Standardize Baseline

In: Other Topics

Submitted By ratnanawang
Words 1267
Pages 6
Standardized Baseline Development Support
Alexandra Soezer MDG Carbon

Regional Training for Asia, Pacific and Eastern Europe, 2 September 2013

1

Outline

• Activities globally;
• Technical/financial support needs; • Support/funding; • Support challenges; • SBs and NAMAs;

2

Standardized Baseline support activities
Supporter IGES Sector Energy use in the rice mill sector Supply side energy efficiency Country/Region Cambodia Status Initial assessment successfully concluded Capacity development for incorporation of SB into NMMs or PoAs Road map study Concept stage Not yet started

IGES

Mongolia

ADB UNDP MDG Carbon Global Environment Center Foundation

Cook stoves Agricultural sector Not yet defined

Solomon Islands Asia-Pacific Not yet defined

UNDP LED

Grid Emission Factor

Uzbekistan

Initial assessment successfully concluded

3

Standardized Baseline support activities
Supporter ACAD/UNEP Riso Sector Grid Emission Factor for the Southern African Power Pool Country/Region Botswana, DRC, Lesotho, Mozambique, Namibia, South Africa, Swaziland, Zambia, Zimbabwe Uganda Status Approved

Green Resources

Charcoal (fuel switch, technology switch, methane destruction) Clinker production in the cement sector Positive List for electricity generation from landfill gas and methane destruction factor

Approved

Ethane Biofuels/Ethiopia UNFCCC/RCCs (Africa/LAC)

Ethiopia West- and EastAfrica/Caribbean and Latin America

Initial assessment QA on initial submissions/concept stage

4

Standardized Baseline support activities
Supporter KfW/UNFCCC RCC, Lomé Sector Replication of the charcoal SB (with methane avoidance component) WAPP GEF SB GEF SB Country/Region West Africa Status Scope is being determined

ACAD/UNEP Riso UNFCCC RCC Lomé /St. George's

West Africa Cape Verde, Guinea Bissau, Sao Tome and Principe + 16…...

Similar Documents

Security and Baselines

...Security and Baselines When dealing with security and baselines, you will always want to consider your security logs as a kind of timeline for when security events and baseline anomalies occur. The security log can provide such details as the time bandwidth use began to skyrocket, indicating a possible brute-force attack, transfer of large amounts of data, or other type of undue network activity. The security log may also provide you with a glimpse of how an attack occurred, such as logging the ports accessed, failed password attempts, systems and files accessed at any given time, etc. When dealing with security breaches, it’s always best to keep ahead of the game, and know what you would do to better prevent or mitigate damage from such a breach. For instance, if the employees use laptops in the field during the course of their day, there is always a chance that laptop may be lost, stolen, or hacked. If the information on the laptop is not encrypted, you may be leaving valuable company data at the hands of whoever winds up with the laptop. An easy, affordable way to limit access to your company’s data would be to encrypt the hard drive of the laptop, as well as any storage devices plugged into the laptop, and any data transmitted to or from the laptop. What if one of your employees has been browsing the internet, even when they feel they were being discrete with their browsing, and their computer wound up infected with a virus? This virus could, unbeknownst to the...

Words: 544 - Pages: 3

Multiple Baselines Across Behaviors

...Mutiple Baseline Across Behaviors The case study I have chosen is Mrs. Davis, which used a multiple baseline across behavior design. Steve has a number of behavior issues that interfere with his and his classmates learning. One of the weaknesses in multiple baseline across behavior design is being able to attaining functional similarity and independence among the target behavior. Especially trying to establish functional similarity before intervention. The problem I see with the design is the uncertainty of the intervention having a carryover effect from the first behavior change to the second and then to the third. Establishing functional similarity and independence among target behaviors may not be easy. There are many variables that can impact internal validity some of those are history, maturation, testing effects, and instrumentation to name a few. The time to be concerned with internal validity is in the design phase when careful consideration needs to be used when which variable will be observed and recorded and this is the time to identify any rival behaviors because after he intervention is ran it is too late. Other behavior issues could surface with Steve and he may transfer his behavior to another setting that would affect external validity. Sometimes when increasing internal validity it may decrease external validity. Uncontrolled variability can be reduced only if you identify its sources. The first step in identifying these uncontrolled variables......

Words: 630 - Pages: 3

Self Employed

...Obtaining Baselines The Alterrain IT Department does little server monitoring because most if its resources have beenspent upgrading servers and network equipment as well responding to user needs. You recommendstarting the Computer Reliability initiative by developing a plan for gathering baseline performancedata on each server. Prepare a report or slide presentation for the IT director that describes the baselinedata you would gather.  Answer: Obtaining baseline data is a good starting point for achieving reliability goals. This can be a valuable source of information so that the company has a better way to track growth, prevent problems before they occur, and address problems after they occur. The types of baselines that Alterrain should look at developing include: Overall data about the following server elements: CPU performance  Disk performance  Memory performance  Hardware peripheral performance  I/O performance  System file caching   Number of users  Proportion of users that use specific resources Software application performance   Network performance at the servers  Performance information about slow, average, and peak usage periods  Performance information about new software after it is installed  Statistics regarding growth in use of the server in terms of increases in users, increases insoftware use and duration of the use, increases in the amount of time users are on the systems The company should consider keeping the......

Words: 1293 - Pages: 6

What Is a Baseline for Network Behavior

...know your system you are observing on a daily basis is essential. Doing so you develop a kind of sixth sense to when things are going wrong. If you are always observing when things are going right you will better understand when things are not doing what they are supposed to do. This is also known as a baseline, or something you can refer to when you think there may be an intrusion or malfunction. When you’re more comfortable with a baseline, and how your system operates then it is easier to spot what professionals call anomalies. These are things that force your system to not run properly or maybe be able to look at the system files, causing security issues. Some of these things are worth taking note over, and some are not. It is necessary to look into all anomalies, and these can be detected by a Network Behavior Anomaly Detector. These types of programs allow you to use real time packet analysis to find different types of security threats. Discovering different security threats and patterns can prove to come in handy. By utilizing traffic pattern packet analyzers, you can find anomalies that are in your baseline traffic. Becoming more comfortable with how your baseline operates will give you clues to when an intrusion is occurring. The more you see these intrusions or attacks on your network you will be able to identify them quicker. Now when you are a victim of an attack, as a system administrator you need to know where to start looking. Log files are the best......

Words: 396 - Pages: 2

Baseline Proposal

...Index 1. Introduction 1.1 Purpose of the System 1.2 Scope of the System 1.3 Objectives and Success Criteria of the Project 1.4 Definitions, Acronyms, and Abbreviations 1.5 References 1.6 Overview 2 Current System 3 Proposed System 3.1 Overview 3.2 Functional Requirements 3.2.1 A list of functional requirements and brief description of each 3.2.2Classes of Input, output, error Messages and Description of Report 3.3 Nonfunctional Requirements 3.3.1 Constraints 3.3.2 Quality of attributes 3.3.3 Benefits 3.3.4 Intangible 3.4 System Models 3.4.1 Scenarios 3.4.2 Use Case Model 3.4.3 Activity Diagrams 3.4.4 Class Diagram 3.4.5 Sequence Diagram 4 Acceptance criteria: describe how you will test the system and with which methods 5 Documentation 6 Glossary 1. Introduction 1.1 Purpose of the system Nowadays, people become interest in health more than ever. Not only the youth, but also elders spend more free time on exercise. Because of everybody realize that exercise makes you healthy and cure the disease. Moreover, fat people choose working out instead of using diabetic medicine because of disadvantages from using medicine such as yoyo effect. BMI: Body Mass Index is ratio between the body weight and height. The value shows us how healthy we are. If the value less than 18.5, you are skinny. If the value is between 18.5 and 24.9, your weight is normal. If the......

Words: 3043 - Pages: 13

Sustainable Livelihood

...Rationale and Justification of the baseline survey The emergence of the HIV epidemic is one of the biggest public health challenges the world has ever seen in recent history. In the last three decades, HIV has spread rapidly and affected all sectors of society-young people and adults, men and women, and the rich and the poor. Sub Saharan Africa is the epicenter of the epidemic and continues to carry the full brunt of its health and socio-economic impact. Ethiopia has made significant strides in health care delivery and mitigation of the impacts of HIV & AIDS. Service coverage has remarkably expanded with sharp increase in health care facilities and training and deployment of health extension workers. This demonstrates that with commitment, clear policies and innovative strategies success in improving healthcare is feasible in low and middle-income settings. The sustained high-level commitment including the increase in allocation of national health budget has made significant improvements in basic healthcare. The number of health facilities and work force has steadily grown in the last two decades, increasing coverage and use of healthcare. There were tremendous efforts made to standardize the service delivered to those under different forms of care and support including OVC support. Recently Ethiopia developed a service delivery guideline for the support of PLWHA and affected families including OVC. This guideline is expected to standardize the haphazard modes......

Words: 1006 - Pages: 5

Time Phase Baseline, Gantt Chart & Project Schedulling

...PORTFOLIO MANAGEMENT 641 ASSIGNMENT 2 NIGEL, Student ID: xxxxx Submission Date: 25th July 2014 Time-Phase Baseline, Gantt Chart and Project Scheduling Contents 1. Why is it critical to develop a time-phased baseline for a planning project and managing its performance? ..................................................................................................................................................... 3 2. 3. How does a Gantt Chart Differ from a Project Network Diagram? .......................................................... 5 Techniques to Compress and Adjust a Project Schedule........................................................................... 7 Reference List.................................................................................................................................................... 9 Page 2 of 10 1. Why is it critical to develop a time-phased baseline for a planning project and managing its performance? Time phased baseline is the distribution of activities, tasks, milestones, and resources over an appropriate time scale for the scheduled completion of a plan, program, or project. A time-phased baseline is critical for planning a project because it allows the project team to visually examine the project from a time sequence and cost (Larson and Gray 2011, 459). The phase-baseline begins with the breakdown of individual activities or tasks. This is condensed or group into a Work Breakdown......

Words: 2070 - Pages: 9

Concussionmangement

...The second goal is to expedite recovery to sports and normal activities and the third goal is to decrease the athletic program’s risk and accountability. To address the need to establish operative concussion management in sports, ten systematic steps and commitments will be discussed (Lovell, Giola 14). Saunders 2 The first step relates to pre-injury knowledge and preparation. This is a basic understanding of the injury, its evaluation and treatment. The second step addresses the pre-season baseline testing. Base Line testing by properly trained professionals should be conducted for neuropsychological function, postural stability/ balance and pre-injury symptoms to serve as comparison with post-injury evaluation. Obtaining baseline symptom reports from parents is recommended for young athletes (Reimann, Guskiewiez 280-297, Giola 14). The third step deals with the responsible person identified for this role, ideally a certified athletic trainer (ATC) or, if unavailable, a trained alternative (e.g., parent or assistant coach). There are useful reference materials to assist recognition of signs/symptoms (e.g., CDC Coaches/ Physician’s Toolkit sideline concussion cards) (CDC “Concussion in Youth Sports”, Giola 14). The fourth step talks to early on-field/ sideline identification. Once a concussion is suspected, a protocol must be......

Words: 1242 - Pages: 5

Olympic 2012 Programme Baseline Report

...Learning legacy Lessons learned from the London 2012 Games construction project Programme Baseline Report Champion Products are examples of tools and formats used by the Olympic Delivery Authority (ODA) in executing its programme. The ODA is publishing these as part of its Learning Legacy in the anticipation that they may be of use to future projects seeking best practice examples of tools and templates that have been used successfully on a large, complex programme. Purpose of the document, description and how it was used The purpose of the Programme Baseline Report was to provide a comprehensive summary of the ODA’s Olympic Programme, detailing scope, programme, budget and risk against which performance could be measured both internally and externally. The scope defined in the report includes all works required regarding site platform and infrastructure, venues, transport, and legacy transformation. This document was used to present a comprehensive statement of the scope of works required and the necessary budget for delivery. Once the document was agreed at the commencement of the programme, delivery of the works was monitored against the baseline and change could be managed robustly. Olympic Delivery Authority Programme Baseline Report Summary November 2007 report The report was updated in 2009 reflecting the status of the programme two years after the original report and after substantial completion of the ODA’s......

Words: 37339 - Pages: 150

Urban Agriculture Baseline and Market Survey Proposal

...URBAN AGRICULTURE BASELINE AND MARKET SURVEY PROPOSAL Prepared for Farm Africa By Charles Karani; Email: karani.char@gmail.com Table of Contents STATEMENT OF INTERPRETATION OF TERMS OF REFERENCE 3 PROPOSED METHODOLOGY 4 Survey approach 4 Data 4 Proposed sample size 5 Sampling methods 7 Data collection and proposed survey tools 8 Data analysis 8 WORK SCHEDULE 9 DETAILED PLAN OF ACTIVITIES 9 STATEMENT OF INTERPRETATION OF TERMS OF REFERENCE The project’s implementing organization (Farm Africa) seeks to ascertain the situation of urban agriculture in Dagoretti district, Nairobi City County as a basis of understanding its current contribution and potential in reduction of extreme poverty and food insecurity among households. In this respect, the survey is geared towards the development of an intervention model as an avenue for the integration of urban agriculture with other livelihood enhancing components such as healthcare, access to clean water, environment, protection and social education and creation of income generating activities. The data generated from survey will be a yardstick in informing entry points for interventions and subsequent assessments of the project as well as a basis of understanding the likely environmental impact resulting from the project implementation. The survey intends to map the players participating in the enhancement of urban agriculture including but not limited to households and schools, the market, state and non state actors. On...

Words: 2783 - Pages: 12

Mt 400 Unit 8 Assignment: Establishing Baselines and Assessing Success

...MT 400 Unit 8 Assignment: Establishing Baselines and Assessing Success http://homeworklance.com/downloads/mt-400-unit-8-assignment-establishing-baselines-assessing-success/ Unit 8 Assignment: Establishing Baselines and Assessing Success In this Assignment, you are going to evaluate a specific business process based on criteria detailed below. If you already have selected a business process, continue using that and skip to the next paragraph. If you have not yet selected the business process you will use for these Assignments, then begin by selecting one. Email your instructor and clearly describe the objective of this process, the participants, and the strategic significance for the company. The business process you select must have a clear beginning and an end, with identifiable, specific steps. Your instructor will confirm that the process you selected is suitable or will ask you to select another one. For this Assignment, write a paper that answers the following questions (use the subheadings/numbered questions below to organize your paper): Part 1: Implementation Strategies Evaluate the suitability of the four implementation strategies discussed in step 2 for your project. ● For each strategy, explain the specific pros and cons of using it for your project. The analysis should be based on how each strategy applies to the process you selected and the nature of your selected organization. Do not simply repeat the generic pros/cons from the book. ●......

Words: 955 - Pages: 4

Mt 400 Unit 8 Assignment Establishing Baselines and Assessing Success

...IT 273 Project Assessment 2 Click Link Below To Buy: http://hwcampus.com/shop/273-project-assessment-2/ This component of the Course Assessment consists of a 2–3 page Project that assesses the following learning outcome: IT273-2: Differentiate between the various types of network media, TCP/IP core protocols, and IPv4 addressing schemes typically used in a networked environment. Once you start the Assessment, you will have 1 week to complete the Project. You must submit your Project to the Dropbox within the specified time. When you are ready to submit it, go to the Dropbox and complete the steps below, or download the directions here: http://extmedia.kaplan.edu/global/DropboxGuide_s.pdf: Click the link that says “Submit an Assignment.” In the “Submit to Basket” menu, select “Essay.” Click the “Add Attachments” button. Follow the steps listed to attach your Word documents. Use the following convention to name your Project: IT273‐Outcome2‐LastName‐ FirstName, where your own name is typed (example: IT273‐Outcome2‐Edison‐Thomas). Submit the completed document as an attachment to the basket. Make sure that you save a copy of your submitted Project. When you are finished, select “Submit for Grade.” Please notify Academic Advising when your Project is submitted and ready for grading. A Kaplan University faculty member will grade the Project within 48 hours and notify your advisor of your grade. A score of 80% or better is required to pass this portion of the...

Words: 486 - Pages: 2

Schedule Management Plan

...1 Introduction 1.1 Scope The scope of this procedure is to describe the process of producing project plans for the Project. This includes both tender plans and project plans as well as plans for collection of modifications. Further the planning process includes: • Establishment and updating of project planning • Progress monitoring and reporting • Re-planning & Re-baselining 1.2 Objective The objectives for this procedure are to ensure: A common understanding of the planning process and the ability of the planning tool Flexibility, scalability and adaptability of the planning process in order to be able to satisfy both the Customer’s requirements and the internal needs • Standardize the planning process • Standardize planning inputs and outputs • That all project participants are aware of the planning requirements 2 Responsibility There are several responsible parts in the process of planning and measuring projects. 2.1 Project Manager The PM is responsible for the planning, monitoring, regular review and updates in order to establish the required work activities, budget, durations/dates and relationships between the activities of the overall plan. This particularly refers to the relationships between and across multiple CTR’s. PM is also responsible for ensuring that all project participants are familiar with the relevant part of the planning procedure. 2.2 CTR Lead The CTR Lead is responsible for the planning, monitoring, regular review and...

Words: 2131 - Pages: 9

Baseline Fetal Heart

...Baseline fetal heart rate is the average fetal heart rate (FHR) rounded to increments of 5 beats per minute during a 10-minute segment, excluding periodic or episodic changes, periods of marked variability, or baseline segments that differ by more than 25 beats per minute. * In any given 10-minute window, the minimum baseline duration must be at least 2 minutes, or else the baseline is considered indeterminate. In cases where the baseline is indeterminate, the previous 10-minute window should be reviewed and utilized in order to determine the baseline. * A normal FHR baseline rate ranges from 110 to 160 beats per minute. If the baseline FHR is less than 110 beats per minute, it is termed bradycardia. If the baseline FHR is more than 160 beats per minute, it is termed tachycardia. * Baseline FHR variability is based on visual assessment and excludes sinusoidal patterns. Variability is defined as fluctuations in the FHR baseline of 2 cycles per minute or greater, with irregular amplitude and inconstant frequency. These fluctuations are visually quantitated as the amplitude of the peak to trough in beats per minute Baseline Fetal Heart Rate Variability Fluctuation Classification Undetectable Absent Undetectable to ≤ 5 beats/min Minimal 6 to 25 beats/min Moderate > 25 beats/min Marked Baseline Fetal Heart Rate Variability Fluctuation Classification Sinusoidal pattern differs from variability in that it demonstrates a smooth, sine wave-like pattern of......

Words: 1016 - Pages: 5

Identify Types of Security Events and Baseline Anomalies That Might Indicate Suspicious Activity.

...Identify types of security events and baseline anomalies that might indicate suspicious activity. Different traffic patterns can be a red flag when it comes to identifying different types of suspicious activities. There are multiple ways traffic can change to point out the activities: A sudden increase in overall traffic. This may just mean that your web site has been mentioned on a popular news site, or it may mean that someone is up to no good. A sudden jump in the number of bad or malformed packets. Some routers collect packet-level statistics; you can also use a software network scanner like Observer or Network Monitor to track them. Large numbers of packets caught by your router or firewall's egress filters. Recall that egress filters prevent spoofed packets from leaving your network, so if your filter is catching them you need to identify their source, because that's a clear sign that machines on your network has been compromised. Unscheduled reboots of server machines may sometimes indicate their compromise. You should be already be watching the event logs of your servers for failed logons and other security-related events. What do log files help you learn that filtering systems overlook? Log Files contain complete records of all security events (logon events, resource access, attempted violations of policy, changes in system configuration or policies) and critical system events (service/daemon start/stop, errors generated, system warnings) that can......

Words: 393 - Pages: 2