نتایج جستجو برای: saipa corporation

تعداد نتایج: 22520  

2011
Jinlong Zhao

In the acquisition of listed corporation, the controlling shareholders who either hold a certain number of shares, or play a decisive role in the transfer of corporation control. Compared with the minority shareholders, controlling shareholders often abuse its dominant position to harm other stakeholders' interests of the corporation. Imposing the fiduciary duties to the controlling shareholder...

  Background and Objectives: Petrochemical wastewater contains some kinds of toxic substances but if the effluent is treated properly, its reuse will be possible. This study aimed to evaluate the efficiency of wastewater treatment of Shazand Petrochemical Corporation and feasibility of its effluent reuse in green space irrigation and cooling towers. Materials and Methods: In this descrip...

2000
John D. Strunk Garth R. Goodson Michael L. Scheinholtz Craig A.N. Soules Gregory R. Ganger

Self-securing storage prevents intruders from undetectably tampering with or permanently deleting stored data. To accomplish this, self-securing storage devices internally audit all requests and keep all versions of all data for a window of time, regardless of the commands received from potentially compromised host operating systems. Within the window, system administrators are guaranteed to ha...

2015

RULE FORTY-THREE of the Federal Rules of Criminal Procedure1 provides that a defendant shall be present at every stage of his trial. A corporation, under this rule, "may appear by counsel for all purposes." Acting within the context of this rule, a federal district court has recently decided that it "must ... have power to appoint" an attorney to represent a summoned corporation that has defaul...

2015
John D. Strunk Garth R. Goodson Michael L. Scheinholtz Gregory R. Ganger Craig A.N. Soules

Self-securing storage prevents intruders from undetectably tampering with or permanently deleting stored data. To accomplish this, self-securing storage devices internally audit all requests and keep all versions of all data for a window of time, regardless of the commands received from potentially compromised host operating systems. Within the window, system administrators are guaranteed to ha...

2001

All product names referenced herein are trademarks or registered trademarks of their respective companies. Although F-Secure Corporation makes every effort to ensure that this information is accurate, F-Secure Corporation will not be liable for any errors or omission of facts contained herein. F-Secure Corporation reserves the right to modify specifications cited in this document without prior ...

2000
Mo Adam Mahmood Mark Dubrow Gary J. Mann

This instructional case, based on an actual firm’s experience (name changed), is intended to challenge student thinking with regard to the extent to which information technology (IT) can demonstrably contribute to organizational performance and productivity and to which users of IT can relate their investment decisions to measurable outcomes. Relationships between an organization’s investment i...

Journal: :Interfaces 2013
Karl G. Kempf Feryal Erhun Erik F. Hertzler Timothy R. Rosenberg Chen Peng

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید