Former Formula 1 designer unveils new electric car

Monday, November 9, 2009

Former Formula One McLaren designer Gordon Murray has unveiled a new all-electric car.

The car model, which is known as the T.27, is due to be developed over the course of the next 16 months with four prototypes. The process that will be used during the course of the manufacturing of the vehicle is called iStream. The technology iStream had been invented by Gordon Murray in 1999 and means that all the parts are designed using a computer.

The project has approximately received £9,000,000 (US$14,919,000) in investment. The electric car is designed for urban purposes, such as in cities or towns. The weight of the vehicle is just 600 kilograms. It has the ability to travel at speeds of up to 60 miles per hour and can go for a maximum of 100 miles between recharges.

The designer thinks that motorists will some day be travelling in vehicles like this. Murray believes that the new car will be ‘the most efficient electric vehicle on earth’.

Retrieved from “https://en.wikinews.org/w/index.php?title=Former_Formula_1_designer_unveils_new_electric_car&oldid=1985507”

Risk Management For Banks And Financial Institutions

By Nick Nikolis

Risk management is the analysis of risk coupled with the implementation of quality risk controls. Risk management is needed for banks and financial institutions, mainly because it insures a margin of safety that guarantees a levered financial firm’s solvency.

The unpredictability and inherent risks associated with the financial markets makes it vital for financial institutions and banks to implement risk management controls. The level of quality risk management policy and controls can make or break (literally) banks or financial institutions.

The term “risk management” has evolved over the past twenty years from the term “insurance management”. This evolved term covers a wider variety of responsibilities than insurance management ever did.

Financial risk management products, derivatives and other such contracts that help hedge and protect the downside, include interest rate swaps, foreign exchange swaps and contracts, as well as a plethora of derivative securities. There are dozens of types of risk management related derivative products, the most popular of them Credit Default Swaps.

The most important part of risk management is the transferring of risk. A bank or a financial institution can protect itself from the potential risks and pitfalls of its asset portfolio by purchasing some Credit Default Swaps.

Credit Default Swaps, the most popular kind of derivative, are derivative swaps that transfer exposure to fixed income assets (bonds, mortgages, loans) from the purchaser to the seller of said derivative.

[youtube]http://www.youtube.com/watch?v=58f3yseAlEw[/youtube]

Credit Default Swaps are more or less an insurance policy taken out by a creditor that pays out if the borrower defaults. The underwriter of the swap, in return for agreeing to assume the risk of the underlying asset, receives a stream of premium payments (premiums like the ones received by insurance companies).

Credit Default Swaps are the most popular form of Credit Derivative, derivative products that protect creditors against systemic risks in both the market and in the borrower.

Risk management related credit derivative products such as Credit Default Swaps, albeit good hedges for risk, are truly double edged swords, if coupled with wanton speculation and overleveraging.

In recent years risk management products such as credit derivatives have evolved into vehicles of speculation, instruments used by financial firms and institutions to make speculative and sometimes irresponsible bets on market movements.

Lack of regulation, coupled with poor understanding of complex and Byzantine instruments, led to the credit derivative market degenerate into, to put it bluntly, a Wall Street casino.

The downturn in the housing markets has led this derivative house of cards (no pun intended) to collapse upon itself, leading to insolvency and systemic failure. Credit default swaps, however are a zero sum game. Some financial institutions have profited from correct bearish housing market bets.

If risk management products were used responsibly by banks and financial institutions, instead of used to make levered bets, the whole financial calamity could have been minimized. It is quite ironic that systems put into place to reduce risks ending up being the root of exacerbated risk.

Once the damages of the financial crash are cleaned up and settled, proper risk management can again be put into place. The need for regulation, however, is an issue up for debate.

There are too many arguments for and against regulation of credit derivative markets for there to be a concrete solution to the credit derivative problem.

There is simply too much nuance in the moral, social and financial ramifications of credit derivative rules, regulation and policy; in no way is the credit default swap debate a black or white issue.

As long as banks and financial institutions use credit derivative products such as credit default swaps for hedging purposes only, the integrity of the risk management instruments will stay in place.

The whole concept of risk management for banks and financial institutions is nullified by improper and risky speculative activities. Risk management, if done in a proper and responsible way, can effectively mitigate systemic and market risks, risks that are both inherent in today’s global financial marketplace.

For risk management to truly be risk management there should be zero tolerance for rampant, irresponsible speculation. The last thing a bank or a financial institution needs to do is exacerbate its risks by mixing gambling (speculation) with risk management.

About the Author: Nick Nikolis is living and working in Rhodos Greece and writing about Self help, Business, Hospitality Industry and destinations. Check here Rhodes Greece villas and Rhodes Greece apartments.

Source: isnare.com

Permanent Link: isnare.com/?aid=365070&ca=Finances

Spy drones to be launched over the UK skies

Monday, May 21, 2007

Police in the United Kingdom are now testing the use of “spy drones” in the skies over the country in a bid to stop criminal activity.

The drone will be equipped with cameras linked to CCTV, and will be only one meter in width and will weigh 2 to 3 pounds. The camera will be able to take images of the surrounding area as far away as 500 meters and at an altitude of almost 2,000 feet. It is powered by batteries and is reported to look much like a “miniature helicopter.”

The operator views the output via a head mounted display and uses this to control the aircraft.

“It is a cost-effective way to deal with situations where you have to deploy a lot of officers,” said a Merseyside Police Force spokeswoman, Louise Burton.

The drone was originally built for military use.

Retrieved from “https://en.wikinews.org/w/index.php?title=Spy_drones_to_be_launched_over_the_UK_skies&oldid=724735”

Edmund White on writing, incest, life and Larry Kramer

Thursday, November 8, 2007

What you are about to read is an American life as lived by renowned author Edmund White. His life has been a crossroads, the fulcrum of high-brow Classicism and low-brow Brett Easton Ellisism. It is not for the faint. He has been the toast of the literary elite in New York, London and Paris, befriending artistic luminaries such as Salman Rushdie and Sir Ian McKellen while writing about a family where he was jealous his sister was having sex with his father as he fought off his mother’s amorous pursuit.

The fact is, Edmund White exists. His life exists. To the casual reader, they may find it disquieting that someone like his father existed in 1950’s America and that White’s work is the progeny of his intimate effort to understand his own experience.

Wikinews reporter David Shankbone understood that an interview with Edmund White, who is professor of creative writing at Princeton University, who wrote the seminal biography of Jean Genet, and who no longer can keep track of how many sex partners he has encountered, meant nothing would be off limits. Nothing was. Late in the interview they were joined by his partner Michael Caroll, who discussed White’s enduring feud with influential writer and activist Larry Kramer.

Retrieved from “https://en.wikinews.org/w/index.php?title=Edmund_White_on_writing,_incest,_life_and_Larry_Kramer&oldid=4520289”

Cyber Security And Milli Micro System

Cyber Security and Milli micro system

by

armaandas23

Cyber Security

Even if the terms cybercrime, cyber terrorism, internet surveillance, cyber-attack, cyber threat, cyber fraud, refer to a virtual world, make no mistake about the concrete, real world threats that they pose: the loss of money via the net destruction and diversion of data and information.

Security is cyclical but much has changed in five years.Five years ago, the most dominant threat was attack via email. Today, threats can infiltrate systems and steal or corrupt data in an alarming number of ways.

Cyber security means finding and plugging up security vulnerabilities that exist

within companies. In the case of financial transactions and information, cyber security must also meet various legal regulations that protect against damage.Cyber security solutions must be constantly vigilant and must watch over all day-to-day operations.

More and more companies are using social media to grow their business and better meet the needs of their customers. To achieve this, new positions are being created to fill the strategies of virtual communications. The responsibilities and challenges of individuals involved in these positions are numerous. These individuals are encountering new tasks, duties, tactics and pitfalls that are not covered by traditionalcyber security solutions.These individuals need cyber security solutions that adapt quickly and work well under pressure while dealing with multiple files simultaneously.

Our Services

Given the need for specialization in each sector, Milli Micro Systems has developed best-practice cyber security industry solutions.

Cyber security for organizations: Complete solutions for government, public and private organizations. Development and implementation of master plans for safety. Operational procedures for Office of Security. Managed security (SOC) implementations for infrastructure and cyber security solutions. Consulting, auditing, and training

Critical infrastructure cyber security: Protection of systems and networks that operate critical infrastructure. Development and implementation of cyber security plans for control systems

Our Capabilities

Milli Micro Systems offers expert advice, andinnovative and reliable strategies and services.

To align our services with your company scyber security business objectives, we carry a full suite of evaluation mechanisms thatavoid unnecessary expenses.

Milli Micro Systems offers:

Physical security for the company

Logically and physically secure information systems

General provisions relating to all information systems

Government and corporate service providers and nomads

Advice on the legal aspects of security

Minimization ofICT system vulnerabilities

[youtube]http://www.youtube.com/watch?v=agwaDkUXq5I[/youtube]

Protectionof information assets

Assurance of business continuity

Why Milli Micro Systems?

Milli Micro Systems cyber security solutions offer:

Strategic advice on the safe delivery of next-generation services

Overall security architecture

Design of network security zones

Design, supply and implementation of security solutions

Training and awareness programs on security issues

Assessments of threats, risks, vulnerabilities, protecting private information, compliance and accreditation

Information Assurance

Organizations today cannot afford a single security incident that disables the proper functioning of processes and operations for days, sometimes weeks. Information security should not be reduced to a set of technical measures established according to the availability of human and financial resources. Information security is necessary for the survival of the company and therefore should be taken into constant consideration while making decisions, and analyzing the profitability of investments.

Today companies face increasing risks and uncertainties from a wide variety of sources that can significantly damage information systems and can threaten business continuity.

Under these circumstances it is imperative that companies evaluate the risks and establish appropriate strategies and controls to ensure permanent protection and safeguarding of information.

Effective management of information security can guarantee:

Your confidentiality, ensuring that only those authorized can access the information.

Integrity, ensuring that information and processing methods are accurate and complete

Availability, ensuring that authorized users have access to information and associated assets whenever needed

Our Services

Milli Micro Systems makes available to its clients the knowledge and technological capabilities for managing all the information needs of the organization. MMS solutions and integrated security services offer personalization, experience with recognized security certification, and specialized research and development security solutions for systems and information technology.

In the field of information security, Milli Micro Systems develops its activities based on international standards. The services available to customers to meet their needs for advice on information security are grouped by the following index:

System implementation information and security management

Management system models

Policy framework models

Internal audits

Training programs and awareness

Review and improvement of the management system

Comprehensive security consulting

Government audit and implementation of IT

Quality audits of telecommunications services

Evaluation, development, implementation and maintenance of Information Security Management Systems (ISMS), in accordance with ISO 27001

Consulting and implementation of ISO 20000, ISO 38500 and ITIL

Audits and implementation of information systems, using the CobiT model

Audit of compliance with the Data Protection Act

Audit of compliance with web accessibility standards

Security analysis

We determine the integrity, availability and confidentiality of information managed by the organization in order to clearly identify the currently exposed security holes that are exploitable by hackers and computer viruses which can gain unauthorized access, steal information, plunder bank accounts, and so on, and design the necessary controls to mitigate these vulnerabilities.

Consultancy

We provide support in achieving certification and adoption of standards and practices in information security:

Safety Management Information System

Cobit

ITIL

ISO Standards

Improvement plans

We design and implement plans to improve security of information, appropriate to the objectives and needs of the organization in a PDCA process approach.

Security Consulting

MMS can assist in the design and implementation of:

Corporate safety plans

Security policies

Risk analysis

Business continuity plans

Forensic analysis

Secure corporate networks

Perimeter security solutions

Authentication systems

Antivirus policies

Digital certification solutions

Backup policies

Advice in the event of incidents and disasters

Implementation of dashboards

For more information Please visit:—

Cyber Security ,Milli micro system

Article Source:

ArticleRich.com

Sweden’s Crown Princess marries long-time boyfriend

Monday, June 21, 2010

Sweden’s first royal wedding since 1976 took place Saturday when Crown Princess Victoria, 32, married her long-time boyfriend and former personal trainer, Daniel Westling, 36. The ceremony took place at Stockholm Cathedral.

Over 1,200 guests, including many rulers, politicians, royals and other dignitaries from across the world, attended the wedding, which cost an estimated 20 million Swedish kronor. Victoria wore a wedding dress with five-metre long train designed by Pär Engsheden. She wore the same crown that her mother, Queen Silvia, wore on her wedding day 34 years previously, also on June 19. Victoria’s father, King Carl XVI Gustaf, walked Victoria down the aisle, which was deemed untraditional by many. In Sweden, the bride and groom usually walk down the aisle together, emphasising the country’s views on equality. Victoria met with Daniel half-way to the altar, where they exchanged brief kisses, and, to the sounds of the wedding march, made their way to the the silver altar. She was followed by ten bridesmaids. The couple both had tears in their eyes as they said their vows, and apart from fumbling when they exchanged rings, the ceremony went smoothly.

Following the ceremony, the couple headed a fast-paced procession through central Stockholm on a horse-drawn carriage, flanked by police and security. Up to 500,000 people are thought to have lined the streets. They then boarded the Vasaorden, the same royal barge Victoria’s parents used in their wedding, and traveled through Stockholm’s waters, accompanied by flyover of 18 fighter jets near the end of the procession. A wedding banquet followed in the in the Hall of State of the Royal Palace.

Controversy has surrounded the engagement and wedding between the Crown Princess and Westling, a “commoner”. Victoria met Westling as she was recovering from bulemia in 2002. He owned a chain of gymnasiums and was brought in to help bring Victoria back to full health. Westling was raised in a middle-class family in Ockelbo, in central Sweden. His father managed a social services centre, and his mother worked in a post office. When the relationship was made public, Westling was mocked as an outsider and the king was reportedly horrified at the thought of his daughter marrying a “commoner”, even though he did so when he married Silvia. Last year, Westling underwent transplant surgery for a congenital kidney disorder. The Swedish public have been assured that he will be able to have children and that his illness will not be passed on to his offspring.

Westling underwent years of training to prepare for his new role in the royal family, including lessons in etiquette, elocution, and multi-lingual small talk; and a makeover that saw his hair being cropped short, and his plain-looking glasses and clothes being replaced by designer-wear.

Upon marrying the Crown Princess, Westling took his wife’s ducal title and is granted the style “His Royal Highness”. He is now known as HRH Prince Daniel, Duke of Västergötland. He also has his own coat-of-arms and monogram. When Victoria assumes the throne and becomes Queen, Daniel will not become King, but assume a supportive role, similar to that of Prince Phillip, the husband of the United Kingdom’s Queen Elizabeth II.

Retrieved from “https://en.wikinews.org/w/index.php?title=Sweden%27s_Crown_Princess_marries_long-time_boyfriend&oldid=4509139”

Concerns raised over UK hospital disinfection practices

Wednesday, November 8, 2006

A survey, conducted by the Patients’ Association, an independent charity devoted to defending the interests of patients, has revealed “unease and concern among health professionals” that infection control practices in the United Kingdom’s National Health Service are “endangering patients’ lives”. The survey published today, revealed that NHS infection control staff felt that infection control was inadequately financed, that training was inadequate and that much time has to be spent reassuring patients.

The Association is concerned that the financial deficits of many NHS trusts may prejudice good infection control practice because the resources allocated for this are not effectively ring-fenced. There was evidence of inadequate training and execution of good practice. The report also listed shortcomings in way supplies were acquired and delays in getting supplies of the preferred disinfectant: 2% Chlorhexidine-based solution.

BBC reported that a recent paper to a Society for General Microbiology conference by a University of Leeds team has shown that two chemical cleaners commonly used in hospitals, far from reducing the prevalence of Clostridium difficile (C. difficile) bacterium, actually increased its ability to survive. Only cleaners containing bleach had been proved effective in disposing of this bacterium. Authors of the paper refused to disclose what those two cleaners were.

There is particular concern in the Patients’ Association about the absence of adequate data on the spread of C. difficile. The Telegraph quotes Katharine Murphy, of the Patients’ Association, as saying: “Collection of data about this very dangerous infection is haphazard to say the least, and we are not getting the true picture. How can patients have confidence in their hospitals if the real threat posed by C. difficile is being played down?”

The Report found that only a fifth of respondents confirmed the collection of surgical-site infection data and that only 27% reported infection data about C. difficile; despite the requirement that Trusts collect and report these data.

Trusts are also required to report the incidence of surgical-site infection, but the Patients’ Association survey found that only a fifth of respondents confirmed the collection of these data.

The Patients Association called this a “worrying and haphazard situation”.

The Telegraph reports that experts consider that C. difficile is an even greater threat to patient’s health than MRSA.

Leicester NHS Trust has reported 49 deaths associated with C. difficile. in three of its hospitals. Six deaths have been reported at Maidstone Hospital and the Healthcare Commission has been asked to investigate. C. difficile was associated with the deaths of nearly 1000 patient in 2003.

A new Code of Practice “for the prevention and control of healthcare associated infections” was issued by the Department of Health in October 2006 under the Health Act 2006. This refers to the NHS in England and Wales only.

Retrieved from “https://en.wikinews.org/w/index.php?title=Concerns_raised_over_UK_hospital_disinfection_practices&oldid=435144”

England: Multi-storey carpark in Liverpool gutted by fire, 1,300 vehicles destroyed

Thursday, January 4, 2018

A fire on Sunday night in the seven-storey carpark for the Echo Arena in Liverpool, England destroyed almost all the vehicles parked inside and led to cancellation of the final evening of the Liverpool International Horse Show and evacuation of nearby blocks of flats. The blaze reportedly started with a parked Range Rover Discovery.

Investigators with the fire brigade stated that they believe the fire began with an accidental engine fire in the Range Rover at about 4.30 pm. The first call was made at 4.42 and firefighters arrived eight minutes after that. Ultimately twelve engines and 85 firefighters were involved in combatting the blaze. Aerial appliances were used and also three high-volume pumps. Fed by the fuel in vehicles parked inside, the temperature of the fire in the carpark is believed to have reached as high as 1,000°C. It was too hot to be extinguished with water from hydrants, so a high-volume pump was used to draw water from the River Mersey, and two more were brought from other fire brigades in the region.

The carpark has seven storeys and a capacity of 1,600 vehicles, and approximately 1,300 were parked in it when the fire broke out. According to Dan Stephens, chief fire officer for Merseyside Fire and Rescue Service, almost all of them were destroyed, with the exception of a few parked on the top level and at corners. “With these very high temperatures, you were never going to put the fire out without the whole building taking hold. The speed at which the fire spreads means you simply aren’t going to put it out,” said Stephens.

The carpark itself was severely damaged; according to Joe Anderson, the mayor of Liverpool. It is not in danger of collapsing but will have to be demolished, which will be difficult with the many burned-out cars still inside it, Anderson told the BBC.

According to Stephens, there were no serious injuries: one woman injured her hand, and two people were treated for smoke inhalation. A spokesman for the Echo Arena also stated that all animals were safe. All horses were successfully evacuated from the carpark and then removed from the stables after smoke spread to them. Six dogs were also rescued unharmed, two on a lower level in the early stages of the fire and four that had been left in a car on the top level, freed by firefighters on Monday after the fire was put out.

The final evening of the four-day Liverpool International Horse Show had been scheduled to begin at 7.30, and had to be cancelled. Many attendees were stranded in the city on New Year’s Eve night. Merseyside police directed people to the Pullman Hotel, where Red Cross assistance was available, and the Liverpool City Council set up an assistance centre at the Lifestyles Gym. A spokesman for the Association of British Insurers has said that insurance companies will “move very quickly” to reimburse owners whose vehicles were destroyed.

Nearby blocks of flats were evacuated because of the smoke. Eyewitnesses reported hearing what they at first thought were firecrackers, then “multiple explosions”, “bangs and popping”, “the bangs of car windows exploding”. People reported leaving everything in their cars, including their cellphones, and running for their lives.

Mayor Anderson tweeted that cuts to fire services over the last two years made it significantly harder to fight the fire and might have caused it not to be controllable. He also suggested that fire safety in multi-storey carparks had not been sufficiently considered and that installing sprinklers in them might help stop future fires before they become unmanageable, in a letter to Nick Hurd, a member of Parliament.

Retrieved from “https://en.wikinews.org/w/index.php?title=England:_Multi-storey_carpark_in_Liverpool_gutted_by_fire,_1,300_vehicles_destroyed&oldid=4376692”

How To Come Up With Great Garden Design Ideas}

How To Come Up With Great Garden Design Ideas

by

Russell Strider

If you are looking for great garden design ideas, there are many resources that you can use to start planning your garden. Planning a garden can take some time, but efforts always pay off at the end when you get to watch your garden grow year after year.

[youtube]http://www.youtube.com/watch?v=UilrmC1M1s4[/youtube]

Many gardeners first start the garden design planning process by selecting an ideal location for their garden. Whether it is in the front, back or side of their home or at a local community garden, it is important to select an ideal place to start a garden. Clearly, the larger the plot of land you have to work with the more options you have when it comes to planning your garden. However, there are other things that must be taken into consideration. In addition to size restrictions, another important item that must be considered when planning a garden is which part of your property or community garden receives the best sunlight and which does not. If you choose a piece of your property that is shady and not conducive to growing certain types of plants and flowers, then you may want to reconsider where you plan on starting your garden. If you are limited and must start your garden in an area that is shady, then you will not be able to plant certain types of flowers and plants that only flourish in sunlight. Once you have selected the location where you will begin your new garden, then you will have to decide what you want to plant and where you want to plant all of your flowers and plants. The most beautiful gardens are often organized by plant and flower type and colors. By taking the time to organize your project, your garden will look absolutely beautiful when it is in full bloom. The next step in the planning process is to determine how much time you will have to care for your garden. If your goal is to garden every day, then you can select plants and flowers that are more difficult to take care of. On the other hand, if you are not going to have too much time to devote to your garden, then you should consider choosing plants and flowers that require less attention and are easier to take care of. Clearly, there are many things to consider when coming up with garden design ideas. By taking the time to consider the placement of your garden, the types of plants and flowers you are going to plant as well as how much time you have to devote to your project, you will be on your way to planning the best garden.

Are you looking for

Landscape Design Gold Coast

? Be sure to visit

Landscaping Gold Coast

for all your landscaping needs.

Article Source:

How To Come Up With Great Garden Design Ideas}

Aurora Borealis caused by electrical space tornadoes

Wednesday, April 29, 2009THEMIS space probes discovered that the Northern lights are seen when electrical tornadoes, rotating faster than a million miles an hour, hover about 40,000 miles (60,000 km) above the earth. The energy spins down to the Earth’s ionosphere where the tornadoes become unstable, and interact with the Earth’s magnetic field.

Professor Karl-Heinz Glassmeier, director of the Institute for Geophysics and Extraterrestrial Physics in Braunschweig Germany, explains, “When these space tornadoes reach the upper atmosphere their enormous energy heats the air so strongly it starts glowing. That is what generates the aurorae.”

“It is here that all the energy is released, forming the aurorae. What we see as beautiful lights and colors are actually the product of a violent electrical storm in space. While these electrical discharges do not cause any direct harm to humans, they can damage man-made structures such as power transformers and communications systems,” said Andreas Keiling, a physicist at the University of California at Berkeley.

Time History of Events and Macroscale Interactions during Substorms (THEMIS) are five probes launched by NASA in February 2007, which orbited Earth recording the volume and electrical current which was higher than 100,000 amperes.

Scientists had previously concluded that aurorae are caused by electrically charged particles discharged as solar winds from the sun which interact with the Earth’s magnetic field. However, these solar discharges strike the Earth where the sun is shining and the aurorae occur in the opposite hemisphere and are visible in the night sky.

This anomaly was cleared up by THEMIS satellites which showed that the Earth’s magnetic field held the charged particles before deflecting them from the day side of the planet across to the opposite side of the planet where the particles massed into huge clouds. There the accumulated charge expands continuously until finally the cloud becomes unstable releasing its energy as a geomagnetic tornado which travels down towards the earth along magnetic field lines becoming visible as aurorae in the sky.

The scientists presented their findings at the European Geosciences Union (EGU) in Vienna, Austria just this week.

Retrieved from “https://en.wikinews.org/w/index.php?title=Aurora_Borealis_caused_by_electrical_space_tornadoes&oldid=4544656”