ED203929.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

ED203929.Pdf DOCUMENT RESUME ED 203 929 810 373 AUTHOR Eaton, Judith S., Ed. TITLE women in Community Colleges. New Directions for Community Colleges, Number 34. INSTITUTION ERIC Clearinghouse for Junior Colleges, Los Angeles, Calif. SPONS AGENCY National Inst. of Education (DHEH), Washington, D.C. PEPORT NO ISBN-87589-812-2 PUB DATE 81 CONTRACT 400-78-0038 NOTE 1 10p. JOURNAL CIT New Directions for Community Colleges; v9 n2 Sum 1981 EDRS PRICE MF01/PC05 Plus Postage. DESCRIPTORS Administrator Characteristics: *Administrators; *College Faculty; College Presidents; *Community Colleges; *Females: Humanities: Literature Reviews; Nontraditional Occupations: Self Evaluation (Individuals): Sex Discrimination: Sex Stereotypes; Trustees: Two Year Colleges: Two Year College Students: Womens Education: Womens Studies ABSTRACT After introductory material by Judith S. Eaton discussing the challenges faced by women in positions of authority at community colleges, this monograph presents eight essays dealing with women in the community college movement. Emily Taylor discusses the backgrounds, attitudes, and characteristics of the small, but growing number of women presidents of community colleges and describes a prolect undertaken by the American Council on Education to identify talented women administrators. A. Rae Price documents the unequal status of women faculty members and suggests actions for improvement. Lloyd Averill argues that women will best be able to strengthen the humanities by affirming and employing the pDsitive, stereotypically feminine characteristics of the humanist. Carol Eliason examines the critical support role played by women's studies programs in meeting counseling, occupational, and educational needs. Emily B. Kirby examines the role of the community_ college in helping women overcome stereotvres which block them from non-traditional careers. Joyce A. Smith discusses the role of the trustee, the special responsibilities of women trustees, behaviors that contribute to a new member's success, and the selection of a college president. Linda L.Moore examines the special problems faced by women in management in both the public and private sectors and proposes a method of constructive self-analvsis. An EPIC literature review concludes the monograph. (JP) ****** * ***** ******* ** ******* ******* ******* ******** Reproductions supplied by EDRS are the best that can be made from the original document. ****************************** ********************** ******** ** 000 i1 unitycoilenin NEW DIRECTIONS FOR COMMUNITY COLLEGES A Quarterly Sourcebook Arthur M. Cohen, Editor in-Chief Florence B. Drawer, Associate Editor Spors,ored by the ERIC Clearinghouse for Junior Colleges Numbe _4 1981 Commity Colleges Judith S. Eaton Editor spy -Bass Inc., Publishers San _isco Vashinsuon London EOUCATIONAL RESOURCES INFORMATION FTTZIR *IC rInotiouso For Junior Cl !ogee el Nty ER'++TT Or C !FORMA, LOS A OAS WOMEN IN CON1N1UNITY C.( II1,(; . New 1)irectuor; frir (.ommunity Collet.ys Volume IX, Nuitil cr 2.I91i1 Judith S. Lawn, [Alum- Nkt, DIreetion+ fo r Community C (publicationntiniloirLISPS 121-71(1) ispublished quarnirlyby iiissey-!lass In., Puhlishers, in assn i,ttion vith he ERI(: Clearinghouse heir Junior Colleges. Subscriptions are available at the regular rate for institutions, libraries, and agent ies of- $30 for one year. hulk iduals iiiav subscribe at the special professional ram ofWI one year. N'en, Duretion3is inlinluired sequentially please order extra topics liv number. The volume and issue numbeis tibtwe are included Iris the oriveninte iii lihraries, Seeimd-class postage rates paidart San Francisco, California, and at addiiiiinal offices. The rmitcrial in this publiciltion wit. prepared pursuant itiat contract with the National Institute vii Education, U,S. Department of Health, Education, and Well are_ Contractors undertaking such projects under government sponsorship are encouraged to express freely their judgment in professional and iechnival matters. Prior to public:at:on, the manuscript vitas submitted to the Center For the Study of 1::onimunity Colleges for Critical review and determination of professional compekinue. This publication has met such standards. Points of view or opinions. however, do no/ necessarily represent the official view or opinions of the Center for the Study of Goomiunity Colleges of Me National Institute of Education, Correspondence: Substrip(imiN, single-issue orders, rhange or iokirry.snotitcs, undelivered topics, and other orrespondeni should be sentto New Dtreetiorri Subscriptions, Jossey-Bass Inc.. Publishers, 433 California Street. StillI rulciscti , California 9410. Editoria: ctirrespucneln mx should he sent to the Editor-in-Chicf, Arthur NE ft;iihen, at the ERIC Clearinghouse for Jnrltilr Colleges University of California, Los Angeles, California 90024. Library of CiingrNN (:aialiigiir Card Nitnibtir LC80-8426.1- International Standard Serial Norrilwr ISSN 01,14-3081 lifiernatkonal Slumlord ISBN /1751N812-2 (:over cicsign by Willi Alantilinrii in the tiniiticl Shift,. Anniri This anonSSW.:InTihireilV.1111 inniling Inuit tilt Natinital Et1{1(ii(1411Lt=-; .5.13C1):11A (1 niultir I ill IFir Ti.pOrt(10 OM tic( t-Nsarily t the poNitittir, In di( it NW air fllrll`. tints Editor's Notes Judith S. Eaton vii Women Community College Presidents Emily Taylor N., Rill. ctt EllyNrwmi.uy Inswonon ihNcx..(1,c1he community 1,ages. 200 percent gain in women presidents during the past live years. Illy men of the Faculty A. Rae Price 13 Jost as more Inale elementary wel hce-r are needed r Nerve models for boys and girls and to (ilitias:ow the parental, kiving, c aring qualities of males, Sc are more women needed at the college level to serve as role models to women and men at another crucial developmen- d periodwhen many .audents etr making impartani career chic isions that will alit them the rest ol Men. lo.es. How Can Women Influence Lloyd Ay-II 23 Humanities Education? Stereotypically feminine characteristics are of enormous value, especially In relation to the humanities. `i hey ha ,e m more oiten valued by mid kw women than otherwise. New Directions for Women's Studies Carol Eliason and Support Services To successfully meet the needs of the growing kinetic. aity of two- year college students, counselors and programmers must target their programs for special subpopulations of women. Petticoats to jackhammers: Emily B. Kirby 43 Strategies for Women in Occupational Education Mort than fourdifths of America's employed women _ere in pink (ser- vice), white (office), or blue (factory) collar work, their limited opportu- nity l'or economic and occupational mobility should make occupational education attractive tic them if community colleges meet the challenge. A View from the Board of Trustees Joyce A. Smith 55 The trustee who is rims' effective in advancing the interests of women is the woman who is most effective as a trustee. VI Women as Managers Linda L. Moore 67 Whether in the 1)0)1it sector or private torpnratinn, a balanced ana:.:sis of sell and system is essential Idr women in management. Sources of Information: Women in Donna Dzierlenga 79 the Community College Index 91 Editor's Notes Community colleges throughout the country are currently experienc- ing a major (and hitherto unprecedented) emphasis on community edu- cation. and development of "lifelong learnt ig." This trend follows years of successful coh,mitment to a transfer function (the junior college model), an occupational training function (the vocational school model), and a comprehensive community college function (which initi- ated the emphasis on community service). At the same time,higher education in general and community colleges in particular are serving more women than ever before and thus areinvolved in the complex social, political, economic, and intellectual changes that make up the women's movement. Community colleges, as the first step in higher education for many involved in this phenomenon, have a heavy respon- sibility for providing leadership to women making career decisions, changing their life-styles, and seeking economic stability. This respon- sibility extends to students, staff, and the community. Many women will encounter opportunity, create success or failure, and survive change through contact with community college faculty, administra- tors, and trustees. This sourcebook is intended to provide information about and analysis of the impact that the changing role of women in our societyis having on the community college movement. Although we realize that change is constant and comprehensive assessment is premature, we nonetheless need to pause and at least describe this significant move- ment of women, particularly as it influences educational process,pol- icy, philosophy, and result. We have turned to women faculty mem- bers, administrators, and trustees for assistance in identifying how our institutions can and will affect the lives, goal.and values of men and women. While women constitute a significant dimension of our profes- sional and community focus, little has been done thus far to assess corn- prehensively their present status and olans for the future. Given that the community college has been lauded primarily and appropriately as- "democracy's college," with a major emphasis on access for all inter- ested persons, our responsibility exten,',; even beyond our campuses to assistingindeed, leadingour communities in meaningful and worth- while social change. Our contributors have alerted us to the following essentials:
Recommended publications
  • Symantec Web Security Service Policy Guide
    Web Security Service Policy Guide Revision: NOV.07.2020 Symantec Web Security Service/Page 2 Policy Guide/Page 3 Copyrights Broadcom, the pulse logo, Connecting everything, and Symantec are among the trademarks of Broadcom. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. Copyright © 2020 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. For more information, please visit www.broadcom.com. Broadcom reserves the right to make changes without further notice to any products or data herein to improve reliability, function, or design. Information furnished by Broadcom is believed to be accurate and reliable. However, Broadcom does not assume any liability arising out of the application or use of this information, nor the application or use of any product or circuit described herein, neither does it convey any license under its patent rights nor the rights of others. Policy Guide/Page 4 Symantec WSS Policy Guide The Symantec Web Security Service solutions provide real-time protection against web-borne threats. As a cloud-based product, the Web Security Service leverages Symantec's proven security technology, including the WebPulse™ cloud community. With extensive web application controls and detailed reporting features, IT administrators can use the Web Security Service to create and enforce granular policies that are applied to all covered users, including fixed locations and roaming users. If the WSS is the body, then the policy engine is the brain. While the WSS by default provides malware protection (blocks four categories: Phishing, Proxy Avoidance, Spyware Effects/Privacy Concerns, and Spyware/Malware Sources), the additional policy rules and options you create dictate exactly what content your employees can and cannot access—from global allows/denials to individual users at specific times from specific locations.
    [Show full text]
  • Release Notes Micro Focus the Lawn 22-30 Old Bath Road Newbury, Berkshire RG14 1QN UK
    Micro Focus Visual COBOL 2.3 for ISVs Release Notes Micro Focus The Lawn 22-30 Old Bath Road Newbury, Berkshire RG14 1QN UK http://www.microfocus.com Copyright © Micro Focus 2009-2015. All rights reserved. MICRO FOCUS, the Micro Focus logo and Visual COBOL are trademarks or registered trademarks of Micro Focus IP Development Limited or its subsidiaries or affiliated companies in the United States, United Kingdom and other countries. All other marks are the property of their respective owners. 2015-11-09 ii Contents Micro Focus Visual COBOL 2.3 for ISVs Release Notes .................................5 System Requirements ........................................................................................6 System Requirements for Visual COBOL for Visual Studio ................................................ 6 Hardware Requirements .......................................................................................... 6 Operating Systems Supported ................................................................................. 6 Software Requirements ............................................................................................6 System Requirements for Visual COBOL for Eclipse (Windows) ........................................8 Hardware Requirements .......................................................................................... 8 Operating Systems Supported ................................................................................. 8 Software requirements ............................................................................................
    [Show full text]
  • Item 3F. LBR-2018-19-039 Joe Goode
    CITY AND COUNTY OF SAN FRANCISCO LONDON N. BREED, MAYOR OFFICE OF SMALL BUSINESS REGINA DICK-ENDRIZZI, DIRECTOR Legacy Business Registry Staff Report HEARING DATE JUNE 24, 2019 JOE GOODE PERFORMANCE GROUP Application No.: LBR-2018-19-039 Business Name: Joe Goode Performance Group Business Address: 499 Alabama Street, #150 District: District 9 Applicant: Adriana Marcial, Executive Director Nomination Date: February 7, 2019 Nominated By: Mayor London N. Breed Staff Contact: Richard Kurylo [email protected] BUSINESS DESCRIPTION Choreographer Joe Goode established Joe Goode Performance Group (JGPG) in 1986 with the mission of promoting understanding, compassion, and tolerance among people through the innovative use of dance and theater. JGPG is currently located at 401 Alabama Street in the Project Artaud building, an arts complex in San Francisco's Mission District. Over the past 32 years, JGPG has performed an annual Home Season in San Francisco at venues such as the old Footworks Studio, Cowell Center for Performing Arts, Yerba Buena Center for the Arts, and Z Space. JGPG has also produced site-specific and has offered dance and movement classes in various studios throughout the city since its inception. Before finding a permanent home in the Mission/Potrero Hill in 2011, JGPG acquired a loyal following due to its consistent annual Home Season presentations. JGPG has brought national and international attention to the San Francisco arts scene as the company by touring throughout the U.S. and in Canada, Europe, South America, the Middle East, and Africa. From the beginning, Goode's public stance as an out gay artist making work that sought to identify the commonality of all people helped to de-stigmatize issues of sexuality and gender identity and used the arts as a healing tool in face of the AIDS epidemic.
    [Show full text]
  • Archive and Compressed [Edit]
    Archive and compressed [edit] Main article: List of archive formats • .?Q? – files compressed by the SQ program • 7z – 7-Zip compressed file • AAC – Advanced Audio Coding • ace – ACE compressed file • ALZ – ALZip compressed file • APK – Applications installable on Android • AT3 – Sony's UMD Data compression • .bke – BackupEarth.com Data compression • ARC • ARJ – ARJ compressed file • BA – Scifer Archive (.ba), Scifer External Archive Type • big – Special file compression format used by Electronic Arts for compressing the data for many of EA's games • BIK (.bik) – Bink Video file. A video compression system developed by RAD Game Tools • BKF (.bkf) – Microsoft backup created by NTBACKUP.EXE • bzip2 – (.bz2) • bld - Skyscraper Simulator Building • c4 – JEDMICS image files, a DOD system • cab – Microsoft Cabinet • cals – JEDMICS image files, a DOD system • cpt/sea – Compact Pro (Macintosh) • DAA – Closed-format, Windows-only compressed disk image • deb – Debian Linux install package • DMG – an Apple compressed/encrypted format • DDZ – a file which can only be used by the "daydreamer engine" created by "fever-dreamer", a program similar to RAGS, it's mainly used to make somewhat short games. • DPE – Package of AVE documents made with Aquafadas digital publishing tools. • EEA – An encrypted CAB, ostensibly for protecting email attachments • .egg – Alzip Egg Edition compressed file • EGT (.egt) – EGT Universal Document also used to create compressed cabinet files replaces .ecab • ECAB (.ECAB, .ezip) – EGT Compressed Folder used in advanced systems to compress entire system folders, replaced by EGT Universal Document • ESS (.ess) – EGT SmartSense File, detects files compressed using the EGT compression system. • GHO (.gho, .ghs) – Norton Ghost • gzip (.gz) – Compressed file • IPG (.ipg) – Format in which Apple Inc.
    [Show full text]
  • Application Development Standards and Guidelines
    FLORIDA DEPARTMENT OF AGRICULTURE AND CONSUMER SERVICES APPLICATION DEVELOPMENT STANDARDS AND GUIDELINES VERSION 8.5 Creation Date: 04/21/2000 Last Updated: 07/12/2017 Application Development Standards TABLE OF CONTENTS ECTION 1: PURPOSE ......................................................................................................................... - 4 - SECTION 2: SCOPE ............................................................................................................................ - 4 - SECTION 3: CHANGE PROCEDURES FOR THE APPLICATION DEVELOPMENT STANDARDS ........................................................................................................................................ - 5 - SECTION 4: SECURITY ...................................................................................................................... - 5 - SECTION 4.1: NETWORK USER ACCOUNT ACCESS TYPES ...................................................................... - 6 - SECTION 4.2: ORACLE DATABASE LOGINS AND SECURITY .................................................................. - 7 - SECTION 4.3: MICROSOFT ACCESS SECURITY ........................................................................................ - 12 - SECTION 4.5: PASSWORDS ........................................................................................................................... - 13 - SECTION 5: 60-8.001 FLORIDA ACCESSIBLE AND ELECTRONIC INFORMATION TECHNOLOGY RULE ......................................................................................................................
    [Show full text]
  • French (12.86Mb)
    NATIONS UNIES UNEP/MED WG.482/18 PROGRAMME DES NATIONS UNIES POUR L’ENVIRONNEMENT PLAN D’ACTION POUR LA MÉDITERRANÉE 2 novembre 2020 Français Original : anglais Réunions intégrées des groupes de correspondance de l'approche écosystémique sur la mise en œuvre de l’IMAP (CORMONs) Vidéoconférence, 1-3 décembre 2020 Point 5 de l’ordre du jour : Sessions CORMON parallèles (Pollution et déchets marins, et Biodiversité et pêche) Directives/Protocoles de contrôle concernant la préparation et l’analyse des échantillons des échantillons des produits de la mer pour l’indicateur commun 20 de l’IMAP : métaux lourds, éléments traces et polluants organiques Pour des raisons environnementales et économiques, le tirage du présent document a été restreint. Les participants sont priés d’apporter leur copie à la réunion et de ne pas demander de copies supplémentaires. PNUE/PAM Athènes, 2020 Table des matières 1 Introduction .................................................................................................................................... 1 2 Note technique pour l'analyse des échantillons de tissus de poissons et de fruits de mer pour la recherche de métaux lourds ...................................................................................................................... 3 Protocole pour la digestion des tissus du biote à l'aide d'acide nitrique ............................................... 6 Protocole pour l’analyse des métaux lourds à l'aide de la AAS ........................................................... 7 Protocole pour
    [Show full text]
  • Technicalmemorandum79710 Spatial Land-Use Inventory, Modeling, And
    00000001 TechnicalMemorandum79710 Spatial Land-Use Inventory, Modeling, and ProJeotlonl Denver Metropolitan Area, with Inputs from Existing Maps, Alrphotos, and Landeat Imagery Craig Tom, Lee D. Miller and Jenold W. Chrleteneon (NASJt--TM-?9710) SPAT]:&;, I&lIC-OS_ IWVEII_0BTw _'/9-18_22 MODEII_G, AND PROJECTION/_tWV_B BETI_OPOLI'raN _REae WITH _rNP_Ts FROn EXISTING M_PSe alBP_IOTOSe aND _IIDSA'_ IRaGEBY (W,lSA) 215 p Onclas H(. AIO/BF A01 CSCL uSS G3/43 1_3q,3 AUGUST 1978 ....................... NationalAerOnauticsand SpaceAdministration GoddsrdSpat,aRightCenter Greenbelt, Maryland20771 _ " _....'° ° _" " ..... 00000001-""'""'_-o,_uo ..... _,,_,4.i_ _ - _ : _ _ .... :..... _,,, ,-,, r' : ..... "" .............. _..- .... _'_ ;. _ SPAI'IAL LANIbLISI': INVI;NI'O'RY. MOI)FI IN(;. AND I'Rt)JFI'I'ION/I)F'NVFR MFI'ROI'I:)LI'rAN ARFA. WH'II INPirI'S FROM I'XISTIN(; ltlAl,_i. AIR'PIIOFOS. AND LANI)SAT IMA(;FRY C. Ton! (A_hwado._lale [lnivCrsily Forl Collins, (\dorado _0.¢_.1 I. I). Milk'r Texas A & M [InivCrsity (_,lh:ge ,_lalioll, "_'¢'._aS77_40 alld I. W. Chrislenson Goddard Space Flight Center (;r¢¢rrb'elt.Mad'Rind 20:_71 August. to78. NATIONAL AFRONAUTICS AND SPACF AI)MINISFRATION 00000001-TSA04 rhis document makes u,_ of international metric units according to the Systenle hll:ernational d'Llnites (SI). In certain ca_'s, utility requires the rCtel)tion of other systems of units in addition to tht"Si units. The conven- tional units .stated in parenthL',_s following the computer SI equivalents are lhe basis of tl)e nlea_rements and cah:ulations reported. Throughout tlzis doculnent, conventional units of in_asur¢, wllich are cus- tonlary for land-u,_" l_lanuillg, ar¢ u_'d in the figures"and tables and tlleir _-,iptiOllS, 3 .......
    [Show full text]
  • Transcriptome Analysis of the Uterus of Hens Laying Eggs Differing in Cuticle Deposition
    Edinburgh Research Explorer Transcriptome analysis of the uterus of hens laying eggs differing in cuticle deposition Citation for published version: Poyatos Pertinez, S, Wilson, P, Icken, W, Cavero, D, Bain, MM, Jones , AC & Dunn, I 2020, 'Transcriptome analysis of the uterus of hens laying eggs differing in cuticle deposition', BMC Genomics. https://doi.org/10.1186/s12864-020-06882-7 Digital Object Identifier (DOI): 10.1186/s12864-020-06882-7 Link: Link to publication record in Edinburgh Research Explorer Document Version: Publisher's PDF, also known as Version of record Published In: BMC Genomics Publisher Rights Statement: Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder ... General rights Copyright for the publications made accessible via the Edinburgh Research Explorer is retained by the author(s) and / or other copyright owners and it is a condition of accessing these publications that users recognise and abide by the legal requirements associated with these rights.
    [Show full text]
  • Oracle Access Management Bundle Patch Readme OAM Bundle Patch 12.2.1.4.200629 Generic for All Server Platforms F32731-01 July 2020
    Oracle® Fusion Middleware Oracle Access Management Bundle Patch Readme OAM Bundle Patch 12.2.1.4.200629 Generic for all Server Platforms F32731-01 July 2020 Oracle Access Management Bundle Patch Readme This document describes OAM Bundle Patch 12.2.1.4.200629. This document requires a base installation of Oracle Access Management 12c Patch Set 4 (12.2.1.4.0). This supersedes the documentation that accompanies Oracle Access Management 12c Patch Set 4 (12.2.1.4.0), it contains the following sections: • New Features and Enhancements in OAM Bundle Patch 12.2.1.4.200629 • New Features and Enhancements in OAM Bundle Patch 12.2.1.4.200327 • Understanding Bundle Patches • Recommendations • Bundle Patch Requirements • Applying the Bundle Patch • Removing the Bundle Patch • Resolved Issues • Known Issues and Workarounds New Features and Enhancements in OAM Bundle Patch 12.2.1.4.200629 Oracle Access Management 12.2.1.4.200629 BP includes the following new features and enhancements: • Support for SameSite=None Attribute in OAM Cookies OAM adds SameSite=None attribute to all the cookies set by WebGate and OAM Server. 1 Note: – You must also download and upgrade to the latest WebGate Patch for this feature to work. For details, see the note Support for SameSite Attribute in Webgate (Doc ID 2687940.1) at https://support.oracle.com. – See also the note Oracle Access Manager (OAM): Impact Of SameSite Attribute Semantics (Doc ID 2634852.1) at https://support.oracle.com. Optional Configurations on OAM Server – If SSL/TLS is terminated on Load Balancer (LBR) and OAM server is not running in SSL/TLS mode, set the following system property in setDomainEnv.sh: -Doam.samesite.flag.value=None;secure Alternatively, you can propagate SSL/TLS context from the LBR or Web Tier to OAM Server.
    [Show full text]
  • Bogog00000000000000
    US 20190236273A1 ( 19) United States (12 ) Patent Application Publication (10 ) Pub. No. : US 2019 /0236273 A1 SAXE et al. (43 ) Pub. Date : Aug. 1 , 2019 ( 54 ) METHODS AND APPARATUS FOR GO6N 3 /04 (2006 .01 ) DETECTION OF MALICIOUS DOCUMENTS G06K 9 /62 (2006 .01 ) USING MACHINE LEARNING (52 ) U .S . CI. CPC .. G06F 21/ 563 ( 2013 .01 ) ; GO6N 20 / 20 (71 ) Applicant: Sophos Limited , Abingdon (GB ) (2019 .01 ) ; G06K 9 /6256 ( 2013 .01 ) ; G06K ( 72 ) Inventors: Joshua Daniel SAXE , Los Angeles, 9 /6267 ( 2013 .01 ) ; G06N 3 / 04 ( 2013 .01 ) CA (US ) ; Ethan M . RUDD , Colorado Springs , CO (US ) ; Richard HARANG , (57 ) ABSTRACT Alexandria , VA (US ) An apparatus for detecting malicious files includes a memory and a processor communicatively coupled to the ( 73 ) Assignee : Sophos Limited , Abingdon (GB ) memory. The processor receives multiple potentially mali cious files. A first potentially malicious file has a first file ( 21) Appl . No. : 16 /257 , 749 format , and a second potentially malicious file has a second file format different than the first file format. The processor ( 22 ) Filed : Jan . 25 , 2019 extracts a first set of strings from the first potentially malicious file , and extracts a second set of strings from the Related U . S . Application Data second potentially malicious file . First and second feature (60 ) Provisional application No . 62/ 622 ,440 , filed on Jan . vectors are defined based on lengths of each string from the 26 , 2018 . associated set of strings . The processor provides the first feature vector as an input to a machine learning model to Publication Classification produce a maliciousness classification of the first potentially (51 ) Int.
    [Show full text]
  • Standards Presentation to California Occupational Safety and Health Standards Board
    STANDARDS PRESENTATION TO CALIFORNIA OCCUPATIONAL SAFETY AND HEALTH STANDARDS BOARD Petition to add new Title 8 Section related to Musculoskeletal Injury Prevention through the use of Ergonomic Disposable Large Capacity Poly Bags with Secondary Handle Application prepared by Mark Sale on June 1st 2017 Contact email [email protected] Ph. 808 557-7600 Table of Contents 1. Petition to add new Title 8 Section related to Musculoskeletal Injury Prevention through the use of Ergonomic Disposable Large Capacity Poly Bags with Secondary Handle. 2. Report following pilot study at Stanford Hospital and Clinics performed by Dr. Georgi Popov and economist Elyce Biddle Evaluation of Benefits of Litelift Ergonomic Bags. 3. Excerpt from Risk Assessment: A Practical Guide to Assessing Operational Risks, by Dr. Georgi Popov and Elyce Biddle. 4. Comparison of traditional bag vs. two-handled bags per NiOSH Lifting Guidelines. 5. Excerpts from case summaries taken from search results in www.dir. ca.gov for trashbag injuries (see also linen bag injuries, dumpster injury, recycle injury). 6. Ergonomic of Study of Custodial, Housekeeping and Environmental Service Positions at the University of California, May 2011. 7. Prevention through Design (PtD): Combining Risk Assessment, Productivity and Sustainability, Drs. Popov and Ney, University of Central Missouri. Continuing documentation; Automative Waste Collection - How to Make Sure It Makes Sense for Your Community, a related work resulting in the implementation of automated waste collection. 8. Bureau of Labor Statistics show janitors (those most likely tobe tasked with carrying trash bags) are at the highest risk of injury and days away from work. 9. CAL/OSHA DIR descriptions of "Safe Lifting and Carrying" 1.
    [Show full text]
  • Data ONTAP® 8.2 Commands: Manual Page Reference for 7-Mode, Volume 1
    Updated for 8.2.2 Data ONTAP® 8.2 Commands: Manual Page Reference For 7-Mode, Volume 1 NetApp, Inc. Telephone: +1 (408) 822-6000 Part number: 215-08872_B0 495 East Java Drive Fax: +1 (408) 822-4501 June 2014 Sunnyvale, CA 94089 Support telephone: +1 (888) 463-8277 U.S. Web: www.netapp.com Feedback: [email protected] Table of Contents ...................... 1 About the Data ONTAP Commands: Manual Page Reference, Volume 1 .3.... Manual Pages by Section in This Volume and Complete Index of Both Volumes .5.. acpadmin ................... 18 aggr ..................... 20 arp ..................... 41 autosupport ................... 43 autosupport_destinations .4............... 6 autosupport_history .4................ 7 autosupport_manifest .5................ 1 autosupport_trigger .5................ 5 awa ..................... 59 backup .................... 62 bmc ..................... 64 bootfs .................... 66 cdpd ..................... 67 cf ..................... 70 charmap .................... 73 cifs ..................... 75 cifs_access ................... 77 cifs_adupdate .................. 79 cifs_audit ................... 80 cifs_branchcache .................. 81 cifs_broadcast .................. 83 cifs_changefilerpwd .8................ 4 cifs_comment .................. 85 cifs_domaininfo .................. 86 cifs_help .................... 88 cifs_homedir ................... 89 cifs_lookup ................... 90 cifs_nbalias ................... 91 cifs_prefdc ................... 92 cifs_resetdc ................... 94 cifs_restart
    [Show full text]