scholarly journals 377 EVOLUTION OF GREENHOUSE MANAGEMENT COURSES

HortScience ◽  
1994 ◽  
Vol 29 (5) ◽  
pp. 485b-485
Author(s):  
Lois Berg Stack

Information presented in greenhouse management courses has changed in response to several factors. Increasingly, students must learn about: new technologies such as the use of computers in crop management, and new techniques such as implementation of biological pest management; regulations like the EPA/OSHA chemical safety laws; experimental procedures, to be able to assess future technologies and techniques during their careers; and professionalism (industry leadership, ability to work with the media, knowledge of how to impact law). Changes in course content and procedures over time, and methods of teaching increased types and amounts of information, are discussed through results of a survey of current instructors of greenhouse management courses.

Author(s):  
Botagoz Kulzhanova ◽  
Diana Ongdassynkyzy ◽  
Kuralay Ongdassynova ◽  
Aidar Duisenbay ◽  
Talgat Chaimerden ◽  
...  

The article discusses the features of biomimetics as a science that allows to suggest technologies for creating new technologies. Strange to relate, the man is a being completely unadapted to life. At the same time, man made a lot of discoveries precisely thanks to the observation of animals — from primitive tools based on the teeth of other animals to the first flying machines. Over time, the human civilization has defined a whole direction in science, which explores mechanisms in nature in order to use them for the benefit of man. With the help of biomimetics (from the Latin "bios" - life and "mimesis" - imitation), many problems from medicine, architecture, transport and energy were solved.


Author(s):  
AGNIESZKA IWANICKA

Agnieszka Iwanicka, Od biernego odbiorcy do aktywnego mediakreatora – małe dzieci i TIK w świetle badań własnych [From passive recipients to active mediacreators: small children and ICT in the light of own studies]. Interdyscyplinarne Konteksty Pedagogiki Specjalnej, nr 23, Poznań 2018. Pp. 143-160. Adam Mickiewicz University Press. ISSN 2300-391X. DOI: https://doi.org/10.14746/ikps.2018.23.08 Small children show a lot of media activity: they are perfectly capable of handling new technologies, they have been using them since the first years of their life. What activities they show depends on the family home and the behaviors they observe with their parents. With their support and providing positive patterns, the child can become not only a passive media user, but also an active media content creator, a kind of mediacreator, which over time will have a real impact on the reality in which he grows up. In the article, I present some of the results of the my research, in which I checked what role the media plays in the life of a child in an early school age. I try to answer the question, what media activities are displayed by children – whether it is only passive and imitative, or maybe they are actively creating media content.


2019 ◽  
Vol 36 (2) ◽  
pp. 21-22
Author(s):  
Ray Harper

Purpose The purpose of this paper is to summarise a number of presentations at Day 1 of the Internet Librarian International conference, London, UK (16 October 2018). This was the 20th conference in the series, and the three key themes included were the next-gen library and librarian; understanding users, usage and user experience; and inclusion and inspiration: libraries making a difference. Design/methodology/approach This paper reports from the viewpoint of a first-time attendee of the conference. This summarises the main issues raised by each presentation and draws out the key learning points for practical situations. Findings The conference covered a variety of practical ways in which libraries can use technology to support users and make decisions about services. These include developing interactive physical spaces which include augmented reality; introducing “chat-bots” to support users; using new techniques to analyse data; and piloting new ways to engage users (such as coding clubs). A key theme was how we use and harness data in a way that is ethical, effective and relevant to library services. Originality/value This conference focussed on practical examples of how library and information services across sectors and countries are innovating in a period of huge change. The conference gave delegates numerous useful ideas and examples of best practice and demonstrated the strength of the profession in adapting to new technologies and developments.


2021 ◽  
pp. 194016122110252
Author(s):  
Sebastián Valenzuela ◽  
Daniel Halpern ◽  
Felipe Araneda

Despite widespread concern, research on the consequences of misinformation on people's attitudes is surprisingly scant. To fill in this gap, the current study examines the long-term relationship between misinformation and trust in the news media. Based on the reinforcing spirals model, we analyzed data from a three-wave panel survey collected in Chile between 2017 and 2019. We found a weak, over-time relationship between misinformation and media skepticism. Specifically, initial beliefs on factually dubious information were negatively correlated with subsequent levels of trust in the news media. Lower trust in the media, in turn, was related over time to higher levels of misinformation. However, we found no evidence of a reverse, parallel process where media trust shielded users against misinformation, further reinforcing trust in the news media. The lack of evidence of a downward spiral suggests that the corrosive effects of misinformation on attitudes toward the news media are less serious than originally suggested. We close with a discussion of directions for future research.


2021 ◽  
Vol 66 (1) ◽  
pp. 93-117
Author(s):  
Christian Henrich-Franke

Abstract The second half of the 20th century is commonly considered to be a time in which German companies lost their innovative strength, while promising new technologies presented an enormous potential for innovation in the US. The fact that German companies were quite successful in the production of medium data technology and had considerable influence on the development of electronic data processing was neglected by business and media historians alike until now. The article analyses the Siemag Feinmechanische Werke (Eiserfeld) as one of the most important producers of the predecessors to said medium data technologies in the 1950s and 1960s. Two transformation processes regarding the media – from mechanic to semiconductor and from semiconductor to all-electronic technology – are highlighted in particular. It poses the question of how and why a middling family enterprise such as Siemag was able to rise to being the leading provider for medium data processing office computers despite lacking expertise in the field of electrical engineering while also facing difficult location conditions. The article shows that Siemag successfully turned from its roots in heavy industry towards the production of innovative high technology devices. This development stems from the company’s strategic decisions. As long as their products were not mass-produced, a medium-sized family business like Siemag could hold its own on the market through clever decision-making which relied on flexible specialization, targeted license and patent cooperation as well as innovative products, even in the face of adverse conditions. Only in the second half of the 1960s, as profit margins dropped due to increasing sales figures and office machines had finally transformed into office computers, Siemag was forced to enter cooperation with Philips in order to broaden its spectrum and merge the production site in Eiserfeld into a larger business complex.


Author(s):  
Gary Sutlieff ◽  
Lucy Berthoud ◽  
Mark Stinchcombe

Abstract CBRN (Chemical, Biological, Radiological, and Nuclear) threats are becoming more prevalent, as more entities gain access to modern weapons and industrial technologies and chemicals. This has produced a need for improvements to modelling, detection, and monitoring of these events. While there are currently no dedicated satellites for CBRN purposes, there are a wide range of possibilities for satellite data to contribute to this field, from atmospheric composition and chemical detection to cloud cover, land mapping, and surface property measurements. This study looks at currently available satellite data, including meteorological data such as wind and cloud profiles, surface properties like temperature and humidity, chemical detection, and sounding. Results of this survey revealed several gaps in the available data, particularly concerning biological and radiological detection. The results also suggest that publicly available satellite data largely does not meet the requirements of spatial resolution, coverage, and latency that CBRN detection requires, outside of providing terrain use and building height data for constructing models. Lastly, the study evaluates upcoming instruments, platforms, and satellite technologies to gauge the impact these developments will have in the near future. Improvements in spatial and temporal resolution as well as latency are already becoming possible, and new instruments will fill in the gaps in detection by imaging a wider range of chemicals and other agents and by collecting new data types. This study shows that with developments coming within the next decade, satellites should begin to provide valuable augmentations to CBRN event detection and monitoring. Article Highlights There is a wide range of existing satellite data in fields that are of interest to CBRN detection and monitoring. The data is mostly of insufficient quality (resolution or latency) for the demanding requirements of CBRN modelling for incident control. Future technologies and platforms will improve resolution and latency, making satellite data more viable in the CBRN management field


2019 ◽  
Vol 24 ◽  
Author(s):  
R. Egan ◽  
S. Cartagena ◽  
R. Mohamed ◽  
V. Gosrani ◽  
J. Grewal ◽  
...  

AbstractCyber Operational Risk: Cyber risk is routinely cited as one of the most important sources of operational risks facing organisations today, in various publications and surveys. Further, in recent years, cyber risk has entered the public conscience through highly publicised events involving affected UK organisations such as TalkTalk, Morrisons and the NHS. Regulators and legislators are increasing their focus on this topic, with General Data Protection Regulation (“GDPR”) a notable example of this. Risk actuaries and other risk management professionals at insurance companies therefore need to have a robust assessment of the potential losses stemming from cyber risk that their organisations may face. They should be able to do this as part of an overall risk management framework and be able to demonstrate this to stakeholders such as regulators and shareholders. Given that cyber risks are still very much new territory for insurers and there is no commonly accepted practice, this paper describes a proposed framework in which to perform such an assessment. As part of this, we leverage two existing frameworks – the Chief Risk Officer (“CRO”) Forum cyber incident taxonomy, and the National Institute of Standards and Technology (“NIST”) framework – to describe the taxonomy of a cyber incident, and the relevant cyber security and risk mitigation items for the incident in question, respectively.Summary of Results: Three detailed scenarios have been investigated by the working party:∙Employee leaks data at a general (non-life) insurer: Internal attack through social engineering, causing large compensation costs and regulatory fines, driving a 1 in 200 loss of £210.5m (c. 2% of annual revenue).∙Cyber extortion at a life insurer: External attack through social engineering, causing large business interruption and reputational damage, driving a 1 in 200 loss of £179.5m (c. 6% of annual revenue).∙Motor insurer telematics device hack: External attack through software vulnerabilities, causing large remediation / device replacement costs, driving a 1 in 200 loss of £70.0m (c. 18% of annual revenue).Limitations: The following sets out key limitations of the work set out in this paper:∙While the presented scenarios are deemed material at this point in time, the threat landscape moves fast and could render specific narratives and calibrations obsolete within a short-time frame.∙There is a lack of historical data to base certain scenarios on and therefore a high level of subjectivity is used to calibrate them.∙No attempt has been made to make an allowance for seasonality of renewals (a cyber event coinciding with peak renewal season could exacerbate cost impacts)∙No consideration has been given to the impact of the event on the share price of the company.∙Correlation with other risk types has not been explicitly considered.Conclusions: Cyber risk is a very real threat and should not be ignored or treated lightly in operational risk frameworks, as it has the potential to threaten the ongoing viability of an organisation. Risk managers and capital actuaries should be aware of the various sources of cyber risk and the potential impacts to ensure that the business is sufficiently prepared for such an event. When it comes to quantifying the impact of cyber risk on the operations of an insurer there are significant challenges. Not least that the threat landscape is ever changing and there is a lack of historical experience to base assumptions off. Given this uncertainty, this paper sets out a framework upon which readers can bring consistency to the way scenarios are developed over time. It provides a common taxonomy to ensure that key aspects of cyber risk are considered and sets out examples of how to implement the framework. It is critical that insurers endeavour to understand cyber risk better and look to refine assumptions over time as new information is received. In addition to ensuring that sufficient capital is being held for key operational risks, the investment in understanding cyber risk now will help to educate senior management and could have benefits through influencing internal cyber security capabilities.


2018 ◽  
Vol 108 (09) ◽  
pp. 611-616
Author(s):  
S. F. Schäfer ◽  
U. Bracht

Zukünftige Antriebstechnologien sowie neue Fabrik- und Logistikkonzepte verändern die Rahmenbedingungen der Automobilproduktion grundlegend. Schon heute muss die Strukturlayoutplanung Innovationen und Unsicherheiten in Form von mehr Varianten, abgestimmt in sehr kurzer Zeit, durch die Einbeziehung von weiteren Know-how-Trägern berücksichtigen. Neue Herausforderungen, wie die Planung der Batteriefertigungen, müssen schnell und intuitiv gelöst werden. Einen Beitrag dafür liefert dieser Artikel.   Future technologies in automotive mobility as well as new factory and logistic concepts are changing the framework in car production. Innovations and uncertainties (e. g. the impact of new technologies) have to be taken in consideration for the factory of the future. New tasks, such as planning the assembly of batteries, need to be solved fast and intuitively. This paper presents an approach to this topic.


Author(s):  
GwangKi Min ◽  
Eun Suk Suh ◽  
Katja Hölttä-Otto

Complex systems often have long life cycles with requirements that are likely to change over time. Therefore, it is important to be able to adapt the system accordingly over time. This is often accomplished by infusing new technologies into the host system in order to update or improve overall system performance. However, technology infusion often results in a disruption in the host system. This can take the form of a system redesign or a change in the inherent attributes of the system. In this study, we analyzed the impact of technology infusion on system attributes, specifically the complexity and modularity. Two different systems that were infused with new technologies were analyzed for changes in complexity and modularity.


SAGE Open ◽  
2017 ◽  
Vol 7 (4) ◽  
pp. 215824401774671
Author(s):  
Abdel Rahman Mitib Altakhaineh

This study investigates the phonological, semantic, and pragmatic features of acronyms in Arabic. Acronyms in Arabic have appeared quite recently as a result of globalization and exposure to or contact with, mainly, English via radio stations and TV channels, which are broadcasting in English and in some countries, for example, Morocco in both English and French. Through in-depth analysis, it has been observed that acronyms in Arabic are subject to different restrictions: (a) The phonological combinations are formed on the basis of Arabic templates; hence, should be compatible with Arabic phonotactics, for example, consonant clusters should be broken up by vowels; (b) the connotation of the acronyms should not be negative; and (c) in conformity with relevance theory, when the acronyms are homophonous to existing words, the former maximize contextual effects with minimum processing effort. The fact that they appear in certain contexts also reduces the processing effort. It has also become evident that the period between the establishment of the movement or party and the first use of the acronym decreases over time, provided that the acronyms are frequently mentioned in the media. The examination of acronyms in different languages shows that acronymization is quite pervasive cross-linguistically; this may suggest that not any word-formation process can easily spread; it needs to be prevalent and potentially universal.


Sign in / Sign up

Export Citation Format

Share Document