Make your own eBooks

Use our Remix App to mix & match content. In minutes make your own course packs, training bundles, custom travel guides, you name it. Even add your own title & cover.


Slices & Articles Get by the slice or add to your own ebook

Medium 9781931332897

Case Study C: Supply Chain Analysis

Kurt J. Engemann Rothstein Publishing ePub


Supply Chain Analysis

Supply Chain Analysis

Figure 3.1 in the Business Impact Analysis Chapter illustrated a typical supply chain for a manufacturing business. The business continuity planner can expand this supply chain model to document the manufacturing-related requirements and inventory levels available during the entire product development process. This type of analysis can actually be made for each individual product manufactured.

Manufacturing-related tasks are expressed in terms of the time required to complete the task. Inventory levels are also defined in terms of time – inventory time is equal to the time the next manufacturing-related task will take to process the inventory. For example, if the inventory level in Raw Materials is sufficient to produce ten units of product and Manufacturing can produce two units of product per hour, then there are five hours of Raw Materials inventory available. The entire supply chain manufacturing-related tasks and inventory levels are defined as follows:

See All Chapters
Medium 9781449374044

D. Available Commands with sx Tools

Andreas M. Antonopoulos O'Reilly Media ePub

Next, we look at some examples of using sx tools to experiment with keys and addresses.

Generate a new private key with the operating system’s random number generator by using the newkey command. We save the standard output into the file private_key:

Now, generate the public key from that private key using the pubkey command. Pass the private_key file into the standard input and save the standard output of the command into a new file public_key:

We can reformat the public_key as an address using the addr command. We pass the public_key into standard input:

The keys generated are so called type-0 nondeterministic keys. That means that each one is generated from a random number generator. The sx tools also support type-2 deterministic keys, where a “master” key is created and then extended to produce a chain or tree of subkeys.

First, we generate a “seed” that will be used as the basis to derive a chain of keys, compatible with the Electrum wallet and other similar implementations. We use the newseed command to produce a seed value:

See All Chapters
Medium 9781576750698

5. Avoid Time Wasters

Debra Dinnocenzo Berrett-Koehler Publishers PDF

Working Well in Your Home Office



Avoid Time Wasters

Being a advocate of telecommuting, you’re likely to appreciate the value of time and ways to utilize it efficiently. It’s likely you’ve already calculated the time you are or could be saving by telecommuting. Perhaps you’ve also identified all the things you can accomplish with the extra time telecommuting will provide. While thinking through all of this is helpful, beware of “activity creep”!

“Activity creep” is the slow emergence into your day of “stuff” that needs to get done but is not essential to achievement of your key daily goals. When you work in a traditional workplace, this “stuff” simply lingers in the back of your mind and is annoying. But when you telecommute from home, it’s very much an “in your face” kind of annoyance that results in the waste of that precious time you so much wanted to save.

Here are just a few distracters that, in excess, may be a drain on your time and ability to achieve results:

• Reading the newspaper

See All Chapters
Medium 9781449374044

2. How Bitcoin Works

Andreas M. Antonopoulos O'Reilly Media ePub

The bitcoin system, unlike traditional banking and payment systems, is based on de-centralized trust. Instead of a central trusted authority, in bitcoin, trust is achieved as an emergent property from the interactions of different participants in the bitcoin system. In this chapter, we will examine bitcoin from a high level by tracking a single transaction through the bitcoin system and watch as it becomes “trusted” and accepted by the bitcoin mechanism of distributed consensus and is finally recorded on the blockchain, the distributed ledger of all transactions.

Each example is based on an actual transaction made on the bitcoin network, simulating the interactions between the users (Joe, Alice, and Bob) by sending funds from one wallet to another. While tracking a transaction through the bitcoin network and blockchain, we will use a blockchain explorer site to visualize each step. A blockchain explorer is a web application that operates as a bitcoin search engine, in that it allows you to search for addresses, transactions, and blocks and see the relationships and flows between them.

See All Chapters
Medium 9781601322364

Redundancy + Reconfigurability = Recoverability

Hamid R. Arabnia, Leonidas Deligiannidis, Ashu M. G. Solo, Fernando G. Tinetti CSREA Press PDF

Int'l Conf. Computer Design | CDES'13 |


Redundancy + Reconfigurability = Recoverability

Simon Monkman1, and Igor Schagaev2

ITACS Ltd, 157 Shephall View, Stevenage, SG1 1RR, England


Faculty of Computing, London Metropolitan University, 166-220 Holloway Road, London, N7 8DB,



Abstract - An approach to consider computers and connected computer systems using structural, time and information redundancies is proposed. An application of redundancy for reconfigurability and recoverability of computer and connected computer systems is discussed, gaining performance, reliability and power-saving in operation. A paradigm of recoverability is introduced and, if followed, shifts connected computer systems toward real-time applications. Use of redundancy for connected computers is analysed in terms of recoverability, where two supportive algorithms of forward and backward tracing are proposed and explained. As an example, growth of mission reliability is formulated.

Keywords: redundancy; reconfigurability; recoverability; performance-reliability-energy-wise systems

See All Chapters

See All Slices