Command Financial Specialist Training Student Manual

Total Page:16

File Type:pdf, Size:1020Kb

Command Financial Specialist Training Student Manual Command Financial Specialist Training Student Manual Marine & Family Programs – Resources Personal Financial Management Program Contents CHAPTER 1: Introduction to the Command Financial Specialist Training ..................................................................1.1 Purpose of the Training............................................................... 1.1 Overview of the Command Financial Specialist Training ............................. 1.2 Course Terminal Objectives .......................................................... 1.2 Financial Training Topics ............................................................ 1.2 CFS Task Areas ....................................................................... 1.3 Using of the Command Financial Specialist Student Manual .......................... 1.4 DAY ONE CHAPTER 2: Welcome and Administration .....................................2.1 Command Financial Specialist Data Card ............................................ 2.5 Command Financial Specialist Course Evaluation .................................... 2.7 Daily Homework ..................................................................... 2.9 CFS Course Agenda ................................................................. 2.10 Command Financial Specialist Pre/Post Test ......................................... 2.11 CHAPTER 3: The Need for PFM .....................................................3.1 Financial Problems and Concerns .................................................... 3.3 Financial Problems and Concerns .................................................... 3.4 Optional Video Review ............................................................... 3.5 OPNAV 1740.5B ...................................................................... 3.6 Brief the Bosses ...................................................................... 3.35 OPNAVINST 1740.5B Instruction Review .................................................................. 3.36 CHAPTER 4: Introduction to PFM and the Financial Planning Worksheet .............................................................................4.1 Financial Planning Pyramid .......................................................... 4.3 Financial Planning Worksheet ........................................................ 4.4 Sample Financial Planning Worksheet ............................................... 4.12 Budgeting Tip Sheet ................................................................. 4.18 Financial Planning Worksheet Checklist ............................................. 4.19 Women, Infants and Children ....................................................... 4.20 What Are My Options? .............................................................. 4.21 CHAPTER 5: Military Pay Issues ....................................................5.1 A Summary of Your Military Compensation .......................................... 5.3 Understanding Your LES ............................................................. 5.4 Military Pay Breakdown .............................................................. 5.6 Income Tax Withholding — Get It Right! .......................................................................... 5.7 IRS Withholding Tables .............................................................. 5.8 Activity: Income Case Studies ....................................................... 5.10 Monthly Income Sheets .............................................................. 5.11 Contents i CHAPTER 6: Introduction to Financial Counseling ..........................6.1 The Eight-Step Counseling Cycle ..................................................... 6.4 Financial Counseling Checklist ....................................................... 6.5 Your Financial Counseling Book...................................................... 6.6 Privacy Act Statement ................................................................ 6.7 Hierarchy of Concerns ................................................................ 6.8 Guide to Writing a Case Narrative .................................................... 6.9 How Do You Rate as a Money Manager .............................................. 6.10 Financial Values Clarification ........................................................ 6.11 DAY TWO CHAPTER 7: Practical Application Review/Record-keeping and Instructional Techniques .........................................................7.1 PFM Record-Keeping Organizer ...................................................... 7.3 Instructional Techniques for CFS Instructors ......................................... 7.5 Practically Perfect Presentations Checklist ........................................... 7.10 Instructional Techniques Critique Sheet ............................................. 7.11 CHAPTER 8: Consumer Awareness: Deter, Detect, Defend .............8.1 Sources of Help for Military Consumers .............................................. 8.6 CFA Predatory Lending Protections for Service Members ........................... 8.12 Deter-Detect-Defend Brochure ...................................................... 8.27 CHAPTER 9: Legal Issues of PFM ..................................................9.1 Reference Information: Domestic Relations, Contracts ............................... 9.3 Top Tips to Avoid Legal Tangles ...................................................... 9.4 Servicemembers Civil Relief Act, Simplified .......................................... 9.6 Reference Information: Credit Collection Laws ....................................... 9.9 Heading for Trouble? ................................................................ 9.10 CHAPTER 10: Financial Referral Resources ................................. 10.1 Navy-Marine Corps Relief Society Fact Sheet ........................................ 10.3 Fleet and Family Support Center Fact Sheet ......................................... 10.5 Exceptional Family Member Program Fact Sheet .................................... 10.6 TRICARE Fact Sheet ................................................................ 10.9 Making a Referral ................................................................. 10.13 Resources for the Savvy CFS ....................................................... 10.17 Governing Directives .............................................................. 10.20 Resource Case Studies ............................................................. 10.21 CHAPTER 11: Activity: Group Case Studies .............................................................. 11.1 Case Study One — Seaman John Smith .............................................. 11.2 Case Study Two — AT1 Cory Cloud ................................................. 11.4 Case Study Three — STS2 Patrick Dolphin ........................................... 11.6 Case Study Four — ET3 Adam Only Jr................................................ 11.8 Case Study Five — MMCS Monica Looney ......................................... 11.10 Case Study Six — HN Jane Start .................................................... 11.12 Case Study Presentation Guide .................................................... 11.14 ii Command Financial Specialist Training Student Manual DAY THREE CHAPTER 12: Credit Management............................................... 12.1 Empty Pockets/Wise Use of Credit ................................................... 12.4 Credit Conversations ................................................................ 12.5 Ten Things to Think About Before Getting a New Credit Card ..................... 12.21 How to Establish, Use, and Protect Your Credit .................................... 12.23 FTC Facts for Consumers ......................................................... 12.28 Credit — You Got It! Quiz ......................................................... 12.33 Summary of the Credit CARD Act of 2009 ........................................ 12.35 CHAPTER 13: Credit Reports and Scores ..................................... 13.1 Activity: Personal Credit Report Review ............................................ 13.2 What’s Worth Knowing? ............................................................. 13.3 Credit and Divorce .................................................................. 13.7 Moving Scores in the Right Direction ................................................ 13.8 CHAPTER 14: Debt Management ................................................ 14.1 Warning Signs of Credit Abuse ...................................................... 14.2 Implications of Financial Problems .................................................. 14.3 Collection Issues .................................................................... 14.4 Sample Letter to Collection Agency .................................................. 14.5 Developing an Action Plan .......................................................... 14.6 Sample Letter to Creditor From an Individual ....................................... 14.9 Sample Letter to Creditor From a CFS ............................................. 14.10 Debt Management in Practice ..................................................... 14.11 CHAPTER 15: The Two LOI’s: Letters of Indebtedness and Letters of Intent ........................ 15.1 Sample Letter of Indebtedness ....................................................... 15.4 Certificate of Compliance ............................................................ 15.5 Standards of Fairness ...............................................................
Recommended publications
  • List of New Applications Added in ARL #2603
    List of New Applications Added in ARL #2603 Application Name Publisher DataConnect 11.5 Actian Source Sans Pro 1.0 Adobe PDF Broker Process for Internet Explorer 21.1 Adobe Creative Suite CS6 Standard Adobe Collaboration Synchronizer 20.1 Adobe Collaboration Synchronizer 21.1 Adobe Connect 2020.12 Adobe AD Group Manager 1.1 Albus Bit AD Group Manager 1.2 Albus Bit Query Reporter 3.3 Allround Automations Monarch 13.0 Classic Altair Engineering IMAGEPro 1.1 AMETEK CrystalControl 2.1 AMETEK NekoHTML 1.9 Andy Clark Sherlock 6.2 Ansys Flash Banner Maker 1.0 Anvsoft Any Video Converter 5.5 Anvsoft TomeePlus 9.0 Apache Software Foundation Falcon 0.1 Apache Software Foundation JaxMe 0.5 Apache Software Foundation A-PDF Split A-PDF.com WealthTrack 9.0 Applied Systems Call Status Report 1.0 Aspect Software Inbound 7.3 Aspect Software CLIQ Web Manager 9.2 ASSA ABLOY CLIQ Web Manager 8.0 ASSA ABLOY Centerprise Data Integrator 7.6 Astera Software Bitbucket 2.0 Atlassian Jira Capture Chrome 1.0 Atlassian AudaEnterprise 4.0 Audatex Encode And Decode Files - Base64 1.0 Automation Anywhere Expert PDF 14.0 Avanquest Software ASG Plugin Avaya Discovery Tool 3.3 AvePoint DocAve 6.6 AvePoint DocAve 6.12 AvePoint DocAve 6.11 AvePoint DocAve 6.3 AvePoint DocAve 6.8 AvePoint DocAve 6.9 AvePoint FLY 4.5 AvePoint Wonderware Application Server Client 2020 AVEVA Group Cloud for Business On-Premises 2.0 Axure Software Solutions Automator 4.5 Axway Convene 5.8 Azeus Zulu 8.50 Azul Systems Zulu 11.35 Azul Systems Zulu 8.48 Azul Systems Zulu 15.28 Azul Systems Zulu
    [Show full text]
  • 2.00 Overview of the Certification
    CERTIFICATION POLICIES AND PROCEDURES TABLE OF CONTENTS SECTION: SUBJECT: EFFECTIVE DATE: 2.00 Overview of the Certification Procedure July 1, 1993 2.01 This P&P has been renamed P&P 7.60 and can be found in the Local Agency Operations and Management Section 2.02 Certification of Participants October 1, 1990 2.02A Manual Certification Form 2.03 Certification Waiting List January 31, 1992 2.04 Residency Requirements October 1, 1990 2.05 Income Eligibility Requirements July 24, 1995 2.05A Income Guidelines March 1, 1995 2.05B Types of Income 2.05C Collateral Verification March 1, 1993 2.05D Common Military pays/Allowances October 1, 2007 2.05E Chart of Common Allowances October 1, 2007 2.05F Has been removed 2.06 Family Size Determination October 1, 2003 2.07 This policy has been renamed P&P 2.33 2.08 This policy has been renamed P&P2.31 2.09 Processing Standards for Applications March 18, 1992 2.10 Certification, Mid-Certification, and Shortened October 1, 1990 Certification Periods 2.11 Notice of Ineligibility or Termination and the Right to a October 1, 1995 Fair Hearing 2.11A Ineligibility/Termination notice 2.11B Request for a Fair Hearing 2.11C Transmittal for Request to Appeal 2.12 Program Rights and Responsibilities October 1, 1990 2.12A Statement of Rights and Responsibilities 8/2018 Page 1 of 3 SECTION: SUBJECT: EFFECTIVE DATE: 2.13 Transferring Participants and the Use of the Verification October 1, 1995 of Certification Cards 2.13A Sample Verification of Certification 2.14 Eligibility of Aliens and Alien Students October 1,
    [Show full text]
  • Desktop and Laptop Option Quick Reference Guide
    1. Veritas™ Desktop and Laptop Option 9.6 Quick Reference Guide for DLO Installation and Configuration 23-Jun-21 Veritas Desktop and Laptop Option: Quick Reference Guide for DLO Installation and Configuration. The software described in this document is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Legal Notice Copyright (c) 2021 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks of Veritas Technologies LLC or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This Veritas product may contain third party software for which Veritas is required to provide attribution to the third party (“Third Party Programs”). Some of the Third Party Programs are available under open source or free software licenses. The License Agreement accompanying the Software does not alter any rights or obligations you may have under those open source or free software licenses. Please see the Third Party Legal Notice Appendix to this Documentation or TPIP ReadMe File accompanying this Veritas product for more information on the Third Party Programs. This Veritas product may contain open source and other third party materials that are subject to a separate license. Please see the applicable Third Party Notice at https://www.veritas.com/about/legal/license-agreements/. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Veritas Technologies LLC and its licensors, if any.
    [Show full text]
  • Scalable Speculative Parallelization on Commodity Clusters
    Scalable Speculative Parallelization on Commodity Clusters Hanjun Kim Arun Raman Feng Liu Jae W. Leey David I. August Departments of Electrical Engineering and Computer Science y Parakinetics Inc. Princeton University Princeton, USA Princeton, USA [email protected] {hanjunk, rarun, fengliu, august}@princeton.edu Abstract by the cluster is difficult. For these reasons, such programs have been deemed unsuitable for execution on clusters. While clusters of commodity servers and switches are the most popular form of large-scale parallel computers, many programs are Recent research has demonstrated that a combination of not easily parallelized for execution upon them. In particular, high pipeline parallelism (DSWP), thread-level speculation (TLS), inter-node communication cost and lack of globally shared memory and speculative pipeline parallelism (Spec-DSWP) can un- appear to make clusters suitable only for server applications with lock significant amounts of parallelism in general-purpose abundant task-level parallelism and scientific applications with regu- programs on shared memory systems [6, 24, 27, 29, 30, 32, lar and independent units of work. Clever use of pipeline parallelism (DSWP), thread-level speculation (TLS), and speculative pipeline 36, 37]. Pipeline parallelization techniques such as DSWP parallelism (Spec-DSWP) can mitigate the costs of inter-thread partition a loop in such a way that the critical path is executed communication on shared memory multicore machines. This paper in a thread-local fashion, with off-critical path data flowing presents Distributed Software Multi-threaded Transactional memory unidirectionally through the pipeline. The combination of these (DSMTX), a runtime system which makes these techniques applicable two factors makes the program execution highly insensitive to non-shared memory clusters, allowing them to efficiently address inter-node communication costs.
    [Show full text]
  • MICROCOMP Output File
    S. HRG. 108–241, PT. 6 DEPARTMENT OF DEFENSE AUTHORIZATION FOR APPROPRIATIONS FOR FISCAL YEAR 2004 HEARINGS BEFORE THE COMMITTEE ON ARMED SERVICES UNITED STATES SENATE ONE HUNDRED EIGHTH CONGRESS FIRST SESSION ON S. 1050 TO AUTHORIZE APPROPRIATIONS FOR FISCAL YEAR 2004 FOR MILITARY ACTIVITIES OF THE DEPARTMENT OF DEFENSE, FOR MILITARY CON- STRUCTION, AND FOR DEFENSE ACTIVITIES OF THE DEPARTMENT OF ENERGY, TO PRESCRIBE PERSONNEL STRENGTHS FOR SUCH FISCAL YEAR FOR THE ARMED FORCES, AND FOR OTHER PURPOSES PART 6 PERSONNEL MARCH 11, 19, 27, 2003 ( Printed for the use of the Committee on Armed Services VerDate 11-SEP-98 11:29 Aug 18, 2004 Jkt 000000 PO 00000 Frm 00001 Fmt 6011 Sfmt 6011 87328.CON SARMSER2 PsN: SARMSER2 DEPARTMENT OF DEFENSE AUTHORIZATION FOR APPROPRIATIONS FOR FISCAL YEAR 2004—Part 6 PERSONNEL VerDate 11-SEP-98 11:29 Aug 18, 2004 Jkt 000000 PO 00000 Frm 00002 Fmt 6019 Sfmt 6019 87328.CON SARMSER2 PsN: SARMSER2 S. HRG. 108–241, PT. 6 DEPARTMENT OF DEFENSE AUTHORIZATION FOR APPROPRIATIONS FOR FISCAL YEAR 2004 HEARINGS BEFORE THE COMMITTEE ON ARMED SERVICES UNITED STATES SENATE ONE HUNDRED EIGHTH CONGRESS FIRST SESSION ON S. 1050 TO AUTHORIZE APPROPRIATIONS FOR FISCAL YEAR 2004 FOR MILITARY ACTIVITIES OF THE DEPARTMENT OF DEFENSE, FOR MILITARY CON- STRUCTION, AND FOR DEFENSE ACTIVITIES OF THE DEPARTMENT OF ENERGY, TO PRESCRIBE PERSONNEL STRENGTHS FOR SUCH FISCAL YEAR FOR THE ARMED FORCES, AND FOR OTHER PURPOSES PART 6 PERSONNEL MARCH 11, 19, 27, 2003 ( Printed for the use of the Committee on Armed Services U.S. GOVERNMENT PRINTING OFFICE 87–328 PDF WASHINGTON : 2004 For sale by the Superintendent of Documents, U.S.
    [Show full text]
  • Symantec Web Security Service Policy Guide
    Web Security Service Policy Guide Revision: NOV.07.2020 Symantec Web Security Service/Page 2 Policy Guide/Page 3 Copyrights Broadcom, the pulse logo, Connecting everything, and Symantec are among the trademarks of Broadcom. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. Copyright © 2020 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. For more information, please visit www.broadcom.com. Broadcom reserves the right to make changes without further notice to any products or data herein to improve reliability, function, or design. Information furnished by Broadcom is believed to be accurate and reliable. However, Broadcom does not assume any liability arising out of the application or use of this information, nor the application or use of any product or circuit described herein, neither does it convey any license under its patent rights nor the rights of others. Policy Guide/Page 4 Symantec WSS Policy Guide The Symantec Web Security Service solutions provide real-time protection against web-borne threats. As a cloud-based product, the Web Security Service leverages Symantec's proven security technology, including the WebPulse™ cloud community. With extensive web application controls and detailed reporting features, IT administrators can use the Web Security Service to create and enforce granular policies that are applied to all covered users, including fixed locations and roaming users. If the WSS is the body, then the policy engine is the brain. While the WSS by default provides malware protection (blocks four categories: Phishing, Proxy Avoidance, Spyware Effects/Privacy Concerns, and Spyware/Malware Sources), the additional policy rules and options you create dictate exactly what content your employees can and cannot access—from global allows/denials to individual users at specific times from specific locations.
    [Show full text]
  • Veritas Enterprise Vault™ Administrator's Guide
    Veritas Enterprise Vault™ Administrator's Guide 12.1 Veritas Enterprise Vault: Administrator's Guide Last updated: 2017-07-28. Legal Notice Copyright © 2017 Veritas Technologies LLC. All rights reserved. Veritas, the Veritas Logo, Enterprise Vault, Compliance Accelerator, and Discovery Accelerator are trademarks or registered trademarks of Veritas Technologies LLC or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This product may contain third party software for which Veritas is required to provide attribution to the third party (“Third Party Programs”). Some of the Third Party Programs are available under open source or free software licenses. The License Agreement accompanying the Software does not alter any rights or obligations you may have under those open source or free software licenses. Refer to the third party legal notices document accompanying this Veritas product or available at: https://www.veritas.com/about/legal/license-agreements The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Veritas Technologies LLC and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. VERITAS TECHNOLOGIES LLC SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION.
    [Show full text]
  • Automated Malware Analysis Report for Ud-Win-X64.Exe
    ID: 197137 Sample Name: ud-win-x64.exe Cookbook: default.jbs Time: 21:35:52 Date: 18/12/2019 Version: 28.0.0 Lapis Lazuli Table of Contents Table of Contents 2 Analysis Report ud-win-x64.exe 5 Overview 5 General Information 5 Detection 5 Confidence 6 Classification 6 Analysis Advice 7 Mitre Att&ck Matrix 7 Signature Overview 8 AV Detection: 8 Spreading: 8 Networking: 8 System Summary: 8 Data Obfuscation: 9 Persistence and Installation Behavior: 9 Hooking and other Techniques for Hiding and Protection: 9 Malware Analysis System Evasion: 9 Anti Debugging: 10 HIPS / PFW / Operating System Protection Evasion: 10 Language, Device and Operating System Detection: 10 Malware Configuration 10 Behavior Graph 10 Simulations 11 Behavior and APIs 11 Antivirus, Machine Learning and Genetic Malware Detection 11 Initial Sample 11 Dropped Files 11 Unpacked PE Files 11 Domains 11 URLs 12 Yara Overview 12 Initial Sample 12 PCAP (Network Traffic) 12 Dropped Files 12 Memory Dumps 12 Unpacked PEs 12 Sigma Overview 12 Joe Sandbox View / Context 12 IPs 12 Domains 12 ASN 12 JA3 Fingerprints 13 Dropped Files 13 Screenshots 13 Thumbnails 13 Startup 14 Created / dropped Files 14 Domains and IPs 17 Contacted Domains 17 URLs from Memory and Binaries 18 Contacted IPs 18 Static File Info 18 General 18 File Icon 19 Static PE Info 19 General 19 Entrypoint Preview 19 Data Directories 21 Copyright Joe Security LLC 2019 Page 2 of 40 Sections 21 Resources 22 Imports 22 Version Infos 22 Possible Origin 22 Network Behavior 23 Code Manipulations 23 Statistics 23 Behavior 23 System
    [Show full text]
  • Supporting and Troubleshooting Windows 10 Course Outline
    10982-E: Supporting and Troubleshooting Windows 10 Course outline Module 1: Implementing a Troubleshooting Methodology This module describes the new Windows 10 operating system features and devices; it also describes the process of developing and applying a Windows 10 troubleshooting methodology. Lessons Overview of Windows 10 Introduction to the EDST Job Role Overview of the Troubleshooting Steps Troubleshooting Tools Lab : Using Troubleshooting Tools After completing this module, you will be able to: Describe the Windows 10 operating system, devices it supports, and the Windows 10 architecture. Explain the troubleshooting methodology for Windows 10. Describe Windows 10 troubleshooting tools Module 2: Troubleshooting Startup Issues This module describes how to identify and troubleshoot startup issues that affect— and problematic services that run on—a Windows 10 operating system. This module introduces potential problems that can cause startup issues in Windows 10. It also provides an overview of the Windows startup process, including the Windows Recovery Environment (Windows RE) and Boot Configuration Data (BCD). Lessons Overview of the Windows 10 Startup Recovery Environment Configuring the Registry Troubleshooting Startup Settings Recovering BitLocker-Protected Drives Lab : Troubleshooting Startup Issues Exploring Windows RE Resolving a Startup Issue Lab : Recovering BitLocker-Encrypted Drives Recovering a BitLocker-Encrypted Drive Creating a New BitLocker Password After completing this module, you will be able to:
    [Show full text]
  • Study of Z-Disc-Associated Signaling Networks in Skeletal Muscle Cells by Functional and Global Phosphoproteomics
    PHDTHESIS Study of Z-disc-associated Signaling Networks in Skeletal Muscle Cells by Functional and Global Phosphoproteomics Inaugural-Dissertation zur Erlangung der Doktorwürde der Fakultät für Biologie der Albert-Ludwigs-Universität Freiburg im Breisgau vorgelegt von Lena Reimann geboren in Bielefeld Freiburg im Breisgau 01.08.2016 Angefertigt am Institut für Biologie II AG Biochemie und Funktionelle Proteomforschung zellulärer Systeme unter der Leitung von Prof. Dr. Bettina Warscheid Dekan der Fakultät für Biologie: Prof. Dr. Wolfgang Driever Promotionsvorsitzender: Prof. Dr. Stefan Rotter Betreuer der Arbeit: Prof. Dr. Bettina Warscheid Referent: Prof. Dr. Bettina Warscheid Koreferent:Prof. Dr. Jörn Dengjel Drittprüfer: Prof. Dr. Gerald Radziwill Datum der mündlichen Prüfung:21.10.2016 ART IS I, science is we. - Claude Bernard Zusammenfassung Als essentielle, strukturgebende Komponente des Sarkomers spielt die Z-Scheibe eine maßge- liche Rolle für die Funktionalität der quergestreiften Muskulatur. Die stetige Identifizierung von neuen Z-Scheiben-lokalisierten Proteinen, sowie deren Relevanz in muskulären Krankheits- bildern, hat die Z-Scheibe zunehmend in den Fokus der aktuellen Forschung gerückt. Neben ihrer strukturgebenden Funktion zeigen neuere Studien, dass die Z-Scheibe ein Hotspot für Signalprozesse in Muskelzellen ist. Bisher gibt es jedoch keine globalen Untersuchungen zur Aufklärung der komplexen Signalwege assoziiert mit dieser Struktur. Um Z-Scheiben-assoziierte Signalprozesse näher zu charakterisieren, wurde im ersten Teil dieser Arbeit eine großangelegte Phosphoproteomstudie mit ausdifferenzierten, kon- trahierenden C2C12 Myotuben durchgeführt. Zu diesem Zweck wurden die tryptisch ver- dauten Proteine mittels SCX-Chromatographie fraktioniert. Die anschließende Phosphopep- tidanreicherung erfolgte mit Titandioxid, gefolgt von einer hochauflösenden massenspek- trometrischen Analyse. Insgesamt wurden 11.369 Phosphorylierungsstellen, darunter 586 in sarkomerischen Proteinen gefunden.
    [Show full text]
  • Comodo Loginpro Software Version 1.0
    Comodo LoginPro Software Version 1.0 User Guide Guide Version 1.0.102512 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Comodo LoginPro - User Guide Table of Contents 1.Introduction to Comodo LoginPro............................................................................................................................................ 3 1.1.System Requirements......................................................................................................................................................... 4 2.Quick Start Guide....................................................................................................................................................................... 4 2.1.Installing the LoginPro Client............................................................................................................................................... 4 2.2.Creating a LoginPro Account............................................................................................................................................... 7 2.3.Access Your Computers Using the Web Interface...............................................................................................................9 3.Web Interface: Sharing Files, Printers and Music.................................................................................................................12 3.1.Sharing Files Between Host and Remote Computers ......................................................................................................12
    [Show full text]
  • IDOL Connector Framework Server 12.0 Administration Guide
    Connector Framework Server Software Version 12.0 Administration Guide Document Release Date: June 2018 Software Release Date: June 2018 Administration Guide Legal notices Copyright notice © Copyright 2018 Micro Focus or one of its affiliates. The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. Trademark notices Adobe™ is a trademark of Adobe Systems Incorporated. Microsoft® and Windows® are U.S. registered trademarks of Microsoft Corporation. UNIX® is a registered trademark of The Open Group. Documentation updates The title page of this document contains the following identifying information: l Software Version number, which indicates the software version. l Document Release Date, which changes each time the document is updated. l Software Release Date, which indicates the release date of this version of the software. To verify you are using the most recent edition of a document, go to https://softwaresupport.softwaregrp.com/group/softwaresupport/search-result?doctype=online help. You will also receive new or updated editions of documentation if you subscribe to the appropriate product support service. Contact your Micro Focus sales representative for details. To check for new versions of software, go to https://www.hpe.com/software/entitlements. To check for recent software patches, go to https://softwaresupport.softwaregrp.com/patches. The sites listed in this section require you to sign in with a Software Passport.
    [Show full text]