Daily Life in the Era of Simple Technologies

Author(s):  
Philippe Bihouix

This chapter investigates what daily life might be like in a low-tech era, including topics on agriculture and food, transport, construction, manufactured products, finance, information technologies, and love and leisure. It speculates the application of the general principles on low-tech without any assumptions about their political, economic, social, or cultural feasibility. It also describes the 'upstream' activities of food production that is needed to feed humanity in decades to come without compromising the capacity to feed for the coming centuries. The chapter looks at the freedom created by motorized individual mobility that came with a high price from the environmental and societal point of view. It probes how the energy issue might be solved in the low-tech world.

2020 ◽  
Vol V (IV) ◽  
pp. 110-119
Author(s):  
Ishtiaq Ahmad ◽  
Abdus Samad ◽  
Muhammad Shakil ur Rehman Shakil ur Rehman

This paper aims at investigating the nostalgic impact on the characters in The Reluctant Fundamentalist by Mohsin Hamid. Nostalgia is regarded as the state of homesick or a mental sentimentality for one's past. Everyone is more or less nostalgic, and nostalgia plays a vital role in the lives and experiences of individuals in daily life. The present study is a qualitative and descriptive textual analysis. The Reluctant Fundamentalist has been examined by analyzing the words, sentences, characters and their actions from the nostalgic point of view. This study has investigated the nostalgic impact on the characters, especially on Changez and Erica, through the lens of nostalgia by focusing on their personalities, works, social lives, actions and reactions. This study has found that nostalgia influences and molds the lives and experiences of characters and individuals to an extensive extent. Changes and Erica spoil their lives but are not ready to come out of their nostalgic worlds. The Reluctant Fundamentalist has been analyzed and interpreted through different dimensions, but no one has discussed it from a nostalgia point of view before. So, this paper is a primary investigation and would surely contribute to the present stock of knowledge.


2021 ◽  
pp. 097639962097863
Author(s):  
Krishna Prasad Pandey

Nepal and Bhutan, two Shangri-las of South Asia, share similar geo-political features but substantially differ in terms of demographic size and ethno-political history. The Constitution of Nepal 2015 which was promulgated by the second Constituent Assembly formed in 2013 came up with its inclusive character as it secured reasonable space for the ethnic minorities and owned their political, economic and cultural concerns. On the contrary, Bhutan adopted a different course in terms of accommodating ethnic and minority aspirations, although the country has also chosen parliamentary democracy in a narrow sense since 2008. From constitutional point of view, Nepal’s move from a liberal to an inclusive constitution made strenuous effort to bring all sections of Nepali society on board but Bhutan’s shift from a royal decree to an exclusionary constitution consciously left a large section of minority behind by suppressing their legitimate claims for basic democratic rights. This article explores the inclusive and exclusionary characters of the current constitutions of these countries from ethnic perspective.


Author(s):  
Alessandro Tufano ◽  
Riccardo Accorsi ◽  
Andrea Gallo ◽  
Riccardo Manzini

"Contract catering industry is concerned with the production of ready-to-eat meals for schools, hospitals and private companies. The structure of this market is highly competitive, and customers are rarely willing to pay a high price for this catering service. A single production sites may be demanded up to 10.000 meals per day and these operations can hardly be managed via rule of thumbs without any quantitative decision support tool. This situation is common at several stages of a food supply chain and the methodologies presented in this paper are addressed to any food batch production system with similar complexity and trade-offs. This paper proposes an original KPI dashboard, designed to control costs, time and quality efficiency and helping managers to identify criticalities. Special emphasis is given on food safety control which is the management’s main concern and must be carefully monitored in each stage of the production. To calculate the value of KPIs a Montecarlo simulation approach is used to deal with production complexity and uncertainty. A case study showcases the potential of simulation in this complex industrial field. The case study illustrates an application of the methodology on an Italian company suffering local recipe contamination. The company aims at defining the best standard for production, identifying cycles being sustainable from an economic and environmental point of view."


2018 ◽  
Vol 27 (14) ◽  
pp. 1830009
Author(s):  
Virginia Trimble

A large majority of the physics and astronomy communities are now sure that gravitational waves exist, can be looked for, and can be studied via their effects on laboratory apparatus as well as on astronomical objects. So far, everything found out has agreed with the predictions of general relativity, but hopes are high for new information about the universe and its contents and perhaps for hints of a better theory of gravity than general relativity (which even Einstein expected to come eventually). This is one version of the story, from 1905 to the present, told from an unusual point of view, because the author was, for 28.5 years, married to Joseph Weber, who built the first detectors starting in the early 1960s and operated one or more until his death on 30 September 2000.


2021 ◽  
Vol 273 ◽  
pp. 11012
Author(s):  
Polina Dmitrieva

The article is devoted to the description and explanation of individual psychological and social phenomena from the point of view of actualizing thanatic issues during the COVID-19 pandemic and its information coverage. The relevance of the study is due to the situation of the spread of coronavirus infection, the peculiarities of combating its spread, the influence of information technologies on this process and the need to understand the phenomena that have developed in society. The novelty of the research lies in the complex consideration of various social and individual psychological phenomena from the standpoint of the influence of the vital threat and existential fears on the individual and social consciousness. The article contains information on the socio-psychological phenomena that manifested themselves during the COVID-19 pandemic (alarmism, infodemic, intergroup tensions, stigmatization of certain groups of the population, a shift in political preferences, aggravation or emergence of mental disorders, inadequate purchasing activity) and describes them in terms of Terror Management Theory. In the conclusion, prospects are given for using the provisions of Terror Management Theory to develop a strategy for overcoming a pandemic situation, taking into account the action of proximal and distal defenses. The author comes to the conclusion that the features of the information coverage of the situation have a strong influence on its further development, in connection with which it is necessary to develop a clear plan for the preparation of official information that meets the criteria of completeness, credibility, scientific character and conveys the idea of positive realism.


Author(s):  
Elena Gorda

The generalization of the concept of the task in terms of information environments of construction [ISB] is performed. The approach to the presentation of such concepts as construction issues, construction problem, ontology, idea, concept, classification of problems, tasks, directions, objects included in the staging part of the tasks taking into account the specifics of the tasks solved within the developed information technologies in construction issues. The paper defines and investigates on the basis of methods of construction geodesy the actual tasks of construction, design, modeling, monitoring and their totality in the field of construction by means of information theory. An approach to the description of the technical condition of a construction object on the basis of information modeling in the management of the construction process and information modeling within the life cycle is proposed and described. Information modeling is a process, the results of each stage of which, ie information models of the building, differ greatly from each other depending on the stage of the life cycle of the object and the requirements for modeling in solving emerging problems. The construction object strongly depends on the stage of its existence: if during the design it is virtual, and during construction it gradually finds a real embodiment, then at a long stage of operation the building enters a period of stability and is no longer subject to significant changes. An information model is a variable object that depends on the range of tasks to be solved. Using the methods of construction geodesy in the field of construction, the field of problems, class of problems, the concept of the problem, the state of the problem, subtasks, chains of problems, problem solving and the result of solving the problem, the relationship between problems setting the transformation of aggregation, merger, integration. The urgency of the task from a theoretical point of view is determined by the expansion of the ontology of construction as a science, from an applied point of view is determined by the possibility of accurate formalization of regulatory information and documentation in construction.


2017 ◽  
Author(s):  
Donald G. MacDiarmid ◽  
Sean J. Korney ◽  
Melanie Teetaert ◽  
Julie J.M. Taylor ◽  
Robert Martz ◽  
...  

Rights of first refusal and other preferential or pre-emptive rights (together, ROFRs, and individually a ROFR) routinely find their way into oil and gas industry agreements. Disputes often arise because of the complex nature and significant economic consequences of ROFRs. In recent years, a number of reported cases, either relating directly to ROFRs or more generally relating to contractual interpretation, have clarified (or at times muddied) the waters surrounding the use, application, and interpretation of ROFRs. However, most ROFR disputes never result in a reported decision because the parties typically negotiate solutions long before trial.The authors consider current trends involving ROFRs in oil and gas agreements, and how they believe the law and legal practice surrounding ROFRs might continue to evolve in the years to come. The authors do not attempt to rehash the fundamentals of the law surrounding ROFRs; instead, they focus on how the courts have dealt with ROFRs in recent cases as well as how corporate lawyers and in-house counsel grapple with ROFRs day-today. The authors utilize the ROFR provisions found in industry standard contracts to analyze outstanding areas of uncertainty as well as what lawyers should contemplate prior to including a ROFR in an agreement. Additionally, the article examines the implications of recent rulings on the duty of good faith that may affect ROFRs. Finally, the article considers selected subjects of topical interest, including ROFRs in the context of busted butterfly transactions, insolvency proceedings, and package deals.


2020 ◽  
Vol 1 (2) ◽  
pp. 1-9
Author(s):  
Jabbor Mukhammadiev

In the international media space the issues of ensuring information security of the state is inseparably interrelated with the political, economic and legal guarantees for exercising freedom of speech and expression. The problem of ensuring the information security of any state is one of the most important aspects of its foreign policy, since it is the information sphere that is today considered to be the most important object of application of the activities of various participants in international relations. In connection with the rapid development of information technologies, threats of a new type are emerging - threats to information security on a national scale, respectively, the state must respond quickly to a changing situation and take decisive steps to organize a coherent complex information security system. The article analyzes the main approaches to providing information security of the country, formulated the goal, tasks, functions, principles of ensuring information security of the country


2020 ◽  
Vol 3 (7) ◽  
pp. 153-164 ◽  
Author(s):  
Hennadii Hulak

The components of ensuring the warranty of automated systems, which are subject to increased requirements in connection with their use in many sensitive areas of public activity, including national security and defense, critical industrial technologies, energy and communications, banking, environmental protection , technologies of legitimate distance learning, etc. Certain components can significantly affect the quality and reliability of information services in regulatory conditions. In particular, the special role of the functional security of the cryptographic subsystem in terms of supporting the performance of the automated system for its tasks and functions in general, as well as in terms of ensuring the confidentiality and integrity of information. The components of the cryptographic subsystem have been identified, the poor or incorrect operation of which negatively affects the security of these subsystems. The types of the most dangerous attacks on these subsystems are analyzed, their classification from the point of view of possibility of realization in modern scientific and technical conditions and depending on capacity of available computing means and technologies on the basis of which the most real and dangerous variant of realization of remote attacks on software implementation of cryptographic subsystem is defined. . Based on the analysis, a method for evaluating the quality of cryptographic transformations based on a modified algorithm for solving the problem of finding solutions of systems of linear equations with distorted right-hand parts using the so-called decoding based on "lists" of first-order "shortened" Reed-Muller codes is proved. the correctness of the proposed algorithm.


Sign in / Sign up

Export Citation Format

Share Document