GMR INFRASTRUCTURE LTD FACT BOOK Q1FY2014 0 Business Structure GMR has been presented with the prestigious ‘Most Admired Infrastructure Company – Overall’ at the 5th KPMG Infrastructure Today Awards 2012-13 in association with KPMG Delhi Airport (PAX Cap. 60 mn‚ FY13 Traffic 34.37 mn) Airports Hyderabad Airport (PAX Cap. 12 mn‚ FY13 Traffic 8.38 mn) Istanbul Sabiha Gokçen Airport (PAX Cap. 25 mn‚ FY13 Traffic 15.34 mn) Generation Assets in Operation: 836 MW‚ 6 Assets
Premium Coal Coal mining
Introduction Infrastructures are basic essential services that should be put in place to enable development to occur. Socio-economic development can be facilitated and accelerated by the presence of social and economic infrastructures. If these facilities and services are not in place‚ development will be very difficult and in fact can be likened to a very scarce commodity that can only be secured at a very high price and cost. Nigeria Public
Premium Management Learning German language
Amaba‚ Erma M. 4:30 – 5:30 MWF AB-Psychology 2 Ms. Emelie Capuras Villaceran Computer Science 1K 1.Password Security Password strength is a measure of the effectiveness of a password in resisting guessing and brute-force attacks. In its usual form‚ it estimates how many trials an attacker who does not have direct access to the password would need‚ on average
Premium Computer Password Computer security
Week Six News Article Summaries Trisha Eisele‚ Sharelle Fleming‚ Pauline Paul‚ Julie Pollock‚ Joshua Sawdey QRB/501 September 16‚ 2013 Kumer Das Week Six News Article Summaries Post Lehman Brothers Stock Market Crash Discussion In 2006‚ Brothers David and Tom Gardner started a community database to help consumers choose stocks. Developing the concept of longer-term investments over extended periods‚ versus the forecast method based on timing and risk. Motley Fool‚ the name
Premium Dow Jones Industrial Average Wall Street Crash of 1929 Investment
ePayment Security ECOM 6016 Electronic Payment Systems • Keep financial data secret from unauthorized parties (privacy) – CRYPTOGRAPHY Lecture 3 ePayment Security • Verify that messages have not been altered in transit (integrity) – HASH FUNCTIONS • Prove that a party engaged in a transaction ( (nonrepudiation) ) – DIGITAL SIGNATURES • Verify identity of users (authentication) – PASSWORDS‚ DIGITAL CERTIFICATES THE UNIVERSITY OF HONG KONG FEB/MAR 2012 © 2012 MICHAEL I. SHAMOS
Free Cryptography RSA
1 PROJECT ON CUSTOMER RELATIONSHIP MANAGEMENT WITH RELIGARE SECURITIES LTD (REGIONAL OFFICE‚ BMCC ROAD‚ PUNE) TABLE OF CONTENTS Chapter 1. Rationale of the Study. Chapter 2. Objectives of the study. Title of the project Objective of the study Scope of the study Chapter 3. Profile of the company. Chapter 4. Review of Literature. Chapter 5. Research Methodology Research Design Data Collection Methods / Sources Sampling Plan which should include sampling unit‚ sampling size and sampling
Premium Customer relationship management Customer service
1. Growth of the GDP: The annual growth of the Bulgarians’ GDP was around +2.1% in 2006 (Source: Eurostat) and the Romanian’s GDP’s growth is +4.1% (Source: Eurostat). The trend is an increase of the GDPs’ growth in this country since 2000 until 2006. After a devastating crisis in 1997‚ Bulgarians’ governments did a lot of reforms (trade liberalization‚ social reform‚ divestiture of state-owned companies‚…) in order to improve the productivity‚ the foreign and local investors confidence. Moreover
Premium European Union Inflation
BUS105 1 BUS105: Unit 5 Individual Project Monte E. Thorne BUS105-0904A-40 BUS105 2 Abstract BUSINESS TECHNOLOGY MANAGEMENT is a management science that seeks to unify business and technology decision-making at every level in an enterprise. BTM delivers a set of guiding principles‚ known as capabilities. These capabilities are combined to form BTM solutions‚ around which a company’s practices can be organized and improved. BTM builds bridges between previously isolated tools and
Premium Management Strategic management Marketing
This assignment consists of two (2) sections: an infrastructure document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. . The infrastructure which encompasses the network solution and security considerations is a major consideration for your company. Considering that the company will be expanding from one (1) floor to three (3) floors
Premium Microsoft Office Project management Microsoft
Assignment 2: Critical Infrastructure Protection Eustace LangleyCIS 502 May-23-2013 Facilitator: Dr. Gideon U. Nwatu Strayer University Critical Infrastructure Protection Introduction The Presidential Policy Directive (PPD) on Critical Infrastructure Security and Resilience advances a national unity of effort to strengthen and maintain secure‚ functioning‚ and resilient critical infrastructure (The White House Office of the Press Secretary‚ February 2013). It is imperative for every nation
Premium United States Department of Homeland Security Security National security