duplicate proxy

duplicate proxy
A second proxy received on an account. If the second proxy bears a more recent date than the first proxy, and has a different voting pattern, the second proxy will override the first. Bloomberg Financial Dictionary

Financial and business terms. 2012.

Игры ⚽ Нужно сделать НИР?

Look at other dictionaries:

  • Duplicate Proxy — A secondary voting proxy that allows a shareholder to override an already submitted vote. When duplicate proxies are received by the corporation, the document with the most timely information will be taken into account. Issuing a duplicate proxy… …   Investment dictionary

  • Proxy pattern — Proxy in UML Proxy in …   Wikipedia

  • List of Ergo Proxy episodes — The following is a list of episodes for the Japanese anime series Ergo Proxy . List of episodesTrivia*Episode 1 begins with a quotation from Michelangelo s reply to Giovan Battista Strozzi s in the Medici Chapel. The opening sequence from Episode …   Wikipedia

  • 6LoWPAN — est l acronyme de IPv6 Low power Wireless Personal Area Networks[note 1] ou IPv6 LoW Power wireless Area Networks[note 2]. C est également le nom d un groupe de travail de l IETF. Le groupe 6LoWPAN a défini les mécanismes d encapsulation et de… …   Wikipédia en Français

  • Anti-spam techniques — To prevent e mail spam (aka unsolicited bulk email), both end users and administrators of e mail systems use various anti spam techniques. Some of these techniques have been embedded in products, services and software to ease the burden on users… …   Wikipedia

  • Autograph — ImageStackRight|275 An autograph is a document written entirely in the handwriting of its author, as opposed to a typeset document or one transcribed by an amanuensis or a copyist; the meaning overlaps with that of the word holograph. Autograph… …   Wikipedia

  • Diameter (protocol) — Internet protocol suite Application layer BGP DHCP DNS FTP HTTP …   Wikipedia

  • Information security audit — An information security audit is an audit on the level of information security in an organization. Within the broad scope of auditing information security there are multiple type of audits, multiple objectives for different audits, etc. Most… …   Wikipedia

  • Orcus (Dungeons & Dragons) — Orcus Game background Title(s) Prince of the Undead, Prince of Undeath, The Blood Lord Home plane Abyss Power level Demon lord Alignment …   Wikipedia

  • Anti-spam techniques (e-mail) — To prevent e mail spam, both end users and administrators of e mail systems use various anti spam techniques. Some of these techniques have been embedded in products, services and software to ease the burden on users and administrators. No one… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”