Alarms Toolbar

Total Page:16

File Type:pdf, Size:1020Kb

Alarms Toolbar Iris Alarms Version 7.13.2 NOTE The content in this document is a subset of the Iris online help and user guides. Not all links within the document are active. Refer to the Iris online help and user guides for access to complete information about a feature. Tektronix Communications | For Licensed Users Only | Unauthorized Duplication and Distribution Prohibited Copyright Copyright Tektronix Communications, Inc. All rights reserved. Printed in the USA. Tektronix products are covered by U.S. and foreign patents, issued and pending. Information in this publication supersedes that in all previously published material. Specification and price change privileges reserved. TEKTRONIX and TEK are registered trademarks of Tektronix, Inc. All other trade names referenced are the trademarks of the service marks, trademarks, or registered trademarks of their respective companies. No portion of this document may be copied, photocopied, reproduced, translated, or reduced to any electronic medium or machine form without prior consent in writing from Tektronix, Inc. The information in this document is subject to change without notice and does not represent a commitment on the part of Tektronix, Inc. Tektronix Communications 3033 W President George Bush Highway Plano, TX 75075 USA +1 469-330-4000 (voice) www.tekcomms.com 992-0472-08-001-140228 The products and specifications, configurations, and other technical information regarding the services described or referenced in this document are subject to change without notice. All statements, technical information, and recommendations contained in this document are believed to be accurate and reliable but are presented "as is" without warranty of any kind, express or implied. Users must take full responsibility for their application of any products specified in this document. Tektronix, Inc. makes no implied warranties of merchantability or fitness for a purpose as a result of this document or the information described or referenced within, and all other warranties, express or implied, are excluded. Except where otherwise indicated, the information contained in this document represents the planned capabilities and intended functionality offered by the product and version number identified on the front of this document. Screen images depicted in this document are representative and intended to serve as example images only. Wherever possible, actual screen images are included. Iris Alarms 7.13.2 2 Tektronix Communications | For Licensed Users Only | Unauthorized Duplication and Distribution Prohibited Table of Contents What's New in Iris Alarms 7.13.2 13 Iris Alarms Components 14 Iris Alarms Components 14 Policy Management Workflow 15 Policy Management Components 15 Policy Management Workflow 16 Alarm Dashboard Workflow 18 Alarm Dashboard Components 18 Alarm Dashboard Workflow 18 Iris Alarms Use Cases 19 Setting Up Alarm Thresholds for Link Utilization 19 Background 19 To Set Up an Alarm Threshold for Link Utilization 19 Configure Policy KPI Conditions 19 Create a Link Policy Using the Link Template 20 Assign Other Dimensions to the Link Policy 20 Follow-up Tasks 20 Creating an IPI Network Service Policy 20 Prerequisites 20 To Create a Policy 20 To Create an Action Template 21 Follow-Up Tasks 21 Creating a Low Data Volume Alarm Policy 21 Background 21 To Set Up an Alarm for LDV 22 Configure Policy KPI Conditions 22 Assign GGSNs to the Policy 22 Follow-up Tasks 22 Analyzing ITA Critical Alarms Using the Alarm Dashboard 22 Prerequisites 23 To Analyze Critical Alarms Using the Alarm Dashboard 23 Follow-up Tasks 23 Creating an IPI Policy Based on Response Codes 23 To Create a Policy 24 To Create Response Code Conditions 24 To Create Response Code Policy KPI Dimensions 24 Follow-Up Tasks 25 Iris Alarms 7.13.2 3 Tektronix Communications | For Licensed Users Only | Unauthorized Duplication and Distribution Prohibited Alarms User Interface 26 Alarms Toolbar 26 Policy Management Dashboard 26 Policy Management Dialog Boxes 26 Alarm Dashboard 26 Alarm and Policy Management Dashboards 26 Alarm Dashboard 27 Policy Management Dashboard 27 Alarm Dashboard 27 Time Filter Values 28 Common Pane Controls 28 Alarm Dashboard Toolbar 28 Alarm Dashboard 29 Time Slider Window 29 Alarm Browser 30 Columns 30 Description Fields 31 Alarm Causes Table 31 Alarm History Table 32 Column Filter Controls 32 Paging Controls 32 Dashlet Toolbar Controls 33 Alarm Browser (ITA Alarms) 33 Alarm Browser (System-Level Alarm) 34 Column Filter 34 Alarms by Severity Dashlets 34 Dashlet Toolbar Controls 35 Alarm Distribution by Severity 35 Alarms by Severity and Time Slider 36 Alarms Global Filter 36 Time Filter Area 37 Time Filter Values 37 Alarm Filters Area 37 Drill Filter Area 38 Alarms Global Filter 38 Alarms Global Filter - After Drilling Down from IrisView Network Maps 39 Policy Management Dashboard 39 Policy Management Tabs 40 Policy Management - IPI Example 40 Iris Alarms 7.13.2 4 Tektronix Communications | For Licensed Users Only | Unauthorized Duplication and Distribution Prohibited Policies Tab 40 Policy List Pane 41 Policy Details Pane 42 Policies Tab - IPI Example 43 Action Templates Tab 43 Action Template Details Area 45 Column Filter Controls 46 Action Templates - Email 46 Action Templates - SNMP 47 Schedule Templates Tab 47 Schedule Template Details 48 Column Filter Controls 49 Schedule Templates Tab 49 Profiles Tab 49 Profile Details 51 Column Filter Controls 51 Profiles Tab 52 Profile Schedule Template Example 52 Profile Action Template Example 52 Users to Profiles Tab 53 Users to Profiles Tab 54 System Alarms Tab 54 G10 Alarms Window 55 G10 Alarms Window 56 Forwarding Window 56 Forwarding Window 57 Condition and Assignment Editor Window 57 Dimensions Area 58 Dimensions Area for IPI Response Code Category 59 Condition and Assignment Editor - ITA Example 60 Condition and Assignment Editor Window - KPI Studio 60 Dimensions Area 62 Condition and Assignment Editor - KPI Studio Example 62 Import Policy Data Dialog Box 62 Import Policy Data 63 Iris Alarms References 64 Iris Application Policies and Alarms 64 Policy Configuration 65 IPI-Specific Policy Configuration 65 Iris Alarms 7.13.2 5 Tektronix Communications | For Licensed Users Only | Unauthorized Duplication and Distribution Prohibited Condition and Assignment Editor Configuration 66 Action Template Configuration 66 Iris Entity Support 67 Iris Alarm Types 70 System-Level Alarms 70 User-Defined Threshold Alarms 70 Absolute and Relative Condition Alarms 71 Aggregate Alarms 71 Low Data Volume Alarms 71 Alarm States 71 Alarm Severity 71 Configuring Relative and Absolute Alarms 72 To Configure Relative or Absolute Alarms 72 Alarm Policy Conditions Example 73 Iris Relative Percentage Alarm Example 73 Configuring Aggregate Alarms 74 Aggregate Alarm Modes 75 Tumbling and Sliding Window Settings 75 Hourly Aggregate Alarms Example 75 Iris Alarm Acknowledgement 76 Alarm Acknowledgement 77 Confirm Alarm Acknowledgement 78 Alarm Acknowledge History 78 Iris Alarm Clearing 79 Alarm Clearing 80 Confirm Alarm Clearing 81 Alarm Clearing History 81 Using Minimum Samples to Cancel Noise 82 Use Cases 82 Application 82 To Configure Minimum Samples in a New Policy 82 Condition and Assignments - Before Defining Condition and Triggers 83 Condition Creation - After Defining Condition and Triggers 84 Conditions Area in Policy Details Pane - After Saving Condition 85 Configuring Protocol/Application Alarms for ITA KPIs 85 Supported KPI Types 86 Dimension Hierarchy 86 Supported KPIs and Dimensions 86 Number of Responses Example 87 Iris Alarms 7.13.2 6 Tektronix Communications | For Licensed Users Only | Unauthorized Duplication and Distribution Prohibited Number of Messages Example 88 Number of Transactions Example 90 Average Jitter Time for All Bins Example 92 Exporting Iris Alarms 92 Export File Name Convention 93 File Syntax 93 Exporting and Importing Alarm Policy Data 94 Export Process 94 XML Schema 94 Import Process 94 Import Synchronization 94 Examples of Synchronization and Overwrite 94 Import Limitation 95 Import Errors 95 Import Error Log 96 Iris SNMP Alarm Forwarding 96 Policy Based Alarms 96 System-Level alarms 96 Updating or Deleting Templates and Policies 97 KPI Studio Alarms 97 Best Practice in Creating KPI Studio Alarms 97 System-Level Alarms 98 What's New in System-Level Alarms for 7.13.2 98 BASE Alarms 99 BASE-101 Application aborted 99 BASE-110 Application high CPU occupancy 100 BASE-150 Hardware failure 100 BASE-160 System Alarm (Minor) 100 BASE-161 System Alarm (Major) 101 BASE-162 System Alarm (Critical) 101 BASE-163 F/W Out Of Date 102 BASE-164 F/W Update Failed 103 BASE-165 F/W Incompatibility Detected 103 BASE-201 Slave blade communication lost 103 BASE-210 Slave blade NTP failure 103 BASE-301 Invalid installation directory 103 BASE-302 Corrupted software installation 104 BASE-303 Loss of NTP server 104 BASE-401 CPU usage above normal 104 Iris Alarms 7.13.2 7 Tektronix Communications | For Licensed Users Only | Unauthorized Duplication and Distribution Prohibited BASE-402 CPU usage above overload 105 BASE-403 CPU usage above safety limits 105 BASE-411 Memory usage above normal 105 BASE-412 Memory usage above overload 105 BASE-413 Memory usage above safety limits 106 BASE-415 Page swaps in (suggests memory exhaustion) 106 BASE-421 Disk usage above normal limits 106 BASE-422 Disk usage above high limits 107 BASE-423 Disk usage above safe limits 107 BASE-431 High network traffic (Input Traffic) 107 BASE-432 Very high network traffic (Input Traffic) 108 BASE-433 Extremely high
Recommended publications
  • System/370 Model 145 Reference Summary
    System/370 Model 145 Reference Summary S229-2239-1 IBM Corporation, Field Support Documentation, Dept 927, Rochester, Minnesota 55901 PREFACE This publication is primarily intended for customer engineers servicing System/370 Model 145. Second Edition (September 1972) This is a major revision of, and makes 8229-2239-0 obsolete. Address any comments concerning the contents of this publication to: IBM, Field Support Documentation, Dept 927, Rochester, Minnesota 55901 © International Business Machines Corporation 1972 CONTENTS Section 1 - Control Words Branch and Module Switch Word "O" . 1. 1 Branch Word . 1.2 GA Function Charts . 1.3 GA Function Charts . 1.4 GA Function Charts . 1.5 Branch and Link or Return Word . 1.6 Word Move Word Version"O" . 1. 7 Word Move Word Version "1" . 1.8 Storage Word, Non K-Addressable . 1.9 Storage Word, K-Addressable . 1.10 Arithmetic Word 10 Byte Version 1.11 Arithmetic Word, Fullword Version 1.12 Arithmetic Word, 11 Direct ByteVersion . 1.13 Arithmetic Word, 10/11 Indirect Byte Version . 1.14 ALU Entry Gating 1.15 Stat Set Symbols . 1.15 BranchSymbols . 1.15 Arithmetic Word Chart Selection 1.16 Address Formation Chart 1.16 Control Word Chart Selection 1.16 Section 2 - CPU 3145 CPU Data Flow . 2.1 I-Cycles Data Flow . 2.2 I-Cycles . 2.3 PSW Locations . 2.3 Expanded Local Storage . 2.3 I-Cycles . 2.3 I-Cycles Control Line Generation . 2.4 Control Word . 2.4 Control Register Decode . 2.4 iii ECCL Board Layout ............ 2.5 Data Bit Location Chart .......... 2.5 Common Test Points ...........
    [Show full text]
  • Template Jurnal JAIC;
    Journal of Applied Informatics and Computing (JAIC) Vol.2, No.1, Juli 2018, pp. 7~10 e-ISSN: 2548-6861 7 Simulation Strategic Positioning for Mobile Robot Roccer Wheels Mochamad Mobed Bachtiar1, Iwan Kurnianto Wibowo2, Rakhmat Faizal Ajie3 Teknik Komputer, Politeknik Elektronika Negeri Surabaya [email protected] 1, [email protected] 2, [email protected] 3 Article Info ABSTRACT Article history: Soccer robot is a combination of sports, robotics technology and multi agent system. The achieve goals in playing the ball, requires individual intelligence, and the ability Received 2018-04-30 of cooperation for individual skills. The success of a soccer robot team is influenced Revised 2018-06-01 by the success of the robot player to enter the ball into the opponent's goal. In Accepted 2018-07-01 entering the ball into the opponent's goal needed an appropriate position and strategic. This research makes the design in finding a strategic position at the time Keyword: of attack. The design divides the field into several small areas or the main grid, strategic position; attack where each region gives different action. The position is said to be strategic if the strategy; empty space; naïve robot passing success and has a fairly wide perspective against the goal. The bayes classifier strategic position is gained from the greatest opportunity of some of the decisive conditions. The calculation used is to use the Probability Naïve Bayes Classifier by taking the maximum value that serve as a strategic position. So this research resulted in a design in finding strategic position. Copyright © 2017 Journal of Applied Informatics and Computing.
    [Show full text]
  • Report on the Most Appropriate Indicators Related to the Basic Concepts
    D 4.1 – Report on the most appropriate indicators related to the basic concepts Report on the most appropriate indicators related to the basic concepts Deliverable D4.1 This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No. 870708 D 4.1 – Report on the most appropriate indicators related to the basic concepts Disclaimer: The contents of this deliverable are the sole responsibility of one or more Parties of the SmartCulTour consortium and can under no circumstances be regarded as reflecting the position of the Research Executive Agency and European Commission under the European Union’s Horizon 2020 programme. Copyright and Reprint Permissions “You may freely reproduce all or part of this paper for non-commercial purposes, provided that the following conditions are fulfilled: (i) to cite the authors, as the copyright owners (ii) to cite the SmartCulTour Project and mention that the EC co-finances it, by means of including this statement “Smart Cultural Tourism as a Driver of Sustainable Development of European Regions - SmartCulTour Project no. H2020-870708 co financed by EC H2020 program” and (iii) not to alter the information.” _______________________________________________________________________________________ How to quote this document: Petrić, L., Mandić, A., Pivčević, S., Škrabić Perić, B., Hell, M., Šimundić, B., Muštra, V., Mikulić, D., & Grgić, J. (2020). Report on the most appropriate indicators related to the basic concepts. Deliverable 4.1 of the Horizon 2020 project SmartCulTour (GA number 870708), published on the project web site on September 2020: http://www.smartcultour.eu/deliverables/ D 4.1 – Report on the most appropriate indicators related to the basic concepts This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No.
    [Show full text]
  • Nv9602 Nv9000 Control Panel
    NV9602 NV9000 CONTROL PANEL User’s Guide VERSION 1.2 UG0040-02 2015-07-02 www.grassvalley.com Notices Copyright and Trademark Notice Copyright © 2015, Grass Valley USA, LLC. All rights reserved. Belden, Belden Sending All The Right Signals, and the Belden logo are trademarks or registered trademarks of Belden Inc. or its affiliated companies in the United States and other jurisdictions. Grass Valley USA, LLC, Miranda, NV9602, Kaleido, NVISION, iControl, and Densité are trademarks or registered trademarks of Grass Valley USA, LLC. Belden Inc., Grass Valley USA, LLC, and other parties may also have trademark rights in other terms used herein. Terms and Conditions Please read the following terms and conditions carefully. By using NVISION control panel documentation, you agree to the following terms and conditions. Grass Valley hereby grants permission and license to owners of NVISION control panels to use their product manuals for their own internal business use. Manuals for Grass Valley products may not be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, for any purpose unless specifically authorized in writing by Grass Valley. A Grass Valley manual may have been revised to reflect changes made to the product during its manufacturing life. Thus, different versions of a manual may exist for any given product. Care should be taken to ensure that one obtains the proper manual version for a specific product serial number. Information in this document is subject to change without notice and does not represent a commitment on the part of Grass Valley. Warranty information is available in the Support section of the Grass Valley Web site (www.grassvalley.com).
    [Show full text]
  • VSI X.25 for Openvms Configuration Guide
    VSI OpenVMS VSI X.25 for OpenVMS Configuration Guide Document Number: DO-DX25CG-01A Publication Date: August 2018 Revision Update Information: This is a new manual. Operating System and Version: VSI OpenVMS Integrity Version 8.4-2 VSI OpenVMS Alpha Version 8.4-2L1 Software Version: VSI X.25 for OpenVMS Version 2.1 VMS Software, Inc. (VSI) Burlington, Massachusetts, USA VSI X.25 for OpenVMS Configuration Guide Copyright © 2018 VMS Software, Inc. (VSI), Burlington, Massachusetts, USA Legal Notice Confidential computer software. Valid license from VSI required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. The information contained herein is subject to change without notice. The only warranties for VSI products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. VSI shall not be liable for technical or editorial errors or omissions contained herein. HPE, HPE Integrity, HPE Alpha, and HPE Proliant are trademarks or registered trademarks of Hewlett Packard Enterprise. Intel and Itanium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. Oracle is a registered trademark of Oracle and/or its affiliates. The VSI OpenVMS documentation set is available
    [Show full text]
  • Towards Coordinated, Network-Wide Traffic
    Towards Coordinated, Network-Wide Traffic Monitoring for Early Detection of DDoS Flooding Attacks by Saman Taghavi Zargar B.Sc., Computer Engineering (Software Engineering), Azad University of Mashhad, 2004 M.Sc., Computer Engineering (Software Engineering), Ferdowsi University of Mashhad, 2007 Submitted to the Graduate Faculty of the School of Information Sciences in partial fulfillment of the requirements for the degree of Doctor of Philosophy University of Pittsburgh 2014 UNIVERSITY OF PITTSBURGH SCHOOL OF INFORMATION SCIENCES This dissertation was presented by Saman Taghavi Zargar It was defended on June 3, 2014 and approved by James Joshi, Ph.D., Associate Professor, School of Information Sciences David Tipper, Ph.D., Associate Professor, School of Information Sciences Prashant Krishnamurthy, Ph.D., Associate Professor, School of Information Sciences Konstantinos Pelechrinis, Ph.D., Assistant Professor, School of Information Sciences Yi Qian, Ph.D., Associate Professor, College of Engineering, Dissertation Advisors: James Joshi, Ph.D., Associate Professor, School of Information Sciences, David Tipper, Ph.D., Associate Professor, School of Information Sciences ii Copyright c by Saman Taghavi Zargar 2014 iii Towards Coordinated, Network-Wide Traffic Monitoring for Early Detection of DDoS Flooding Attacks Saman Taghavi Zargar, PhD University of Pittsburgh, 2014 DDoS flooding attacks are one of the biggest concerns for security professionals and they are typically explicit attempts to disrupt legitimate users' access to services. Developing a com- prehensive defense mechanism against such attacks requires a comprehensive understanding of the problem and the techniques that have been used thus far in preventing, detecting, and responding to various such attacks. In this thesis, we dig into the problem of DDoS flooding attacks from four directions: (1) We study the origin of these attacks, their variations, and various existing defense mecha- nisms against them.
    [Show full text]
  • Does Migration Destination Affect the Mortality Advantage of Mexican Immigrants? a Comparison of Traditional, New, and Emerging Destinations
    Does Migration Destination Affect the Mortality Advantage of Mexican Immigrants? A comparison of Traditional, New, and Emerging Destinations Andrew Fenelon1 1National Center for Health Statistics, 3311 Toledo Road, Hyattsville, MD 20782 Abstract Health declines for immigrants with greater exposure to the United States, but the specific characteristics of the migration and assimilation processes that contribute to this pattern are less clear. As the Mexican population in the US has grown, it has expanded outside traditional gateways in California and Texas to new destinations throughout the US. This study examines the mortality of Mexican immigrants in Traditional versus New and Emerging destinations in the US. Using National Health Interview Survey data between 1989 and 2009 the analysis finds that Mexican immigrants in New and Emerging destinations have a significant survival advantage over their counterparts in traditional established destinations. This advantage may reflect selective migration to new destinations, superior employment prospects, or slower behavioral assimilation. US-born Mexicans do not benefit from this advantage. The results suggest that the spatial characteristics of the assimilation process are important when considering the health of immigrants. Introduction The Hispanic mortality advantage refers to the finding that the Hispanic-origin population in the United States experiences lower adult mortality rates than the non-Hispanic white population, despite lower average socioeconomic status among Hispanics. The “Hispanic Paradox” calls attention to the fact that Hispanics resemble African-Americans in terms of socioeconomic indicators but non-Hispanic whites in health and mortality indicators (Hummer, et al., 2000, Markides and Eschbach, 2011). In many studies, Hispanics exhibit higher life expectancy than non-Hispanic whites, as well as more favorable profiles with respect to non-fatal conditions such as cancer incidence and severity, heart disease, and hypertension (Eschbach, et al., 2005, Singh and Siahpush, 2002).
    [Show full text]
  • IEEE Paper Template in A4 (V1)
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTING SCIENCE ISSN NO: 0972-1347 Performance of Bidirectional Diagonal Mesh Topology with modified Q routing for Network on Chip Architecture P. P. Papalkar1, M. A. Gaikwad2 1Electronics and Telecommunication, Ramrao Adik Institute of Technology, Navi - Mumbai, India [email protected] 2 Electronics and Telecommunication, G. H. Raisoni college of Engineering, Nagpur, India [email protected] Abstract— Many routing architectures and routing algorithms have been developed to alleviate traffic congestion over the network. Bidirectional Diagonal Mesh NoC architecture is used to reduce the load distribution across the network by reducing the diameter of the network, which ultimately reduces routing cost. Q routing searches least congested path available in the network from source to destination. It is highly adaptive and flexible algorithm. Bidirectional Diagonal Mesh topology is combined with modified Q routing, which estimates the alternative routes with priority given to diagonal path using Q Table. Significant improvement over the traditional Mesh topology is achieved by the proposed approach. Keywords: Network on Chip, Bidirectional Diagonal Mesh Topology, Q Routing, Modified Q Routing, throughput and latency 1. INTRODUCTION As the size of a transistor reduces to submicron level, more transistors will be integrated on a single chip that can be clocked faster. According to Moore’s law, the density of a transistor in an integrated circuit would double every 18 to 24 months that leading to the implementation of System on chip (SoC). SoC is complex and heterogeneous components such as programmable processors, memories, input /output interface, custom hardware, peripherals, external interface IP (INTELLECTUAL property) blocks can be in integrated on-chip communication architecture that serves to interconnect these components.
    [Show full text]
  • Strategic Communication in Tourism
    STRATEGIC COMMUNICATION IN TOURISM DEPARTMENT OF DESIGN AND COMMUNICATION CENTRE FOR TOURISM, INNOVATION AND CULTURE (TIC) Bodil Stilling Blichfeldt Strategic Communication in Tourism Background, conceptualizations, introduction to analysis and relations to sustainable tourism and tourism innovation TIC TALKS no. 5, September 2017 1 Author info Associate Professor, Ph.D. Bodil Stilling Blichfeldt, TIC and Department of Design and Communication, University of Southern Denmark. Email: [email protected] Place of publication TIC is University of Southern Denmark’s multidisciplinary research center in tourism, innovation and culture. The center is located at the Kolding campus. TIC strives to transform the university to an engaged, collaborative institution where academics and students pursue an unrelenting examination of knowledge, its sources and its uses. TIC defines the university as a center for higher order knowledge creation and for collaboration with, and for, society at large. We do this through research-based education, education-based research and collaborative engagement with society. We aim to charter new territory in international academe, as well as in multi-level collaboration based on interdisciplinary research with a strong foundation in the Humanities. TIC engages in research dialogues through both a traditional peer-review publication strategy and through involvement in securing free access to knowledge. Supplementing traditional journal articles, TIC TALKS is one of TIC’s contributions to open access sharing and collaborative development of knowledge. TIC TALKS are provided by Centre for Tourism, Innovation and Culture, University of Southern Denmark Universitetsparken 1, Kolding, DK-6000 http://www.sdu.dk/en/Om_SDU/Institutter_centre/C_Tik.aspx The present manuscript qualifies as unfinished work-in-progress and the reader should bear in mind that the manuscript is quite likely to contain a series of errors, flaws and weaknesses.
    [Show full text]
  • G45: Vol 1B: Graphics Core
    G45: Volume 1b: Graphics Core Intel® 965G Express Chipset Family, Intel® G35 Express Chipset Graphics Controller Programmer’s Reference Manual (PRM) January 2009 Revision 1.0a Document Number: 321392-001 You are free: to Share — to copy, distribute,display, and perform the work Under the following conditions: Attribution. You must attribute the work in the manner specified by the author or licensor (but not in any way that suggests that they endorse you or your use of the work). No Derivative Works. You may not alter, transform, or build upon this work. You are not obligated to provide Intel with comments or suggestions regarding this document. However, should you provide Intel with comments or suggestions for the modification, correction, improvement, or enhancement of: 9a) this document; or (b) Intel products, which may embody this document, you grant to Intel a non-exclusive, irrevocable, worldwide, royalty-free license, with the right to sublicense Intel’s licensees and customers, under Recipient intellectual property rights, to use and disclose such comments and suggestions in any manner Intel chooses and to display, perform, copy, make, have made, use, sell, and otherwise dispose of Intel’s and its sublicensee’s products embodying such comments and suggestions in any manner and via any media Intel chooses, without reference to the source. INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL® PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL’S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT.
    [Show full text]
  • Constructive Resistance
    Constructive Resistance Lilja_9781538146484.indb 1 12/19/2020 4:22:19 PM OPEN ACCESS The author is grateful to the Swedish Research Council (VR), which has provided funds for this study. This book publishes results from three different VR projects: (1) Reconciliatory Heritage: Reconstructing Heritage in a Time of Violent Fragmentations (2016-03212); (2) The Futures of Genders and Sexualities. Cultural Products, Transnational Spaces and Emerging Communities (2014-47034); and (3) A Study of Civic Resistance and Its Impact on Democracy (2017-00881).’ Lilja_9781538146484.indb 2 12/19/2020 4:22:19 PM Constructive Resistance Repetitions, Emotions, and Time Mona Lilja ROWMAN & LITTLEFIELD Lanham • Boulder • New York • London Lilja_9781538146484.indb 3 12/19/2020 4:22:19 PM Published by Rowman & Littlefield An imprint of The Rowman & Littlefield Publishing Group, Inc. 4501 Forbes Boulevard, Suite 200, Lanham, Maryland 20706 www .rowman .com 6 Tinworth Street, London SE11 5AL, United Kingdom Copyright © 2021 by Mona Lilja All photographs © Ola Kjelbye All rights reserved. No part of this book may be reproduced in any form or by any electronic or mechanical means, including information storage and retrieval systems, without written permission from the publisher, except by a reviewer who may quote passages in a review. British Library Cataloguing in Publication Information Available Library of Congress Control Number: 2020948897 ISBN 9781538146484 (cloth : alk. paper) | ISBN 9781538146491 (epub) ∞ ™ The paper used in this publication meets the minimum
    [Show full text]
  • The Surprising Instability of Export Specializations
    The Surprising Instability of Export Specializations By DIEGO DARUICH , WILLIAM EASTERLY AND ARIELL RESHEF * This version: June 5, 2018 Abstract: We study the instability of hyper-specialization of exports at the 4-digit level in 1998-2010. (1) Specializations are surprisingly un-stable. Export ranks are not persistent, and new top products and destinations replace old ones. Measurement error is unlikely to be the main or only determinant of this pattern. (2) Source-country factors are not the main explanation of this instability. Only 16-20% of variation in export growth is accounted for by source country factors (including comparative advantage). Overall, forces that do not involve the source country are more important than those that do. The high share of idiosyncratic variance (source-product-destination residual) of 41-55%, also indicates the difficulty to predict export success using source country characteristics. While we are cautious in interpreting factors that are jointly determined in global general equilibrium, our results suggest that destination and product effects importantly matter at least as much as source country factors. JEL classifications: F10, F13, F14, O10, O24, O25 Keywords: Power law, granularity, export growth, industrial policy * Diego Daruich, New York University, [email protected]; William Easterly, New York University and NBER, [email protected]; Ariell Reshef, Paris School of Economics, CNRS, and CEPII, [email protected]. We are grateful for comments from participants in the NYU Development Research Institute Conference “Beyond the Nation State,” from Xavier Gabaix, Ricardo Hausmann, and Dani Rodrik. Three anonymous referees and the Editor also provided comments that helped improve this paper.
    [Show full text]