partnered with Doctors Without Borders has has since lived in Israel and Ghana. Ingram’s goal through these travels is educating people not only about these conditions, but educating the people who are living in them about what they can do prevent themselves from serious medical problems. Meredith credits her father for inspiring her to create change though medicine. Her father who is a Nephrologist in LaGrange, Georgia where Ingram grew up is also very passionate about the influence and power medicine has over our world. She chuckles as she says, “I always knew I would follow in the footsteps” not knowing where this path would take her. She describes that her calling has taken her far beyond what she though was imaginable and that through this leap of faith she has been challenge to learn and grow. The piece of advice Meredith was most influenced her during her time at Emory was an idea from a professor who challenged that a calling is not easily fulfilled or understood. Often people...

Words: 457 - Pages: 2

Premium Essay

Photography vs Snapshot

...I believe many of you have a question in your mind. What is “snapshot” and what is “photography” if I can draw your attention…? A snapshot is basically just point the camera and shoot very quickly. A photography, on the other hand, requires attention to detail—lighting, positioning of the object, and choice of an interesting background. In short, a photography is deliberately on purpose. There are similarities and differences between Snapshot and photography. Both require a camera and have the same meaning to record things as they look. Furthermore, the differences between snapshot and photography are composition, process, and equipment. One key difference between snapshots and photography is composition. When taking a good photograph, there are a lot of elements to bear in mind. These elements include your method of lighting, whether they are effective, and your subjects, whether they are interesting and intended to be an interpretation of the photographers’ view of the subject that will automatically create a sense of mood or emotion. The composition of your shot in photography is an important element. Snapshot, On the contrary, there is no organization of the visual space. Its means in same area of the image serve no purpose at all. For example, birthday party A second difference is processing. Snapshot is incredibly easy to create. Grab a camera. Point it at stuff. And click. Snapshots often do not require much planning usually without artistic intent. For example, Demonstration...

Words: 428 - Pages: 2

Premium Essay

Mdmc Case Snapshot

...ex-MDCM employees and had been a part of the logistics group for ensuring sincerity and efficiency at the same time. Global Strategy MDCM Inc. being a US based company globalized by acquiring firms in all the major regions of world other than US and started using the global strategy by making its first acquisition of a UK based company in 1987, and made more than 20 acquisitions till mid 1990’s. E-Business Strategy Keeping pace with the emerging global economy and the e-business trends MDCM felt serious flaws in its IT system. And to overcome the inaccurate forecasting, scheduling, inventory and supply chain problems and to make its business more cost effective it needed to modify its IT system. For the purpose Atkins made high level snapshots of the IT systems in the entire major departments of MDCM, and developed a solid proposal to make recommendations for the identified IT problems. Question no 2: Define a set of business goals and high level IT objectives Answer: Business Goals: The main goals of MDCM as defined in...

Words: 887 - Pages: 4

Premium Essay

Country Snapshots--China

...Nowadays, China, the emerging market in Asia, contains huge business opportunities. At the same time, because of the different culture and history, the characteristics of Chinese society including its source of power, social order, and solidarity, is actually very different from the West. The big difference is that China is a relationship-oriented society. For this reason, how can Westerner adapt the ways of doing business in China? Here are three recommendations for the entrepreneurs that want to enter the Chinese market.  Learn The Crucial Concept of "Face" The meaning of “face” in China covers much more aspects than the Western countries. Face is related to dignity, respect, and also to a person's social status, therefore face is more important for someone who is in higher position. Declining to attend social or business occasions with an unconvincing excuse, rejecting the gift directly, making emotional expression out of control or even showed too maverick yourself, might cause people lose face (Zhang). For instance, Chinese people sometimes think that the businessman of the Western countries “struts his stuff” purposely. In China, if someone in a middle or low position proposes new ideas in front of the entire person during the meeting, that action may be regarded as a display of their learning. This also may lead to jealousy and loss of face your boss. The loss of face would cause the reduction of your social resources which can use to cultivate and establish you social...

Words: 1261 - Pages: 6

Premium Essay

Rolf Potts Tourist Snapshots

...“Tourist Snapshots, an essay written by Rolf Potts, explores the power of “snapshots” to manipulate memory. He navigates place, time, and provides an analysis of his past, as he views (and chooses to share) it. Potts opens with an anecdote of loving a beautiful woman, seducing his audience with a luminous description of Eva. After a brief time with her, we, the reader, surface in Washington. This “jump” is the first moment of dissonance, a harsh transition from Thailand, 2001, to Washington, 1986. The transition is harsh. Eva is dropped and a new topic is introduced We, the readers, come to understand later that Eva is simply an introduction, not the focus of the essay, but this is not evident in that first transition. Potts uses a snapshot...

Words: 409 - Pages: 2

Premium Essay

A Snapshot on Marginal Risk Contributions

...Marginal Risk Contributions Overview This chapter focuses on marginal risk contributions, to portfolio loss volatility or to portfolio capital, and compares them with absolute risk contributions. Marginal risk contributions serve essentially for risk-based pricing with an ‘ex ante’ view of risk decisions, while absolute risk contributions are the basis for the capital allocation system. Marginal risk contributions to capital are the correct references for risk-based pricing. Pricing based on marginal risk contributions charges to customers a mark-up equal to the risk contribution times the target return on capital. The mark-up guarantees that the return on capital for the entire portfolio will remain in line with the target return when adding new facilities. However, prices based on marginal risk contributions are lower than prices based on absolute risk contributions. This is a paradox, since the absolute risk contributions are the ones that sum to capital. In fact the new facility diversifies the risk of those existing facilities prior to the entrance of any new one. Therefore, adding a new facility results in a decline in all absolute risk contributions of existing facilities. Because of this decline, the overall return of the portfolio remains on target. However, the ex-ante measure of risk-based performance, on the marginal contribution and the ex-post measure, on the absolute contribution, differ for the same facility. The Marginal Risk Contributions ...

Words: 2466 - Pages: 10

Premium Essay

Deploying-Veritas-Backup-Exe

...PS Series Best Practices Deploying VERITAS™ Backup™ Exec 10 and Auto-Snapshot Manager Abstract This Technical Report describes how to back up and restore NTFS volumes, Microsoft Exchange e-mail, and SQL databases using VERITAS Backup Exec 10, the EqualLogic Auto-Snapshot Manager for Windows VSS provider, and PS Series storage arrays. Copyright © 2005 EqualLogic, Inc. August 2005 EqualLogic is a registered trademark of EqualLogic, Inc. All trademarks and registered trademarks mentioned herein are the property of their respective owners. Possession, use, or copying of the documentation or the software described in this publication is authorized only under the license agreement specified herein. EqualLogic, Inc. will not be held liable for technical or editorial errors or omissions contained herein. The information in this document is subject to change. PS Series Firmware Version 2.1 or later. ii Deploying VERITAS Backup Exec 10 and Auto-Snapshot Manager Table of Contents Technical Report and Software Revision Information......................................................... iv Introduction ............................................................................................................................1 Common Backup and Recovery Configurations ...................................................................2 Backup and Recovery Media .................................................................................................3 Backup to Disk...

Words: 9581 - Pages: 39

Premium Essay

Nt1330 Unit 7

...However, we will not recommend using snapshots within virtual machines which can provide time-sensitive services like Active Directory services, or while the performance or the availability of storage space services are very much critical. Adding to this, we should consider the following points before we start using snapshots: 1. Taking a snapshot will reduce the performance of the virtual machine any snapshot can be created. We should not use the available snapshots within virtual machines which can provide services within the production environment. 2. We will not recommend using snapshots within virtual machines as they are configured with the relevant fixed virtual hard disks since it will reduce the performance benefits which are otherwise gained through fixed virtual hard...

Words: 2455 - Pages: 10

Premium Essay

Instruction Memo

...Memorandum Date: October 7, 2014 To: Marketing Department From: Linda M. Trojner, Marketing Director ------------------------------------------------- Subject: How to Use PDF Snapshot Tool for Copying Text and Images You can save a lot of time by copying and inserting text and images from previous editions of the company’s catalog into the new one. The PDF feature called Snapshot Tool makes this task possible. Many of you have asked how to copy text and images from previous editions, and there is an easy way of doing it. To use the Snapshot Tool feature, please follow these steps: 1. Click on the Tools pull-down menu in an open PDF document. 2. Click on Snapshot Tool from either Basic or Select & Zoom. Where it is located depends on the Acrobat version you are using. The Snapshot Tool is represented by a camera icon. The cursor will change its shape once this feature is activated. 3. Select the part of the PDF document that you want to capture. You can also take a picture of an entire page. 4. Click the location where you want to insert the copied text or image. At the same time, drag the mouse over the page in the direction you want. A selected area appears that you can expand and reduce, but you cannot let go of the left mouse button. 5. Release the left mouse button. A copy of the selected area will be made. 6. Paste the selected area into a blank Microsoft Office document, whether Word, Excel, or PowerPoint. By following...

Words: 290 - Pages: 2

Premium Essay

American Express

...The credit card world is changing along with the 21st Century and leading the way is American Express (AmEx) by offering a first-of-its-kind innovation by partnering with four external environment television networks. The four ways AmEx is externally reaching diversity is through a T-Commerce Program with FOX Broadcasting Company, NBCUniversial & Zeebox, BrightLine, and Shop Small Provincetown (Forbes). AmEx is strengthening their clients’ shopping experience at their fingertips, with access to purchasing items on phones and computers, which also includes thirty-second commercials launched across all gaming consoles, tablets, telecom companies’ satellites and cable to reach their diverse consumer ("America Express News: Press Release.", 2012).. Targeting ranges from mothers and teens to Hispanics, members of the LBGT (lesbian, gay, bisexual, and transgender) community and many other diverse groups of people (Forebs). AmEx is reaching the people who drive their company forward by finding out who has more pull in the purchase decisions made in a particular household. They also analyze how certain age groups purchase their merchandise, how to advertise to those who need support in purchasing a product, and more importantly partnering and sponsorships with Human Rights Campaign (Forbes). Through the partnership with the four companies, AmEx helps to reach their consumers more easily, and make purchasing more accessible. Partnering with a broadcasting company opens many...

Words: 1959 - Pages: 8

Free Essay

Progressive Mis Case

...[pic][1] Case Description If you‘ve ever been in a car accident, you know how it feels to wait for your claim payment to arrive. Insurance companies love to hold the money as long as possible to keep every penny of interest. Progressive Insurance is the notable exception to the industry rule: It tries to pay as quickly as it can – by getting claims adjusters out of the office and onto the street where they can interact with clients. The logic behind such a radical notion? Happier customers and more productive claims reps will more than make up for the lost interest revenue. At Progressive, that radical notion is enabled (in part) by IRV, which stands for “immediate response vehicle,” a fleet of SUVs loaded with enough communications gear – laptops, printers, and cell phones – to allow adjusters to settle claims right at the scene of the accident. That’s a big improvement over the scenario that still pervades the industry: Wait a week or two to see the car and make hand written notes, snap photos, drive back to the office, type it all into the mainframe computer, and issue a request for a check. Ten years ago, the IRV project involved just 10 adjusters in Florida. Today more than 11,000 mobile claims reps share a fleet of 2,600 IRVs. Not only did the program help improve customer retention by 20% last year; it has helped Progressive shave labor costs. Progressive’s mobile adjusters can handle nearly twice the workload they could a decade ago. IRVs have also helped...

Words: 675 - Pages: 3

Premium Essay

Project Server Virtual Machine Setup Guide

...Setting up the Host Machine for the SharePoint, Office and Project 2010 Virtual Machines V4.0 "The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious. No association with any real company, organization, product, domain name, email address, logo, person, places, or events is intended or should be inferred." System Requirements Requirement | Item | Operating System | Microsoft Windows® Server 2008 R2 with the Hyper-V role enabled | Drive Formatting | NTFS | Processor | Intel VT or AMD-V capable | RAM | 4 GB or more (8 GB or more recommended) | Hard disk space required for install | 50 GB | Virtual Machine Software and Pre-Configuration Virtual machine “a” contains the following pre-configured software: 1. Windows Server 2008 R2 Standard Evaluation Edition x64, running as an Active Directory Domain Controller for the “CONTOSO.COM” domain with DNS and WINS 2. Microsoft SQL Server 2008 R2 Enterprise Edition with Analysis, Notification, and Reporting Services 3. Microsoft Office Communication Server 2007 R2 4. Visual Studio 2010 5. Microsoft SharePoint Server 2010 Enterprise Edition 6. Microsoft Office Web Applications 7. FAST Search for SharePoint 2010 8. Microsoft Project Server 2010 9. Microsoft Office Professional Plus 2010 10. Microsoft Visio 2010 11. Microsoft Project 2010 12. Microsoft Office Communicator 2007 R2 Virtual...

Words: 2121 - Pages: 9