tag:blogger.com,1999:blog-90087588436224217742024-03-08T07:45:26.842-08:00CNDMTJASMİNUnknownnoreply@blogger.comBlogger150125tag:blogger.com,1999:blog-9008758843622421774.post-24312963832440695902009-12-02T00:25:00.001-08:002009-12-02T00:25:51.860-08:00Dynisco HistoryEstablished in 1953, Dynisco was one of the first companies to apply strain gauge technology to pressure transducers for a variety of markets and industries and the first company to design a transducer specifically to measure melt pressure during the extrusion process. In addition, over the years, Dynisco has grown through acquisition to include products such as melt indexers, rheometers, polymer evalutaion equipment and other auxiliary equipment for polymer processing and plastics extrusion.<br /><br /><br />Dedication to our ISO 9001:2000 certification assures that all Dynisco products are designed and manufactured to the highest quality standards. And our products are backed by a comprehensive service and repair program and unmatched technical support. Our experience, expertise, and service all are directed toward improving product quality and manufacturing efficiency for our customers.<br /><br /><br />Dynisco has a network of Manufacturing Sites and Sales Offices around the Globe, many of whom have over twenty years of experience with our products. Also, sales representatives and distributors worldwide supplement these direct offices throughout Europe and the Pacific Rim.<br />Today, Dynisco is the international leader in pressure and temperature measurement and control products for the plastics industry. We've solved some of the most challenging measurement problems in extrusion, molding, process control and general industrial applications. Our sensors meet the rigid standards of approval agencies such as CE, FM, SIRA, PTB, CSA and others. We've built our reputation by providing high accuracy pressure measurement at high temperatures, with transducers that withstand the most abrasive and corrosive production environments. Continued investment in R&D allows Dynisco to offer hundreds of models of transducers and transmitters and the latest sensing technologies.<br /><br /><br />Our extensive line of polymer testing equipment grew from Kayeness, Inc., which Dynisco acquired in 1987. Today we supply both on-line and laboratory capillary rheometers, laboratory melt indexers, on-line slit rheometers, on-line infrared analysis, a variety of impact testers, coefficient of friction testers, contact angle testers, film tensile testers and other small test devices. Through our innovative work with electronics and mechanical design, we’ve carved a niche in the polymer test marketplace by providing the highest performance per cost ratio in the business. Dynisco meets the physical testing needs of the plastics, food, and rubber industries by providing high quality equipment and services at low cost.<br /><br /><br />In 1990 Dynisco acquired Normag Gear Pumps and followed that by adding Extek Screen Changers in 1994. Extrusion processors worldwide came to rely on Dynisco gear pumps and screen changers to meet their most demanding specifications for sheet, cast film, profile, tubing, pipe, wire and cable or compounding applications. The Beringer product line was acquired by Madison Capital Group in 1998. It was combined with the Extrusion group. The Beringer product line included screen changers, cleaning ovens, and pelletizers. In 2006 the Extrusion group was divested to Xaloy in 2006, now known as Xaloy Extrusion.<br /><br /><br />On December 15th, 2006 Roper Industries, Inc. of Duluth, GA (NYSE: ROP) acquired Dynisco LLC from Audax Group of Boston, MA. Dynisco has been added to the Roper’s Energy Systems & Controls segment.<br /><br /><br />Roper Industries is a diversified industrial company that produces engineered products for global niche markets. We are well positioned in attractive end markets, and our strong operating capabilities enable us to convert this potential into profitable growth and cash flow. We are focused on executing our growth strategy to create value for our investors.<br /><br /><br />Dynisco,LLC has been built on the principles of innovative products, quality workmanship and outstanding service. Customers around the world have come to depend on Dynisco.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-9008758843622421774.post-50584860751464717402009-03-10T09:47:00.000-07:002009-03-10T09:51:15.459-07:00vsepWhile membrane-based separations of liquids from solids have enjoyed increasing popularity over the last 20 years, the technology has an inherent Achilles heel that affects all membrane devices: fouling. This long-term loss in throughput capacity is due primarily to the formation of a boundary layer that builds up naturally on the membranes surface during the filtration process. In addition to cutting down on the flux performance of the membrane, this boundary or gel layer acts as a secondary membrane reducing the native design selectivity of the membrane in use. This inability to handle the buildup of solids has also limited the use of membranes to low-solids feed streams.<br /><br /><br /><br />To help minimize this boundary layer buildup, membrane designers have used a method known as tangential-flow or cross-flow filtration that relies on high velocity fluid flow pumped across the membranes surface as a means of reducing the boundary layer effect. (See Figure 1)<br /><br />In cross-flow designs, it is not economic to create high shear forces, thus limiting the use of cross-flow to low-viscosity (watery) fluids. In addition, increased cross-flow velocities result in a significant pressure drop from the inlet (high pressure) to the outlet (lower pressure) end of the device, which leads to premature fouling of the membrane that creeps up the device until permeate rates drop to unacceptably low levels.<br /><br /><br /><br /><br />Instead of producing high cross flow, an alternative method for producing intense shear waves on the face of a membrane is developed. The technique is called Vibratory Shear Enhanced Processing (VSEP). In a VSEP System, the feed slurry remains nearly stationary, moving in a leisurely, meandering flow between parallel membrane leaf elements. Shear cleaning action is created by vigorously vibrating the leaf elements in a direction tangent to the faces of the membranes.<br /><br />The shear waves produced by the membrane's vibration cause solids and foulants to be lifted off the membrane surface and remixed with the bulk material flowing through the membrane stack. This high shear processing exposes the membrane pores for maximum throughput that is typically between 3 and 10 times the throughput of conventional cross-flow systems. (See Figure 2, above)<br /><br />The oscillation produces a shear at the membrane surface of about 150,000 inverse seconds (equivalent to over 200 G's of force), which is approximately 10 times the shear rate of the best conventional cross-flow systems. More importantly, the shear in a VSEP System is focused at the membrane surface where it is cost effective and most useful in preventing fouling, while the bulk fluid between the membrane disks moves very little.<br /><br /><br /><br />Because VSEP does not depend on feed flow induced shearing forces, the feed slurry can become extremely viscous and still be successfully dewatered. The concentrate is essentially extruded between the vibrating disc elements and exits the machine once it reaches the desired concentration level. Thus, VSEP Systems can be run in a single pass through the system, eliminating the need for costly working tanks, ancillary equipment and associated valving.<br /><br />The disc pack hold up volume of a system with 1,400 ft2 (130 sq. meters) of membrane area, is less than 50 gallons (189 liters). As a result, product recovery in batch processes can be extremely high.<br /><br /> <br />Emulsified oil are serving as lubricant as well as coolant in various metal industries such as steel making and metal cutting. Disposal of emulsified fluid is a very tough environmental pollution issue. It has high COD and oil/water fully emulsified. Conventional bio-chemical treatment consumes large amount of chemicals and high running cost yet still requires multiple post-treatment steps. The disposal of solid cake will ultimately contaminate underground water. Conventional membrane treatment faces low flux and severe fouling issues. VSEP can simplify treatment process. It has high anti-fouling ability and high recovery ratio. Concentrate can be put as fuel and permeate can achieve discharge standard.<br /><br />At startup, the VSEP system is fed with a slurry and the concentrate valve is closed. Permeate is produced and suspended solids in the feed are collected inside the VSEP filter pack. After a programmed time interval, valve on concentrate line is opened to release the accumulated concentrated solids. The valve is then closed to allow the concentration of additional feed material. This cycle repeats indefinitely.<br /><br /><br />Membrane selection is the single most important parameter that affects the quality of the separation. Other important parameters that affect system performance are pressure, temperature, vibration amplitude, and residence time. All of these elements are optimized during testing and entered into the programmable logic controller (PLC) which controls the system.<br /><br />The operating pressure is created by the feed pump. VSEP machines can routinely operate at pressures as high as 500 psig (35 bar). While higher pressures often produce increased permeate flow rates, they also use more energy. Therefore, an operating pressure is used that optimizes the balance between flow rates and energy consumption.<br /><br />The vibration amplitude and corresponding shear rate can also be varied which directly affects filtration rates. Shearing is produced by the torsion oscillation of the filter stack. Typically the stack oscillates with an amplitude of 3/4 to 1 1/4 inches (1.9 to 3.2 cm) peak to peak displacement at the rim of the stack. The oscillation frequency is approximately 53 Hz and produces a shear intensity of about 150,000 inverse seconds.<br /><br />Feed residence time is set by the frequency of the opening and closing of the exit valve (valve one). The solids level in the feed increases as the feed material remains in the machine. Occasionally, a cleaner is added to the membrane stack and continued oscillation helps clean the membrane in minutes. This process can be automated and only consumes approximately 50 gallons (189 liters) of cleaning solution thus reducing cleaner disposal problems inherent with other membrane systems.<br /><br />Control system<br /><br />VSEP systems are supplied with internationally branded Programmable Logic Controllers. All components are fully contained in a NEMA 4 rated enclosure.<br /><br />Various levels of control sophistication are available depending on the complexity of the application. For polishing or low solids applications simple controls having minimal outputs and inputs are provided. For high solids applications controls with more features are used to insure trouble free operation. The VSEP controller typically sets solids levels by actuating the exit valve based on operating parameters such as pressure or flow rate.<br /><br />Other control options available include automatic clean-in-place, automatic flush, automatic shut down, full alarm features with digital diagnostic displays, remote diagnostics and monitoring, and many others. Dunwell engineers have spent years perfecting VSEP controls to maximize reliability and to minimize operator intervention.<br /><br /><br />Clean-In-Place<br /><br />Clean-In-Place, CIP, is a package of pre-connected pipes, valves, tanks, pumps serving to clean the filter pack in steps by washing and flushing. Different cleaner can be applied according to different fouling chemistry. Piping has different material and different grade of polishing according to applications. One CIP can serve up to 6 i-series VSEP. Customer can choose either fully manual or fully automatic or somewhere in between according to individual application.Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-9008758843622421774.post-83535957813550692322009-03-07T07:05:00.001-08:002009-03-07T07:05:29.088-08:00EDGOS ABOUTZealous Customer SupportEdgeos believes in earning your trust and maintaining our business relationship by constantly providing you with superior value, quality, and service. We are relentless about always meeting your needs and exceeding your expectations. If you are ever less than 100% satisfied with our relationship, or Edgeos' platform-enabled services, please let us know immediately. We want the opportunity to try and make things right.<br /><br />About Edgeos, IncorporatedEdgeos, Incorporated is a network and information security technology company focused solely on enabling technology and network services organizations to provide security services to their customers through the Edgeos private labeled security services platform.<br /><br />The company was founded in 2001 and is headquartered in Chandler, Arizona (Phoenix Metropolitan Area). Edgeos has customers across six continents and our customers have used the Edgeos security services platform to quickly and accurately identify millions of vulnerabilities on many thousands of networks spanning the globe.<br /><br />For more information about Edgeos, or to discuss how we can work together, please contact our sales team via email at sales (@) edgeos (.) com or via telephone at 866.334.3671.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-9008758843622421774.post-51365984896682347372009-03-06T17:27:00.001-08:002009-03-06T17:27:40.786-08:00DDR-150 Rotary Positioning StageDirect drive brushless DC servo motor<br /><br /> * Precision ground ABEC-7 4-point contact bearings<br /> * Durable stainless steel top plate with through hole<br /> * Resolution to 0.2 arc seconds<br /> * Highly repeatable Hall effect home and limit switches<br /> * Optional encoder scale cover<br /> * Ideal for:<br /> o Wafer Inspection<br /> o Precision Assembly<br /> o Laser MachiningUnknownnoreply@blogger.com1tag:blogger.com,1999:blog-9008758843622421774.post-83457690590246211842009-03-06T17:23:00.000-08:002009-03-06T17:25:21.612-08:00AEROFLEXAeroflex Microelectronic Solutions is a world leader in the design<br /> and manufacturing of high-reliability integrated circuits and packaging, motion<br /> control and motors, microwave and RF devices, components and subsystems for the<br /> aerospace, medical, industrial, fixed broadband, wireless/mobile, and test and<br /> measure markets. Our customer-focused approach brings flexibility, creativity<br /> and cost-effectiveness to the diverse markets we serve.<br /><br /> Aeroflex Test Solutions is a global leader in the Test and Measurement<br /> Instrumentation marketplace. Our products support a wide range of industries<br /> including aerospace, defense and wireless mobile and broadband communications.<br /> Our proven solutions encompass a full spectrum of instrumentation from turnkey<br /> systems, stand alone boxes or modular components that provide customers with<br /> highly reliable, customized, innovative and cost effective testing<br /> tools.<br /><br /><br />Product areas include ATE, Avionics, Broadband Test, Communications Test, General Purpose Test, PXI, Signal Sources, Stimulus Products, Synthetic and Wireless.<br />Gönderen bebu zaman: 14:01 0 yorum<br />Etiketler: AEROFLEX, Avionics, Broadband Test, Communications Test, General Purpose Test, Product areas include ATE, PXI, Signal Sources, Stimulus Products, Synthetic and Wireless, technology, TEKNOLOJİ<br />Tepkiler: <br />DDR-150 Rotary Positioning Stage<br /><br />Direct drive brushless DC servo motor<br /><br /> * Precision ground ABEC-7 4-point contact bearings<br /> * Durable stainless steel top plate with through hole<br /> * Resolution to 0.2 arc seconds<br /> * Highly repeatable Hall effect home and limit switches<br /> * Optional encoder scale cover<br /> * Ideal for:<br /> o Wafer Inspection<br /> o Precision Assembly<br /> o Laser MachiningUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-9008758843622421774.post-67588668130821257902009-03-06T17:18:00.000-08:002009-03-06T17:19:21.527-08:00HSBC's rights issue Household choresIs HSBC’s $17.7 billion rights issue a sign of weakness or of strength?<br /><br />THERE are two radically different tales doing the rounds about HSBC, Europe’s biggest lender by market value. The first says that HSBC, deep down, is still an emerging-markets operation run by rugged types who disdain the sorcery of modern finance. Under the temporary grip of an evil spell in 2003 they bought Household, an American consumer-credit firm that then haemorrhaged losses. On March 2nd they snapped out of it. HSBC’s chairman acknowledged that it was “an acquisition we wish we had not undertaken”, wrote off its cost and promised to run down its book of dodgy loans. Having opened its heart, HSBC felt able to lower its dividend and raise its core tier-one capital ratio to 8.5%, above those of JPMorgan Chase (6.4%) and Santander (7.2%), two more of the Western world’s biggest banks also vying for the title of the safest one.<br /><br />Against this there is a horror story. It says that HSBC’s definition of capital excludes mark-to-market losses on asset-backed securities (ABS). Furthermore, particularly demanding critics say that it also excludes mark-to-market losses on its loan book. Like almost all banks, HSBC carries these at book value and impairs as customers default. However, include both these items and the core tier-one ratio would drop to just 2%. Treating loan books on the same basis, JPMorgan would be at 5% and many other banks would be insolvent.<br />Click here to find out more!<br /><br />This would suggest that HSBC is in fact poorly capitalised, and needs to raise even more equity. The alternative, advocated by, among others, Knight Vinke, an activist investor, would be to cut loose Household, which HSBC does not legally guarantee and which accounts for just over half of the additional mark-to-market losses. Household’s credit spreads are much higher than HSBC’s, suggesting that investors think this is possible, despite HSBC’s verbal assurances to the contrary.<br /><br />Which story is right? Given the risk of litigation, the reputational hit and the fact that HSBC has itself loaned Household some $13.5 billion, its mark-to-market loss would have to get a lot worse before HSBC was prepared to let it default. And like many banks, HSBC argues that there is at least some chance mark-to-market losses overstate the ultimate impairments it will face. The ABS loss has been very volatile, doubling in six months and stands at ten times HSBC’s “stress test” estimate of the probable hit. The mark-to-market loss on Household’s loan book is double what optimistic analysts think the likely ultimate impairment will be.<br /><br />Pleading that fair-value accounting is cruel is hardly unique, but what makes HSBC’s position more credible than most is that it has the capacity to wait and see. Its funding position is excellent with deposits exceeding loans, reducing its dependence on wholesale markets. And the core business continues to generate lots of pre-provision earnings. If spread out over several years, the bank could absorb the hit from Household implied by the mark to-market valuation without damaging its capital.<br /><br />Indeed the real moral of the tale is different. Compared with other banks HSBC is protected by its big deposit base and its profitability. It looks therefore as if investors will back the rights issue. Others do not have even that comfort.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-9008758843622421774.post-22631280770764496112009-03-06T15:04:00.000-08:002009-03-06T15:05:02.971-08:00The slowdown of the Houston economy is picking up speed.After setting a torrid pace less than a year ago, the local economy is barely adding new jobs now. At the same time, the unemployment rate has shot up, and so has the number of first-time filers for jobless benefits.<br /><br />Houston-area employers created 17,200 new jobs between January 2008 and January 2009, according to data released Thursday by the Texas Workforce Commission. That 0.7 percent year-over-year increase was the weakest since the summer of 2004 and doesn’t include the large layoffs already announced in Galveston at the University of Texas Medical Branch and Shriners Hospital for Children.<br /><br />It’s a sharp departure from just a year ago, when Houston gained 87,400 jobs in the preceding year for a robust 3.5 percent clip.<br /><br />“I think we’re headed to negative territory in just a few months,” said Barton Smith, director of the University of Houston’s Institute for Regional Forecasting. “By May or June they’ll be negative.”<br /><br />Weaker hiring coupled with a spike in the number of folks looking for work caused the local jobless rate to jump to 6.5 percent in January, its highest level since July 2004, according to the commission. In December, the rate was 5.6 percent.<br /><br />The rate is also climbing statewide. In January, the Texas unemployment rate was 6.4 percent, which commission Chairman Tom Pauken expects to grow to 8 percent later this year. Statewide data is seasonally adjusted while local data is not.<br /><br />“It’s occurring a little faster than we thought,” said Smith, referring to the slowdown that has been especially hard on retailers and financial firms.<br />New figures due today<br /><br />While the strong energy industry buffered Houston during 2008, Smith predicts the city soon will lose that cushion. As world economic conditions deteriorate and reduce the demand for energy, he expects widespread job cuts in oil field equipment manufacturing, a key industry for Houston.<br /><br />The layoffs are still relatively mild but they’ll pick up during the year, he said.<br /><br />“The national economic storm has hit us,” said Pauken, who spoke with the Houston Chronicle’s editorial board Thursday.<br /><br />The unemployment rates in Houston and Texas are still better than the U.S. figure, which stood at 7.6 percent in January and rose to 8.1 percent in February, according to federal statistics released today.<br /><br />Pauken pointed to the spike in initial claims for unemployment benefits that has made it difficult for out-of-work Texans to get through on the busy phone lines to file for benefits. The commission is adding phone capacity to handle the calls, he said.<br /><br />He pointed to the spike in initial claims for unemployment benefits that has made it difficult for out-of-work Texans to get through on the busy phone lines to file for benefits. The commission is adding phone capacity to handle the calls, he said.<br /><br />In January, 26,828 Houston-area residents filed initial claims for unemployment benefits. That’s up 24.4 percent from December, when 21,567 residents requested benefits, and nearly double the number of applicants a year ago.<br />Previous report revised<br /><br />It’s not uncommon to see job losses from December to January because companies are cutting holiday help and evaluating budgets, said Joel Wagher, labor market analyst for Workforce Solutions, which manages employment services, education and training for the area.<br /><br />But this time losses were higher than usual because of the struggling economy, he said. It was the worst one-month employment decline in the last 10 years, he said.<br /><br />Also, the latest report included the annual revision of the previous year’s estimates. Houston’s job base didn’t grow nearly as quickly as the commission thought.<br /><br />In January, the commission estimated the Houston area added 57,300 new jobs between December 2007 and December 2008, a 2.2 percent increase. But once actual payroll tax records were tallied, the area gained only 22,500 jobs during that time for a 0.9 percent increase.<br /><br />Houston’s annual job growth peaked last June at 4.6 percent. It has declined ever since, Wagher said.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-9008758843622421774.post-51397508745611012232009-03-05T09:56:00.001-08:002009-03-05T09:56:59.171-08:00hymarkets<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://www.hymarkets.com/english/images/img_companyinfo.jpg"><img style="float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 610px; height: 199px;" src="http://www.hymarkets.com/english/images/img_companyinfo.jpg" border="0" alt="" /></a><br /><br /><br /><br /><br />HY Markets has its global headquarters in London and is authorized and regulated by the Financial Services Authority of the United Kingdom. The Group has over 30 years of operational history and is the trading platform of choice for investors seeking fast and direct access to the world's capital markets.<br /><br />This long-standing expertise has enabled us to develop our revolutionary web-based Internet trading platform, which enables clients to invest in all major capital markets from one integrated account in an easy-to-use interface.<br /><br />HY Markets is a division of the Henyep Group, a global diversified conglomerate with business in financial services, property, education, and charity spanning 3 continents and 20 countries worldwide. The Henyep Group of companies are registered and authorized in world-leading jurisdictions including London, Dubai, and Hong Kong. This provides clients with the comfort and security of a global institution.<br /><br />HY Markets provides investors with efficient and direct access to all their trading needs. Start trading with the security of an FSA regulated company.<br /><br />Advanced Online Trading Platforms<br /><br />The heart of the HY Markets service is our state-of- the-art trading platform. We offer our clients with the choice of an easy-to-use web-based online trading platform, and advanced users download platform with mobile phone trading integration. These cutting-edge multi-product platforms integrate live tradable prices, charting tools, real-time news and market commentary, and complete account information all in easy-to-use revolutionary interfaces.<br /><br /> Start trading in less than 5 minutes<br /> Open an account with just US$50<br /> Forex, oil, gas, commodities, metals, stocks and more<br /> 2 trading platforms to suit your trading needs<br /><br />Complete product offering<br /><br />While many online trading companies only provide Forex trading, HY Markets clients are able to take advantage of our deep product offering including oil/gas, metals, commodities, stocks and more. All traded within a single integrated account. Such access to multiple markets gives our clients a competitive edge to trade all markets and diversify an investment portfolio.<br />Continuous market information<br /><br />Live prices, Live Reuters news, market information, advanced charting systems, and technical analysis tools to give you a competitive edge.<br />Live customer support<br /><br />HY Markets online trading platform is supported by 24 hrs. live dedicated customer support professionals via phone, email and chat.<br />Online account status<br /><br />Technology driven back-office systems that let you check your open positions, equity and P&L online 24hrs a dayUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-9008758843622421774.post-54273273432982815422009-03-04T07:32:00.001-08:002009-03-04T07:32:57.570-08:00Direct drive brushless DC servo motor* Precision ground ABEC-7 4-point contact bearings<br /> * Durable stainless steel top plate with through hole<br /> * Resolution to 0.2 arc seconds<br /> * Highly repeatable Hall effect home and limit switches<br /> * Optional encoder scale cover<br /> * Ideal for:<br /> o Wafer Inspection<br /> o Precision Assembly<br /> o Laser Machining <br /><br /> <br /><br /> <br />Low Profile Direct Drive Rotary Stage<br />Anorad's new DDR-150 rotary positioning stages are designed for precise position and velocity control in light to medium force applications. High performance is achieved through use of a brushless DC servomotor, high resolution optical encoder and precision bearing set all housed in a compact and precisely machined aluminum base with a rugged stainless steel top plate.<br /><br /> <br /><br />The direct drive servo control of the brushless DC motor has several advantages over conventional gear driven rotary stages. Backlash is eliminated, torque variation is minimized, plus gear and brush wear are no longer factors in long term usage. Added benefits include speeds up to 360 rpm, 0.2 arc second resolution and ±1 arc second repeatability. Step-and-settle time is also reduced due to increased servo bandwidth.<br /><br />Available options for the DDR-150 include a variety of encoder resolutions to meet your speed and accuracy requirements. An axial through hole for use with pneumatic or optical devices; adjustable home, limit and hardstop positions; and a sheet metal cover to protect the encoder and internal components.<br /><br /> <br />Specifications<br />Parameter Specification Parameter Specification<br />Travel unlimited Maximum Velocity2 1273 rpm<br />Accuracy ±20 arc sec Acceleration 34 rad/s2<br />Repeatability1 (bi-directional) ±1 arc sec Axial Capacity 25 kg<br />Resolution1 0.214 arc sec Axial Runout (TIR) 5 µm<br />Stability ±2 counts Radial Runout (TIR) 5 µm<br />Minimum move1 0.5 arc sec Wobble3 ±8 µm<br />Peak Torque 7.4 Nm Thru Hole diameter 35 mm<br />Continuous Torque 1.4 Nm Concentricity (Thru hole) ±2 µm<br />Inertia<br /> 0.217 kg-m2 Stage Weight 3.5 kg<br /><br /> <br />DDR-150 Construction Mechanical Features<br />Stationary Base High strength aluminum alloy with black anodized finish (Nickel plating optional)<br />Rotating Table<br /> Stainless steel with passivated finish<br />Bearing System<br /> ABEC-7 precision ground 4-point contact radial bearing<br />Encoder<br /> Incremental optical encoder with reflective tape scale (50 lines/mm)<br />Limit Switches Hall effect home and limit switches<br /><br /> <br /><br /> <br /><br /> 1. With 0.214 arc sec resolution (256x multiplication)<br /> 2. At lowest resolution (top speed dependent on controller and resolution)<br /> 3. Measured at 60mm radiusUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-9008758843622421774.post-88167680798562990272009-03-03T11:53:00.001-08:002009-03-03T11:53:34.080-08:00MetaTrader4 brokerswww.alpari-idc.com<br />www.northfinance.com<br />www.apexfxtrading.com<br />www.bulltrend-bg.com<br />www.fibogroup.com<br />www.fibogroup.ca<br />www.euroforex.net<br />www.fxteam.ru<br />www.forexservice.net<br />www.finmarket.com.ua<br />www.forexgi.com<br />www.forexua.com<br />www.fx-pro.com<br />www.icvector.ru <br />www.forextrade.ru<br />www.cgtim.com<br />www.tradefxdirect.com<br />forex.ukrsotsbank.com<br />www.windsorbrokers.biz<br />www.x-trade.biz<br />www.fxbest.ru<br />www.manfinancial.com.sgen<br />www.sncinvestment.com<br />www.inforex.org<br />www.interbankfx.com<br />www.jaguarsinvestment.com<br />www.joyfg.com<br />www.kvbkunlun.com<br />www.lefco.ru<br />www.mytrustbank.com<br />www.manfinancial.com.sg<br />www.miginvest.com<br />www.orionbrokers.com<br />www.eforex-asia.com<br />www.realtrade.lv<br />www.finance.sts.bg<br />www.teletrade.ru<br />www.fxintegral.com.ua<br />fxdd.com<br />www.neurex.de<br />www.fastbrokersfx.com<br />www.fastbrokers.com<br />www.migfx.ch<br />www.fxdd.comUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-9008758843622421774.post-27221773590579160372009-03-02T12:09:00.001-08:002009-03-02T12:09:50.369-08:00Biomedical Sample HandlingMulti-axis X-Y linear motorized positioning stage<br />ABTech inc's Mini X-Y Linear Motor stage combines Copley Controls, Thrust Tube "Micro" series linear motors with non-contact linear encoders and precision mechanical guideway bearings to produce a unique lightweight, low mass and low profile, linear motor positioning stage.mini-xy_ball_motorized.jpg<br /><br />This design incorporates the linear motors coil (forcer) as the stages workholding carriage while the linear mechanical guideway bearings provide load support, travel straightness and orthogonality for accurate positioning and repeatability.<br /><br />The Thrust Tube linear motors are electrically identical to conventional brushless DC motors making them compatible to most third party brushless drives.<br /><br />These mini X-Y stages are ideally suited for pick-and-place or point-to-point positioning applications such as biomedical sample handling or inspection.<br /><br />ABTech's modular design approach and full engineering services can respond quickly to provide a solution to your O.E.M. needs for ultra-precision linear motion.<br />Features<br /><br /> * Thrust Tube "Micro" series brushless DC linear motors<br /> * Precision linear mechanical guideway bearings<br /> * Non-contact linear encoders<br /> * Position accuracy & repeatability: ±0.000080" (±2.0µm)<br /> * Motor drive amplifiers<br /> * Motion controllers<br /> * Custom bases<br /> * Complete turn-key systems<br /> * Modular designUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-9008758843622421774.post-15771867474046582112009-03-02T05:08:00.000-08:002009-03-02T05:10:27.945-08:00Nükleer Enerji Nedir ?<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://2.bp.blogspot.com/_uRIGfhdMTp4/SavaoRkzDRI/AAAAAAAAAZM/Zz3FamEzQfY/s1600-h/bir_nkleer_patlama_resmi.jpg"><img style="float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 320px; height: 281px;" src="http://2.bp.blogspot.com/_uRIGfhdMTp4/SavaoRkzDRI/AAAAAAAAAZM/Zz3FamEzQfY/s320/bir_nkleer_patlama_resmi.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5308576971233627410" /></a><br />Atomun parçalanışı "denetimsiz fisyon reaksiyonu"na bir örnektir. Böyle denetimsiz reaksiyonlarda bütün enerji çarçabuk açığa çıkar. Enerji istasyonlarının kurulabilmesi için, kararlı bir enerji kaynağına ihtiyaç vardır. Bu ise "denetimli fisyon reaksiyonu" ile sağlanır. Böyle bir reaksiyonda uranyum "yakıtı" yavaş yavaş ve kararlı bir biçimde tüketilir. Parçalanan nükleer zerreciklerin çıkardığı enerji daha sonra ısı enerjisine dönüştürülür. Isı enerjisi parçalanma merkezinden uzaklaştırılarak, suyu buhara dönüştürmekte kullanılır. Bu buharla türbinler döndürülür. Bütün bu işlemler nükleer bir "reaktör"de gerçekleştirilir.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-9008758843622421774.post-86783068648678343022009-03-02T05:06:00.000-08:002009-03-02T05:08:24.531-08:00Bilişim Suçları Hakkında Bilmeniz GerekenlerBİLİŞİM SUÇU İLE KARŞILAŞTIĞINIZDA YAPABİLECEKLERİNİZ<br /><br />1. Yasadışı siteler (web sayfaları) ile ilgili şikayetlerinizi 155@iem.gov.tr adlı e-mail ihbar adresine bildirebilirsiniz.<br />2. Şahsınız ile ilgili şikayetçi olduğunuz konular ile ilgili elde edebildiğiniz tüm deliler ile birlikte en yakın Cumhuriyet Başsavcılığına müracaat ederek şikayetçi olabilirsiniz.<br />3. İl Emniyet Müdürlüğümüz tarafından yürütülmekte olan tüm tahkikatlarda Savcılık talimatı veya Mahkeme kararı esas alınmaktadır.<br />4. Şikayetçi olduğunuz konular ile ilgili olarak yapılacak çalışma neticesinde ISP(İnternet Servis Sağlayıcının) yurt dışında bulunması durumunda Adli Makamlar tarafından yapılacak olan Adli İstinabe ile konunun takibi yapılabilmektedir.<br />BİLİŞİM SUÇLARI İLE İLGİLİ OLARAK MAĞDUR OLMADAN ÖNCE YAPILABİLECEKLERİNİZ<br />1. Şirketinize veya şahsınıza ait önemli bilgilerinizin yer aldığı bilgisayarınız ile özel güvenlik önlemleri almadan internete bağlanmayınız.<br />2. İnternet ortamında %100 güvenliğin hiçbir zaman sağlanamayacağını unutmayın!<br />3. Özellikle Chat ortamında bilgisayarınıza saldırılabileceğini;<br />4. Chat de tanıştığınız kişilere şahsınız, aileniz, adres, telefon, işiniz v.s. konularda şahsi bilgilerinizi vermemeniz gerektiğini unutmayın!<br />5. İnternet ortamında tanıştığınız kişilere kredi kartı bilgilerinizi vermeyin.<br />6. İnternet üzerinden yapılan yazışmalarınızda karşınızdaki kurumlarla özel bir yöntemle yazışmanızda fayda olacaktır. Bu şekilde sizin adınıza birlikte ticaret yaptığınız şirketlere asılsız bilgiler veya sizi kötüleyici bilgiler gönderilse bile karşı taraf bunun sizden gelmediğine emin olacaktır.<br /><br />TÜRKİYEDE BİLİŞİM SUÇLARI<br /><br />Teknoloji her geçen gün ilerlemekte, her geçen gün farklı suç türleri ortaya çıkmaktadır.Bu kapsamda değişime ve gelişime en açık olan suçu ise bilişim suçları oluşturmaktadır.Bu nedenle bu suç türünün de ayrı bir başlık altında incelenmesi gerekmektedir. Globalleşen dünyada yeni bir teknolojik gelişme bütün dünyaya yayılmaktadır. Bunun sonucunda da ülkemizde de gelişen teknolojiye bağlı olarak yeni bilişim şuçları ortaya çıkmaktadır.<br />Bilişim suçlarını oluşturan maddi vakıalara örnek olarak şunları verebiliriz.<br />• Başkalarının adına e-mail göndererek özellikle ticari ve özel ilişkileri zedeleme.<br />• Başkalarının adına web sayfası hazırlamak ve bu web sayfasının tanıtımı amacıyla başkalarına e-mail ve mesaj göndermek ve bu mesajlarda da mağdur olan şahsın telefon numaralarını vermek.<br />• Kişisel bilgisayarlar yada kurumsal bilgisayarlara yetkisiz erişim ile bilgilerin çalınması ve karşılığında tehdit ederek maddi menfaat sağlanması<br />• Şirketlere ait web sayfalarının alan adının izinsiz alınması ve bu alan adlarının karşılığında yüklü miktarlarda para talep etmek.<br />• Özellikle Pornografik içerikli CD kopyalamak ve satmak.<br />• Sahte evrak basmak<br />Suçların türünü yukarıda sayılmış olan maddi vakılar oluşturmaktadır. Suçu işleyebilmek için türlü yollar kullanılabilmekte,bunun ötesinde bu tür suçların işlenmesindeki asıl amaç eylemin sonucundaki menfaat olmaktadır.11.06.1999 tarihinde Birleşmiş Milletler ve Avrupa Birliği tarafından hazırlanan “Bilişim Suçları” raporuna göre ; suç çeşitleri altıya ayrılmaktadır.Bunlardan birincisi “Bilgisayar Sistemlerine ve Servislerine Yetkisiz Erişim ve Dinleme” olarak tanımlanır.İkinci olarak tanımlanan bilişim suçu “Bilgisayar Sabotajı” dır.Bir diğer suç kavramı “Bilgisayar Yoluyla Dolandırıcılık” tır.Başka bir siber suç ise “Bilgisayar Yoluyla Sahtecilik” kavramıdır.Beşinci suç türü ise “Kanunla Korunmuş Bir Yazılımın İzinsiz Kullanımı” şeklindedir.Son olarak tanımlanan bilişim suçu ise “Diğer Suçlar” başlığı altında Yasadışı Yayınlar,Pornografik Yayınlar (Büyük ve Çocuk Pornografisi),Hakaret ve Sövme olarak değerlendirilmektedir. [Computer Sabotage , Unauthorizied Access,Computer Fraud ,Child-terbiyesiz bişey yazdım Porn ] Buna benzer yine Internet ortamında işlenen suçlarla mücadele etmek maksadıyla, 23 Kasım 2001 tarihinde Budapeşte’de imzaya açılan,Avrupa Ülkeleri ile Kanada,Japonya,Güney Afrika ve ABD dahil 33 devlet tarafından imzalandığı halde henüz Avrupa Birliği ile flört eden Türkiye’nin imzalamamış olduğu; Avrupa Konseyi Siber Suç Sözleşmesine göre;bilgisayar veri ve sistemlerinin gizliliğine,bütünlüğüne ve kullanımına açık bulunmasına yönelik suçlar kapsamında hukuka ayıkırı erişim,yasa dışı müdahale,verilere müdahale,sistemlere müdahale,cihazın kötüye kullanımı fiilleri;bilgisayarla ilişkili suçlar çerçevesinde ise sahtecilik,dolandırıcılık,telif haklarının ve benzeri hakların ihlaline ilişkin fiiller ve içerikle ilişkili olarak çocuk pornografisine yönelik fiiller,cezalandırma konuları arasında sayılmış;bu hususlarda ulusal ve uluslar arası alanda gerekli etkin yaptırım ve işbirliğine ilişkin düzenlemeler belirtilmiştir.Avrupa devletlerinin bir çoğu (Almanya, İtalya, Finlandiya, Avusturya, Yunanistan, İsveç, Danimarka, Norveç ve Hollanda gibi) mevcut yasal hükümlere eklemeler yapmış; ABD, İngiltere ve İrlanda gibi Anglosakson sistemine dahil bazı devletler ise bu konularda özel düzenlemelere gitmişlerdir.<br />Türkiye’de son yıllarda bilgisayar kullanımının artması ve her sokak başında internet cafelerin kurulması sonucu sanal alemdeki suç oranları hızla artmaya başlamıştır. Hırsızlık, dolandırıcılık, soygun, terörizm, sabotaj ve kaçakçılık gibi pek çok suç dijital ortama taşınmıştır. Türkiye’de işlenen bilişim suçları her geçen yıla göre yüzde 100 e yakın bir artış göstermektedir.Bilgisayar kullanımının bu kadar artaması nitelikli suçların hızla artmasına sebep olmuştur.Türkiye’de Emniyet Genel Müdürlüğü (EGM) Bilgi İşlem Daire Başkanlığı Bilişim Suçları Araştırma Büro Amirliği bilişim suçlarının araşıtırılıp incelenmesinde ve bilişim şuçlarına verilen önemde etkin olmuştur. İstanbul, Ankara,İzmir, Adana,Konya, Bursa, Malatya,Diyarbakır bilişim şuçlarının en çok işlendiği iller olarak karşımıza çıkmaktadır.<br />Emniyet Genel Müdürlüğü, il emniyet müdürlüklerindeki verileri alarak, Türkiye’deki bilgisayar suçlarının haritasını çıkarmıştır.Takibi şikayete bağlı suçlar, Interpol aracılığıyla intikal eden suçlar ve polisin bizzat ilgilendiği suçlardan oluşmaktadır.1998 yılında Türkiye'de işlenen bilişim suç sayısı 5 iken, 1999'da bu sayı 15'e yükselmiş. 2000 yılında 80'i bulan suç dosyasının sayısı, 2001 yılına gelindiğinde 136'yı bulmuş. Her geçen yılda artış göstererek ilerlemiştir. Elde edilen sonuçlar, Türkiye’deki bilgisayar suçlarının, lisans haklarının ihlali, dolandırıcılık, sahtecilik, yasadışı yayınlar ve bilgisayar sabotajı şeklinde geliştiğini göstermektedir. Sanal alemdeki dolandırıcılık suçlarının büyük bir kısmı kredi kartları üzerinden yapılmaktadır. Değişik yöntemlerle ele geçirilen kredi kartı numaralarıyla bilgisayar üzerinden alışveriş yapılması en yaygın yöntem olmaktadır. Otomatik para çekme makineleri olarak bilinen ATM dolandırıcılığı ise kredi kartlarından sonra ikinci sırada yer almaktadır. Kredi kartlarının ATM cihazında sıkıştırılması, değişik hilelerle şifrelerin öğrenilmesi veya kartların hırsızlık yoluyla elde edilmesi suretiyle dolandırıcılık yapılmaktadır. Evrak, para, Milli Piyango bileti, kimlik kartları, sigorta poliçeleri, pasaportlar ve yazarkasa fişlerinin sahteleri sahtecilik suçları da bu kapsamda yapılmaktadır.<br />Lisans hakları ihlali içinde en yüksek oranı yüzde 82 ile filmlerin çoğaltılması oluşturmaktadır. Bilgisayar oyunları ve müzik CD’lerinin çoğaltılması da sanal alemin diğer lisans hakkı ihlalleridir.<br />Interpol verileri, yasadışı yayın suçları arasında ilk sıranın yüzde 40’la çocuk pornografisine ait olduğunu göstermektedir. Genel anlamdaki pornografik yayınların oranı da yüzde 25. Bunlar, daha çok internet kafe gibi ortamlarda pornografik içeriklerin gösterimi ve CD’lerinin satışından oluşmaktadır. Terör içerikli web sayfaları hazırlanması suretiyle işlenen suçların oranı ise yüzde 30. Şikayete bağlı suçlardan kişilik haklarına saldırı ve hakaret ise yüzde 5 oranında işlenmektedir.<br />Türkiye’de Emniyet Teşkilatı'nda bilişim ile ilgili temel, 1982 yılında Bilgi İşlem Daire Başkanlığının kurulmasıyla atıldı. 1997 yılında ise Bilişim Suçları Bürosu kuruldu. 2001 yılında bu büronun adı İnternet ve Bilişim Suçları Şube Müdürlüğü olarak değiştirildi. Bu birimin dışında da diğer daire başkanlıkları altında Bilgi İşlem Şube müdürlükleri kuruldu. Bu daireler kendi görev alanlarına giren konularda bilişim suçları ile mücadele etmektedir. Ayrıca merkez teşkilatı içinde bir Bilgisayar Suçları ve Bilgi Güvenliği Kurulu ve Üst Kurul oluşturulmuştur. 2001 yılında Kaçakçılık ve Organize Suçlar Daire Başkanlığı ile Birleşmiş Milletler tarafından ortaklaşa kurulan TADOC (Turkish Academy Against Drug and Organised Crime) bünyesinde de Bilişim Suçları Araştırma Merkezi oluşturulmuştur. Bu merkez faaliyetlerini daha çok bu suçlar ile mücadelede, ilgili birimlere yön göstermek amacıyla akademik destek niteliğinde çalışmalar yapmaktadır. Bu merkezi yapılanmanın yanında büyük illerde de bilgi işlem büroları kurulmuş ve bu alanda karşılaşılan sorunlar ile ciddi anlamda mücadele etmeye başlanmıştır.<br />Türkiye’de genel olarak, ülkemizde bilişim suçları denince akla iki olay gelmektedir: Kredi kartları ve pornografik CD'ler başta olmak üzere telif haklarının konusunu teşkil eden korsan CD'ler.<br />Bilişim suçlarına ilişkin olarak yapılan üçlü sınıflandırma gözönüne alınırsa bilgisayar aracılığıyla işlenen suçların ülkemizde daha yaygın olduğu görülmektedir. Ancak bilgisayar sistemleri aracılığıyla işlenen suçların birçoğu takibe bağlı suçlardan olduğu için mağdurların şikayeti olmadan resen ele alınmamaktadır. Örneğin elektronik posta yoluyla yapılan bir tehditte, tehdit edilen kişi veya kurum bunu polise bildirmezse polisin bu olaydan haberdar olması ve işlem yapması mümkün olmamaktadır.<br />Riptech'in yayınladığı rapora göre, siber saldırılar en fazla ABD'de olurken, Türkiye 6. sırada yer almaktadır.<br />Türkiye’de işlenen bilişim suçlarına ait oransal veriler ise şu şekildedir.<br />Lisans hakları ihlallerinin yüzdesi<br />% 4 müzik<br />% 14 oyun<br />% 82 film<br /><br />BİLİŞİM SUÇLARI NELERDİR<br /><br />Bilişim suçlarının çok çeşitli tanımları vardır .Bunlardan, Avrupa Birliği Uzmanlar Komisyonu’nun Mayıs 1983’deki Paris Toplantısı’nda ‘bilgileri otomatik işleme tabi tutan veya verilerin nakline yarayan bir sistemde gayri kanuni, gayri ahlaki veya yetki dışı gerçekleştirilen her türlü davranış’ olarak tanımlanmıştır. Özünde bilişim suçları terimi, teknolojileri kullanarak işlenen bir suç unsurudur.<br />Bilişim Suçlarının Türlerini belirlemekte sorun olarak karşımıza çıkmaktadır. Bilişimle ilgili suç türlerini çok değişik şekillerde ortaya koymak mümkündür. Ancak , konuyu makul bir seviyede ele alarak, en çok görülen ve en ağır nitelikli olan suç türlerinin ele alınmasında yarar vardır.<br />Suçun işlenmesindeki esas konuyu suçlar arasındaki farklar oluşturur.Bir hedefe ulaşabilmek için türlü yollar kullanılabilir,bunun ötesinde asıl amaç hedeftir. Yani suçun türleri arasındaki farkı oluşturan esas etken suçun işlenmesindeki amaçtır. Bu haliyle Suçların türleri TCK da suç teşkil edecek tüm suçları kapsaya bilmekte veya bu suçlara zemin hazırlamaktadır. Suç çeşitleri ayrımında, 11.06.1999 tarihinde Birleşmiş Milletler ve Avrupa Birliği tarafından hazırlanan “Bilişim Suçları” raporuna göre ; suç çeşitleri altıya ayrılmaktadır. Bunlardan birincisi “Bilgisayar Sistemlerine ve Servislerine Yetkisiz Erişim ve Dinleme” olarak tanımlanır.İkinci olarak tanımlanan bilişim suçu “Bilgisayar Sabotajı” dır.Bir diğer suç kavramı “Bilgisayar Yoluyla Dolandırıcılık” olarak kabul görür.Başka bir siber suç ise “Bilgisayar Yoluyla Sahtecilik” kavramıdır.Beşinci suç türü ise “Kanunla Korunmuş Bir Yazılımın İzinsiz Kullanımı” şeklindedir.Son olarak tanımlanan bilişim suçu ise “Diğer Suçlar” başlığı altında Yasadışı Yayınlar,Pornografik Yayınlar (Büyük ve Çocuk Pornografisi),Hakaret ve Sövme olarak değerlendirilir.<br />Bu suç türlerini teker teker açıklayacak olursak;<br />1)Bilgisayar Sistemlerine ve Servislerine Yetkisi Erişim ve Dinleme<br />“Erişim” sistemin bir kısmına,bütününe,bilgisayar ağı veya içerdiği verilere,<br />programlara; yine programlar,casus yazılımlar veya virüsler vb. ile ulaşma anlamındadır.Günümüzde özel hayatın gizliliğinin korunması için kanunlarda gerekli müeyyideler konulması ile birlikte dinlemeler ,erişimler ,izinsiz özel ve şirket bilgisayarlarına ve sistemlerine girmek suç olarak kabul edilmiştir..<br />Günümüzde telefon dinlemeleri veya kişilerin özel mülklerine girmek nasıl savcı izni olmadan mümkün olmamakta ise yine kişiler veya kurumlar arası haberleşmenin bilgisayar üzerinden dinlenmesi veya izinsiz bilgilerin alınması da kişi özel mülkü ya da kişilerin şahsiyetlerine taciz olarak kabul edilmektedir ve suç oluşturmaktadır.<br />Ülkemizde bu konuda TCK’nın (Türk Ceza Kanunu) 243. maddenin 1. ve 2. fıkrasında açıkça belirtilmiştir.<br />Bu bölümde incelenmesi gereken konulardan biri de casus yazılımlardır.Bu yazılımlar<br />hukuki olarak suç sayılmamaktadır,fakat bu konuda tartışmaya açık bir kavram olduğu da bir gerçektir.<br />-Casus Yazılımlar Ve Etkileri<br />Casus yazılımlar bir bilgisayara kurulduktan sonra bilgisayarınıza girdikten sonra<br />bilgisayarınızda farklı etkiler bırakarak,ya da bilgisayarınız içerisinde deyim yerindeyse casusluk yaparak rahatsız eden yazılımlar olarak ifade edilir.<br />Casus yazılımların belli başlı amaçları; eriştiği ya da kurulduğu bilgisayarlardaki verileri,gezilen siteleri,bilgisayar içeriğindeki bilgilerin işe yarayan kısımlarını belli bir hedefe(doğrudan merkeze) göndermesine ya da bilgisayardan istenmeyen reklamların çıkmasına,internetten reklam indirmesine yol açmaktadır.<br />Tartışmaya açık olarak bu tür yazılımlar Kanunen suç sayılmamaktadır. Bu yazılımları, yine bu yazılımların lisans anlaşmasıyla kullanılmasını kabul ederek yüklediğinizden , bu tür yazılımları kanuni olarak gösterilmektedir.<br />2)Bilgisayar Sabotajı<br />Bu suç türü iki şekilde karşımıza çıkmaktadır.<br />1. Bilgisayar teknolojisi kullanarak sistemine sızılan bilgisayardaki bilgilerin<br />silinmesi, yok edilmesi ve değiştirilmesi.<br />2. Hedef alınan sisteme uzaktan erişerek değil de bilakis fiziksel zarar vererek yada sistem başında bulunarak bilgisayardaki bilgileri silmek,yok etmek veya değiştirerek zarar verilmesi.Burda önemli olan mala verilen zarardan ziyade içindeki bilgilere verilen zarar önem arzeder.<br />Yetkisiz erişimin aktif sahası olarak da nitelendirilen “Bilgisayar Sabotajı”,yalnız sisteme erişimle kalmamakla birlikte,eriştiği sistem (bilgisayar)‘ın içerdiği bilgileri silme veya değiştirme olarak ifade edilir.<br />Bir bilgisayara veyahut sisteme yetkisiz erişim sağlayanlar; sadece eriştiği bilgileri incelemekle,kopyalamakla kalmıyor, bu bilgileri değiştirebiliyor, silebiliyor ya da bu bilgileri kanun dışı kullanmak isteyenlere satabiliyor.<br />Türkiye’de “Bilgisayar Sabotajı” TCK(Türk Ceza Kanunu)’nun 243/ 3 ile 244/1 ve 2 maddelerine göre suçtur.<br />Virüsler,Wormlar ve Zombiler kötü amaçlı olarak yazılmış kodlardır.<br />Bu tür kötü amaçlı yazılmış kodlar,başkalarına zarar vermediği sürece suç sayılmamaktadır.Fakat bu tür kodlar; kişi ya da kurumlara intikal eder ve zarar verirse suç teşkil etmeye başlar. Yoksa sırf kod yazımı saikten öte bir anlam ifade etmemelidir.<br />Türkiye’de kötü amaçlı kodları yazma bunu yaymaya ilişkin açık bir hüküm bulunmamaktadır.Bu nedenle Kötü amaçlı kodlarla bilgisayarlara zarar verme, doktrinde genellikle “sistem ve unsurlarına yönelik nas-i ızrar suçu” olarak adlandırılmaktadır, oysa sabotaj konusunda belirttiğimiz TCK maddelerine bu bölümü de dahil etmek daha uygun olacaktır.<br />3)Bilgisayar Yoluyla Dolandırıcılık<br />Dolandırıcılık genel bağlamda “Hileli davranışlarla bir kimseyi aldatıp, onun veya başkasının zararına olarak, kendisine veya başkasına bir yarar sağlamaya” denmektedir.Bilişim kavramı olarak “Dolandırıcılık” bilgisayar veya iletişim araçlarıyla kişileri şaşırtma,aldatma,kandırma olarak tarif edilebilir.<br />Bilgisayar Yoluyla Dolandırıcılık suçu;<br />Kredi kartlarının bir benzerinin yardımcı programlarla oluşturulması yoluyla<br />Yetkisiz ve izinsiz erişilen bilgilerin kopyasını olmak şeklinde<br />Finans bilgilerinin tutulduğu programlarla yapılan değişiklik ile istenilen kişinin hesabına istenildiği kadar para aktarmak suretiyle<br />Kişiler arasında mali alışverişi olan kişilerin adına mail vs. Şeklinde iletişim kurarak;<br />kişileri kandırarak , işlenmektedir.<br />Ülkemizde bu tür suçlar TCK(Türk Ceza Kanunu)’da 158.maddenin (1). fıkrasının (f) bendinde,244.maddenin (3).fıkrasında ve 245.maddesinin (1). Fıkrasında hüküm altına alınmıştır.<br />4)Bilgisayar Yoluyla Sahtecilik<br />Klasik olarak tabir edildiğinde ,Bir şeyin aslına benzetilerek yapılan düzmece olarak tarif edilebilmektedir.Bazen ileri teknoloji ürünü cihazlar kullanılarak,bazen de çok basit web programcılığı ( Fakemail,Phishing) yöntemiyle sahtecilik yapılmaktadır. Günümüzde başkalarının adına e-mail göndererek,ticari ve özel ilişkileri zedelenmesini sağlamak, başkalarının adına web sitesi hazırlamak ve bu web sitesinin tanıtım amacıyla başkalarına e-mail ve mesaj göndererek (iletişim kurarak) ve bu mesajlarda da mağdur olan şahsın telefonlarını vererek,sahte para,sahte evrak,sahte bilet vb. basma yönetimiyle bu suç işlenmektedir.<br />Ülkemizde bu tür suçlara yönelik kanunlarda henüz net bir tanımlama yapılmamıştır.Fakat yeni TCK(Türk Ceza Kanunu)’nın 158. maddesinin f bendi uygulanılabilirliği sözkonusudur.<br />5) Kanunla Korunmuş Bir Yazılımın İzinsiz Kullanımı<br />“Kanunla Korunmuş Bir Yazılımın İzinsiz Kullanımı” yazılımların; yasadışı yöntemlerle kopyalanmasını,çoğaltılmasını,satılmasını,dağıtılm asının ve kullanılmasını ifade eder.<br />Ülkemizde 5846 no’lu Fikir ve Sanat Eseleri Kanunu (FSEK) lisanslı yazılımları satın alan kişiye bir adet kopyalama hakkı vermekte,daha fazla kopyanın yapılmasını,satılmasını,<br />yazılımın kiralanmasını yasaklamaktadır.<br />6)Yasadışı Yayınlar<br />Yasadışı olarak kabul edilen unsurların bilgisayar sistemleri,ağları,internet aracılığıyla yayınlanması ve dağıtılması olarak ifade edilir.Kanunun yasaklamış olduğu bu materyaller; web siteleri(sayfaları), elektronik postalar,haber grupları,forumlar,iletişim sağlayan her türlü araç,optik araçlar tarafından kayıt yapan tüm sistemler olarak kabul edilir.<br />Yasadışı yayınları üç gruba ayırmak mümkündür.Bunlardan birincisi,vatanın bölünmez bütünlüğüne aykırı olarak hazırlanmış terör içerikli internet siteleridir(sayfalarıdır).Bu tür siteleri hazırlayanların asıl amacı sansür konulmuş Anyasaya aykırı fikirlerini , interneti kullanarak yaymak ,bu sayede de kendilerine taraf toplayarak vatanın bütünlüğünü bozacak düşüncelerini ifade etmektir..<br />Yasadışı yayınların bir diğeri ise toplumun genel ahlakına,ar ve haya duygularına aykırı düşen yayınlardır.Bunlar pornografik görüntü veya yazılar şeklinde olmaktadır. Türkiye’de TCK (Türk Ceza Kanunu)’da 77,102,103 ve 104. maddeleriyle büyük ve çocuk pornografisi yasaklanmıştır.<br />İnternet aracılığıyla fiilen işlenen suçlardan üçüncüsü ise; bir kişiye,kuruma vb. karşı yapılan hakaret ve sövme suçudur.Bu suç türü internet üzerinden başkalarının adına uygun olmayan e-mailler göndererek kişi ya da kurumların itibarını zedelemek suretiyle olabilmektedir.Bir başka yol ise yine kişi ya da kurumların sahip oldukları adın,lakabın web üzerinden satın alınarak,kişi aleyhine yayında bulunmak suretiyle medyana gelebilmektedir.<br />Kısaca 6 Anabaşlık altında toplanan Bilişim Suçları Türlerinin bir çoğu yasalarımızda suç olarak düzenlenmiş ve bu sayede koruma altına alınmıştır. Lakin günümüz tekolojisinin hızlı ilerlemesi, internetin sürekli yaygınlaşması nedeniyle, bu gün suç türleri arasında sayılmayan yeni bir çok zarar amaçlı kullanımlar oluşacaktır. Yasalarımız teknolojik gelişmelerle aynı hızda ilerlemez ve yenilenmezse , bu tür fiilere karşı kanunlarımızda boşluk oluşacak, bu fiilleri işleyerek büyük zararlar doğuran şahıslara karşı hiçbir müeyyide uygulanamayacaktır. Bu halde Devlet yetkilileri, Hukukuçular ve Emniyet Mensupları sürekli yeni gelişmeleri takip ederek yasal boşlukların giderilmesi konusunda çalışma yapmalıdırlar ki ,İnternet yoluyla yapılan iletişim hizmetlerin en üst düzeyde güvenliği sağlanabilmiş olsun.<br />Güvenli iletişim imkanlarımızın devam edebilmesi için İnternet kullanıcıları olarak bizlerde, yukarıda belirtilen suç türleri içine giren, yasaya aykırı olduğunu bildiğimiz eylemleri ve bu eylemlerin uygulayıcılarını en kısa sürede emniyet birimlerine bildirmemiz gerekmektedir.Bu sayede bu tür suçların yaygınlaşmasına engel olunabilinecektir.<br />Tanımı<br />Bilişim Suçlarıyla ilgili olarak karşımıza bir çok tanım çıkmaktadır; Bilgisayar suçları, dijital suçlar, internet suçları, siber suçlar, ileri teknoloji suçları v.b.Tüm bunlar ayrı bir tanım olmakla beraber bilişim suçları terimi kullanıldığında bahsedilen bu teknolojileri kullanarak işlenen tüm suçları kapsamaktadır.<br />Bilişim Kelime anlamı olarak; insanların teknik,ekonomik ve toplumsal alanlardaki iletişiminde kullandığı ve bilimin dayanağı olan bilginin,özellikle elektronik makineler aracılığıyla düzenli ve akılcı bir şekilde işlenmesi olarak kabul edilmektedir.<br />Bilişim Suçları Halk deyimi ile; Bilgisayar Suçları” olarak tanımlanabildiği gibi “İletişim Suçları” , “Internet Suçları” , “Dijital Suçlar” , “Teknolojik Suçlar” , gibi tanımlamalar da yapılmaktadır.<br />Bilişim Suçlarını Avrupa da ki ilk tanımı ise şu şekilde; AET Uzmanlar Komisyonu’nun [8]Mayıs 1983 yılında Paris Toplantısında yaptığı tanımlamaya göre; “Bilgileri otomatik işleme tabi tutan veya verilerin nakline yarayan bir sistemde gayri kanun, gayri ahlakî ve yetki dışı gerçekleştirilen her türlü davranıştır.” denmektedir.<br />Genel manada bilişim suçları tanımı ise;Her türlü teknoloji kullanılarak,kanuni olmayan yollarla kişisel ya da kurumsal bilgisayarlarda,sistemler üzerinde zarar verici etki bırakmaktır.Bilişim teknolojilerinde suç meydana gelebilmesi için mutlaka teknoloji kullanılmalıdır.Bu teknoloji bilgisayar,kredi kartı,telefon,poss makinesi,elektronik bir cihaz olarak düşünülebilir.<br />Bilişim Suçlarının Hukuki tanımı ve TCK daki yeri; Bilgileri otomatik bir sisteme tabi olan bilgisayar ,bilgisayar programları ile iletişim teknolojilerinin verilerini hukuka aykırı bir biçimde ele geçiren, ele geçirerek değiştiren, yok eden, erişilmez kılan böylece bir başkasının zarara uğratılmasının sağlanması veya kendisine ve başkasına maddi bir çıkar sağlanması Bilişim Suçunu oluşturmaktadır..5237 sayılı Türk ceza kanununda ayrı bir başlık halinde düzenlenen bilişim suçları kanunun 243, 244 ve 245. maddeleri ile tanımlanmaktadır.<br /><br />BİLİŞİM SUÇLARININ TÜRLERİ NELERDİR?<br /><br />Suçların türleri TCK da suç teşkil edecek tüm suçları kapsaya bilmekte veya bu suçlara zemin hazırlamaktadır. Suçların işleme şekilleri;<br />Hakaret, küfür, kredi kartı yolsuzlukları, sahte belge basımı, bilgilerin çalınması ve buna bağlı olarak devam edebilecek suçları kapsamakla, birlikte bunlarla sınırlı olmayıp, günden güne değişiklikler göstermektedir. İl Emniyet Müdürlüğümüz Bilgi İşlem Şube Müdürlüğümüz 1999 yılından itibaren değişik birimlerden ve Cumhuriyet Başsavcılıklarından gelen talepler doğrultusunda çalışmalarına başlamıştır. 1999 yılında başlayan çalışmalarımız talebin atması nedeniyle Bilgi İşlem Şube Müdürlüğü içerisinde bulunan Bilgi Sistemi Büro Amirliği bünyesinde çalışmalarını sürdürmüştür. 2002 yılından itibaren Emniyet Genel Müdürlüğü bünyesinde İnternet ve Bilişim Suçları Şube Müdürlüğün kurulması sonucu taşra teşkilatı olarak Şube Müdürlüğümüz içerisinde Bilişim Suçları Büro Amirliği adı altına çalışmalarını sürdürmektedir.<br /><br />ÜLKEMİZDE EN ÇOK KARŞILAŞILAN BİLİŞİM ŞUÇLARINDAN ÖRNEKLER<br /><br />* Başkalarının adına e-mail göndererek özellikle ticari ve özel ilişkileri zedeleme.<br />* Başkalarının adına web sayfası hazırlamak ve bu web sayfasının tanıtımı amacıyla başkalarına e-mail ve mesaj göndermek ve bu mesajlarda da mağdur olan şahsın telefon numaralarını vermek.<br />* Kişisel bilgisayarlar yada kurumsal bilgisayarlara yetkisiz erişim ile bilgilerin çalınması ve karşılığında tehdit ederek maddi menfaat sağlanması<br />* Şirketlere ait web sayfalarının alan adının izinsiz alınması ve bu alan adlarının karşılığında yüklü miktarlarda para talep etmek.<br />* Özellikle Pornografik içerikli CD kopyalamak ve satmak.<br />* Sahte evrak basımı gibi çok farklı konuları içerebilmektedir.<br />* NOT: Unutmayın bu tür suçların tek mağduru siz değilsiniz. Karşılaşılmış olan durumdan utanmadan tüm deliller ile birlikte en yakın Cumhuriyet Başsavcılığına başvurunuz.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-9008758843622421774.post-14500777647253860022009-03-01T05:24:00.000-08:002009-03-01T06:00:15.516-08:00WENESCO<blockquote><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://img2.blogcu.com/images/m/e/r/meryemaslan/p19d.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 230px; height: 302px;" src="http://img2.blogcu.com/images/m/e/r/meryemaslan/p19d.jpg" border="0" alt="" /></a><br /><br /><br /><br />ABOUT WENESCO MELTERS: All of our melters are made according to a basic design. The material to be heated is contained in a liner (crucible). Heater elements are then placed adjacent to the liner. The liner and heater elements are surrounded by insulation. Finally, a steel or stainless steel housing contains the entire assembly. Heater elements are easily replaced by the user. <br /><br />The design of the melter varies with the melting temperature and chemical characteristics of the material to be heated. <br /><br />Wax compounds, hot melt, soap, and other thermoplastics, in the 80F to 450F range are best heated using convection type heating elements and low-watt density band heaters. Many of our melters feature power control in addition to an accurate thermostat to maximize even heating. A heated dispensing valve is usually provided. A stirrer may be added to assure consistency in a blend. <br /><br />Melters, in the 80F to 1000F range are widely used to melt solder, babbit, pewter, tin, lead and other soft metals. These melters are carefully insulated to preserve energy and maintain operator safety. Pot liners are available to handle “lead free” alloys and salt compounds. <br /><br />Larger melters are available in electric, natural gas, or propane versions. Gas melters usually cost more to buy than electric models, but depending upon power costs in your area, may cost less to operate,<br /><br />Please click on the links below to find what you are looking for. But if we don't have it, chances are Wenesco can make it for you, because we've been specializing in custom engineering and production for decades! <br /><br />Always call for free quotes & information.<br /><br /> Electric Melters for<br /> <br /><br />Temp. Range<br />Candle wax, gel wax, soy wax, soap 80F--250F<br />Hot melt strippable coatings 80F-400F<br />Various compounds, plastisols, adhesives 80F -- 450F<br />Solder, tin, lead, babbitt 80F--1000F<br />Gold or silver in small crucibles 1800F--2200F<br /> <br /><br />Gas Melters<br /> <br />Gas-fired melters for soft metals 80F--1000F</blockquote>Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-9008758843622421774.post-77760517325079961632009-03-01T02:14:00.000-08:002009-03-01T02:15:47.177-08:00Welcome to the Dakota Ultrasonics<blockquote><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://www.dakotaultrasonics.com/Build.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 682px; height: 511px;" src="http://www.dakotaultrasonics.com/Build.jpg" border="0" alt="" /></a><br /><br /><br /><br /><br /><br />We are a manufacturer of industrial ultrasonic testing equipment most commonly used in the petrochemical, aerospace, automotive, and other generally related industries. The pages that follow will provide you with general information regarding our products. If you have any questions, need technical support, or have a request for custom items, please contact us at your leisure using the information provided on this site.<br /><br />Our products are commonly used to determine the thickness of a variety of materials by making contact with only one side of the material being tested. They have the ability to detect very fine pits, flaws, and porosity in materials without having to destroy the material or parts being tested. This is done by converting the transit time of a sound wave, sent into and reflecting back from a defect or opposite surface in the test material, into a length measurement. This technique uses principles similar to that of sonar.<br /><br />We also manufacture a line of ultrasonic bolting equipment that very accurately measures the stress, elongation, and load in threaded fasteners. These products are typically used in critical bolting applications where extreme accuracy is needed. If you have any specific or specialized bolting applications in mind, be sure to contact us to discuss your requirements in detail.<br /><br />Enjoy!</blockquote>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-9008758843622421774.post-24178648265563969662009-02-28T18:41:00.000-08:002009-02-28T18:43:40.328-08:00HSBC Premier International Recognition and Emergency SupportInternational Recognition and Emergency Support<br />Wherever you go, we're only a phone call away<br /><br />You relish immersing yourself in different cultures for business and pleasure. But you value the reassurance that wherever you go, help is always on hand from someone who understands your needs and speaks your language.<br /><br />HSBC Premier can provide useful local information about everything from restaurants to cultural events and entertainment.<br /><br />The international banking benefits that HSBC Premier provides will also cover your family, so you can rest easy while your children travel for study or work.<br /><br />HSBC Premier's international banking services include:<br /><br /> * Guaranteed priority service for all your international banking needs<br /> * In an emergency, simply call HSBC Premier's emergency hotline +1-908-PREMIER or HSBC Bank International +44 1534 616313 for international assistance<br /> * Emergency cash advance<br /><br />Feel at home wherever you are with HSBC Premier's international banking services.<br /><br /> <br />In Detail<br /><br />Red carpet treatment at HSBC Premier centres worldwide<br />Premier customers have access to the 250+ dedicated HSBC Premier centres in 36 countries worldwide.<br /><br />Services available include:<br /><br /> * Assistance from a Premier Relationship Manager<br /> * Emergency cash advance of US$2,000<br /> * Replacement card in the event of loss or theft within 36 hours<br /> * Access to telephone and internet banking<br /> * Local insight and information to make your trip more rewarding<br /> * Free complimentary drinks and newspapersUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-9008758843622421774.post-67625320427429705812009-02-28T18:09:00.000-08:002009-02-28T18:10:26.821-08:00Land & Sea�s DYNOmite Chassis Dynamometer Systems combineFWD/RWD 700+ Hp** chassis kits include 12" medium inertia dual-roller assembly, removable roller shield, drive-up ramps, wheel chocks, casters, water or eddy current absorber with step-up drive, electronic torque transducer, DYNOmite data-acquisition computer, AC power supply, Electronic Auto-Load Control, DYNO-MAX 2000� software, inductive RPM pick-up, required hoses, engine temperature thermistor, and full-function data harness. (Optional AWD upgrade, with dual eddy current absorbers and an electrically adjustable wheelbase system, is shown in the image at right.)<br /><br /> 1,200 to 2,500+ Hp** Pro chassis kits include a FWD/RWD (optional AWD upgrade shown below) tube steel frame with 24", 30", 44", or 60" diameter medium inertia rolls, bolt-on diamond plate decking, floor anchors, wheel chocks, vehicle tie downs, water or eddy current absorber(s) with step-up drive, electronic torque transducer, DYNOmite 28-channel data-acquisition computer, inductive RPM pick-up, DYNO-MAX 2000 �Pro� software, printer, Windows XP® equipped Dell� laptop, mobile computer stand, Electronic Auto-Load Control, Weather Station Kit, A/F Ratio module, 42" high-volume cooling fan, hoses, engine temperature thermistor, and full-function data harness.<br /><br /> Click to enlarge DYNO-MAX 2000 console.Click to enlarge DYNO-MAX 2000 graph.DYNO-MAX 2000� �Pro� Software creates a full vehicle dashboard on your PC. Features include: real-time trace graph display, adjustable limit warnings, pushbutton controls, user configurable analog and digital gauge ranges, color graphing, test report database, instant playback, inertia compensation, �Smart Record�� trigger points, adjustable data dampening, full data import/export, semi-automatic zeroing, voice alarms, wireless Pocket DYNO-MAX� interface, drag strip Christmas tree console, etc. (Click for full list of features.)<br /><br /> DYNOmite Data-Acquisition Computer displays and records true unlimited Hp, torque, RPM, elapsed time, etc. at up to 1,000 readings per second (per channel). It will even automatically apply SAE correction factors for air temperature, barometric pressure, and relative humidity.<br /><br /> Click to enlarge "Dually" 30" chassis dynamometer. More than acceleration Hp can be measured with DYNOmite absorption units, because they utilize an actual strain gauge equipped torque transducer. Measuring power under a controlled RPM load is vital for proper mapping of engine management systems and guess-free emissions work. Avoid �dynos� that simply spin the vehicle�s tires up against their roll�s inertia (�flywheel resistance�) without having any ability to simultaneously control and measure absorption load. Rather than measuring the torque, they derive it from the acceleration (similar to extracting horsepower from drag-strip data). Such units can not maintain a MPH or RPM setting, while also displaying true torque and Hp � like a DYNOmite can!<br /><br /> Click to enlarge 24" chassis dynamometer.Sustained Hp and top end require an absorption dynamometer (i.e. a DYNOmite system). Unlike �acceleration spurt� inertial testing, these can load a vehicle indefinitely.* The absorber allows running controlled RPM step or sweep Hp tests. Everything is under computer control via the included Electronic Auto Load.<br /><br /> Simulate driving conditions on your chassis dyno by letting DYNO-MAX and your PC take control. DYNO-MAX features a �Road Load Simulation� mode that simulates vehicle momentum, air drag, rolling friction, etc. Enter the vehicle�s weight and drag data and then allow the software to monitor MPH vs. applied Hp, as it adjusts the dyno�s road load accordingly. To the car�s driveline and operator, the feel is like actually driving.<br /><br /> Click to enlarge 44" AWD chassis dynamometer.Front, Rear, or All Wheel Drive cars and trucks can be tested on the appropriate model automotive chassis dyno. Many allow front/rear torque bias monitoring and bidirectional mounting. Even large bikes and ATVs fit the 700 Hp dual-roller assembly. We can also convert many other manufacturer�s older, single axle, chassis dynamometers to AWD, with full Electronic Axle Synchronization, at a fraction of the cost of a new installation!<br /><br /> Click to Services page for magnified view of grooves.Dynamically balanced and machine traction-grooved rollers dramatically limit vibration and tire slip! Test most production vehicles (up to 150 MPH and 700 Hp) on our smallest automotive dual-roller assembly. Larger diameter roll systems easily handle sustained higher speed testing at race car power levels. (**Capacities are approximate, as they are primarily tire safety and traction limited � higher torque requires tie downs.)<br /><br /> Click to enlarge tri-axle truck chassis dynamometer.Fix driveline problems that might never show up in the garage, like shifting issues, driveshaft vibration, brake squeal, bearing noises, brake shudder, exhaust rattles, etc. - without costly field testing.<br /><br /> Click to enlarge tandem-axle truck chassis dynamometer.Verify Click to enlarge Pocket DYNO-MAX remote control.emissions under load using your existing, or our optional (digitally integrated) DYNOmite 5-gas, exhaust analyzer. Proper emission testing procedures require repeatable absorber load control, impossible on simple inertia dynos. No more trying to use unloaded idle data to verify that repaired vehicles are in emissions compliance. Send customers for state inspections with confidence.<br /><br /> Click to enlarge 24" chassis dynamometer.Low profile, ramp loading allows installing the 12" dual-roller units above ground - or in the driveway. Casters let you roll it to a corner when not in use (just raise the anti-vibration leveling pads). No dedicated test bay, or digging up floors, required.<br /><br /> Rapid on-off set-up makes it practical to skip those old time-consuming road trips. Just drive it on, strap it down, hook up the tach (or use �Smart Ratio��) and test � a full report prints out automatically!Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-9008758843622421774.post-65095527316704651732009-02-28T17:35:00.000-08:002009-02-28T17:36:17.542-08:00titanmoneyexpresstitanmoneyexpress is an international payment processor in an OFFSHORE jurisdiction. For individuals and online businesses<br /> from across the world! Make payments, do shopping or receive money by email from<br /> anywhere in the world!<br /><br /> As an offshore payment processor in a tax haven<br /> jurisdiction you benefit as follows: -<br /><br /> *<br /><br /> All you need is a FREE account and your email address<br /> to send or receive money<br /> *<br /><br /> OFFSHORE protection status- no 3rd party reporting<br /> required<br /> *<br /><br /> Personal / Prestige Accounts takes 2 minutes<br /> to open!<br /> *<br /><br /> Merchants sell your products to anyone with an email<br /> account- FREE SCI!<br /> *<br /><br /> New: Business Prestige<br /> Accounts for High Net worth Individuals and Business people from across the<br /> world. read more<br /> *<br /><br /> User Accounts may be operated on a "Verified" or<br /> "Unverified" status. read<br /> more<br /> *<br /><br /> Need some Privacy and Anonymity?<br /> *<br /><br /> -Escrow services coming soon!<br /> *<br /><br /> What about Tax Freedom?<br /> *<br /><br /> NO tolerance Policies against fraud or<br /> attempted fraud! read<br /> more<br /><br /> ..then look no further!<br /><br /> Questions? go to the KNOWLEDGEBASEUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-9008758843622421774.post-30614309752143924642009-02-28T09:17:00.000-08:002009-02-28T09:18:39.258-08:00SmartBalancer<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://www.bergeng.com/miva/graphics/00000001/Smartbalancer1.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 133px; height: 148px;" src="http://www.bergeng.com/miva/graphics/00000001/Smartbalancer1.jpg" border="0" alt="" /></a><br /><br /><br />SmartBalancer is a new portable measuring instrument for field balancing designed by Schenck – a specialist in balancing equipment. The new field balancer with its many outstanding major and minor design features incorporates our vast expertise in balancing, along with up-to-date vibration measuring equipment.<br /><br />Field balancing with the SmartBalancer – a most efficient addition to your balancing equipment. <br /><br />Benefits at a Glance<br /><br /> * A comprehensive package at an extremely favourable price-performance ratio.<br /> * 2 simultaneous measurement channels for highly efficient field balancing.<br /> * Optimised balancing for up to 4 measuring points.<br /> * Graphical presentation of unbalance and test run vectors for all measuring points.<br /> * Machine diagnosis with FFT and SmartFFT analysis<br /> * Overall vibration measurement in accordance with relevant standards.<br /> * Oscilloscope function.<br /> * Powerful SmartReport software included in the price.<br /> * New laser-optical reference sensor enables safe balancing at a distance of up to 0.5 m from the rotor shaft.<br /> * 6 hours of operation on a single battery charge - no replacement batteries required. <br /><br />High Ease of Operation<br /><br /> * Clear graphical display<br /> * Dialog-based operator prompting<br /> * 6 hours of operation on a single battery charge<br /> * No replacement batteries required<br /> * Laser-optical reference sensor (emitting visible light) enables safe balancing at a distance of up to 0.5 m from the rotor shaft<br /> * SmartBalancer report software <br /><br />Specifications<br /><br />Measurement Tasks<br /><br /> * Field balancing of rotors in one and two planes.<br /> * Measurement of overall vibrations for evaluation of the machine condition.<br /> * Frequency analysis for identification of the causes of vibrations.<br /> * Start-up and run-down curves of the first harmonic for the detection of machine and mounting resonances.<br /> * Display of overall vibrations and of the first harmonic versus time.<br /> * Oscilloscope function for visualisation of vibration - time signature. <br /><br />Measurement Channels<br /><br /> * 2 channels for vibrations<br /> * 1 channel for speed and reference signal<br /><br />Measurement Inputs<br /><br /> * 2 inputs for acceleration sensors<br /> * 1 input for laser-optical reference sensor<br /> * All inputs provide power supply for the sensors.<br /><br />Measurement Variables<br /><br /> * Vibration displacement in µm and mils<br /> * Vibration velocity in mm/s and inch/s<br /> * Vibration acceleration in m/s2 and g <br /><br />Signal Detection Types<br /><br /> * RMS value<br /> * Peak-to-peak value<br /> * Peak valueUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-9008758843622421774.post-77837675324177581212009-02-27T19:02:00.001-08:002009-02-27T19:03:42.709-08:00Sigma702 Tensiometer<blockquote><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://img2.blogcu.com/images/e/f/e/efeli/sigma702pic_1_.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 220px; height: 319px;" src="http://img2.blogcu.com/images/e/f/e/efeli/sigma702pic_1_.jpg" border="0" alt="" /></a><br /><br />Sigma 702 is a stand-alone tensiometer for measuring surface<br />and interfacial tension in situations requiring high sensitivity and simple<br />operation.<br /><br />As a result of KSV's long experience in tensiometer design,<br />Sigma 702 is user friendly and highly reliable. Precise temperature control can<br />be ensured by the water-jacketed vessel holder. The option of connecting to an<br />external PC and/or serial printer enables reliable data storage and simple<br />reporting.<br /><br />Features<br />Large built-in LCD display<br />Super-sensitive<br />microbalance with transport locking and overload protection, optimized for<br />Surface tension/Interfacial tension measurements<br />Illuminated, specially<br />coated and easily cleanable measuring area<br />Motor-driven sample stage with<br />high resolution movement control<br />Built-in magnetic stirrer<br />Built-in<br />touchpad for simple operator control, chamber illumination, stage up/down drive,<br />magnetic stirrer<br />Built-in thermostattable jacket with inner diameter 70 mm<br />for temperature control of the sample liquid Sample vessels with outer diameter<br />70 mm and 50 mm<br />Embedded software to measure surface tension (ST) and<br />interfacial tension (IT) using DuNouy ring and/or Wilhelmy plate, as well as the<br />density of liquids<br />RS-232C connection to optional printer<br />USB-connection<br />for data output to optional external PC computer<br />PC software module to read<br />the data to and ASCII file and/or Spread sheet, such as Microsoft Excel (not<br />included)</blockquote>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-9008758843622421774.post-3597304924662083072009-02-27T19:01:00.000-08:002009-02-27T19:02:27.912-08:00THE LAST DAYS OF PRIVACY<blockquote><br /> As technology makes life richer and easier, we leave a trail of information<br /> that is susceptible to prying eyesWithin the next four months, a major Bay Area<br /> supermarket chain plans to introduce a payment system that uses biometric<br /> fingerprint authentication to verify customers' identities. Under this system,<br /> shoppers in checkout lines won't need to use cash, checks, debit cards or credit<br /> cards. Instead, they can place their fingers on scanners that read fingerprints,<br /> and once the device links to their bank or credit card accounts, they can buy<br /> groceries, get cash back and do everything else shoppers do.ImagesView Larger<br /> Images--------------------------------------------------------------------------------More<br /> OpinionClinton first looks east 02.21.09 Terrorism as a crime 02.21.09 Past the<br /> point of no return 02.20.09 The end of a budget battle 02.20.09<br /> <_script><_script>--------------------------------------------------------------------------------[Podcast:<br /> Insight Editor Jim Finefrock and reporter Jonathan Curiel talk about how<br /> Americans might as well face up the fact that there is little privacy left.]The<br /> system is already used in cities around the United States, including Portland,<br /> Ore., and Chicago, where one shopper says it has changed his life for the<br /> better. Linc Thelen, a 37-year-old interior designer, says the fingerprint<br /> system -- known commercially as Pay By Touch -- is convenient to use and<br /> expedites his way through grocery lines at Jewel-Osco, where he shops. Thelen<br /> says the system lets people leave their wallets behind, so they don't have to<br /> worry about being robbed or losing their credit cards."I had no reservation,"<br /> Thelen said in a phone interview. "It's a safe way to store information."But no<br /> system is 100 percent foolproof.Despite the fact that armed men guard the<br /> computers that store the customers' virtual fingerprints, despite the fact that<br /> Bank of America's former security chief now heads Pay By Touch's security<br /> division, and despite the fact that Pay By Touch hires people to try to expose<br /> vulnerabilities in its computer system (so those vulnerabilities can be<br /> eliminated), Pay By Touch President John Morris acknowledges that "it's not<br /> impossible" for computer hackers to figure out how to tamper with its<br /> information.And therein lies one of the 21st century's most vexing problems:<br /> More and more of our personal data are captured and stored by corporate and<br /> government interests, and are potentially available to anyone with the<br /> technological, legal or financial means to access that information.Whether it's<br /> phone calls we make, library books we check out, CDs we buy on the Internet or<br /> divorces we finalize in court, we leave a trail of information that becomes<br /> susceptible to prying eyes. For the price of a bus pass, you can pay a company<br /> to supply anyone's address, phone number, political affiliation, estimated<br /> income and property history. For $20 more, you can find out if that person is<br /> married or divorced, has a criminal record, and what sort of jobs he or she has<br /> worked.Sen. Hillary Clinton, D-N.Y., says she will introduce a "privacy bill of<br /> rights" because identity theft and security failures of personal records have<br /> become "one of the most important issues facing us as individuals and as a<br /> nation."The availability of personal information -- downloadable onto laptop<br /> computers, which are increasingly being fitted with fingerprint technology -- is<br /> changing the culture in ways that may seem trivial but are really benchmarks for<br /> a new society already in its formative stages.A small example: Unbeknownst to<br /> the men who date her, Judy runs background checks on all of them, using a<br /> private investigator to dig out any "red flags" that would presage troubling<br /> behavior. A businesswoman in Southern California, Judy, 50, uses a company<br /> called DateSmart, whose client base has boomed in the past five years as more<br /> people confront the perils of online dating."I'm glad the information is out<br /> there," says Judy, who did not want her last name used because of concerns her<br /> suitors would read this article. "The men I'm talking to online are complete<br /> strangers. And I have absolutely no knowledge of their character other than what<br /> they're saying in their profiles. I need to feel comfortable knowing that<br /> they're not an ax murderer. The people you meet might be well dressed, but you<br /> never know if they have any criminal history. It's for (my) safety."Background<br /> checks are nothing new. What's changed are the speed with which you can obtain<br /> them, their relatively small price (some companies advertise free checks) and<br /> their growing public acceptance. The information revolution has transformed the<br /> background check into a common and casual tool, and those being scrutinized<br /> probably don't have a clue. More obvious are the security cameras embedded in<br /> nearly every major American city, including New York, Milwaukee, Chicago,<br /> Atlanta, Los Angeles and, yes, San Francisco, where lenses record people's<br /> activities in such crime-ridden neighborhoods as Bayview-Hunters Point and the<br /> Western Addition. The spread of these cameras is championed by authorities, who<br /> say it reduces criminal activity, and criticized by the ACLU, which says the<br /> equipment is an unnecessary intrusion into public spaces.Civil liberties groups<br /> have joined the widespread outcry against the government's monitoring of<br /> Americans' phone-call records. Two weeks ago in federal court, the ACLU<br /> challenged the legal rationale behind the National Security Agency program,<br /> arguing that the NSA's actions -- involving "data mining" of records provided by<br /> AT&T and other telephone companies -- violate Americans' rights to free<br /> speech and privacy as guaranteed under the First and Fourth Amendments. Last<br /> week, privacy experts raised questions about the U.S. government's monitoring of<br /> international bank transfers -- previously secret data surveillance officials<br /> say is justified by the fight against terrorism.Americans' rights to privacy<br /> will be tested even more in the next few years as biometric technology creeps<br /> increasingly into everyday arenas. For example, on the campus of UC San Diego,<br /> biometric experts are testing a soda machine that uses both fingerprint and<br /> face-recognition technology. The machine is in a lounge for grad students in UC<br /> San Diego's computer science building."The students are very excited about<br /> getting it working," Serge Belongie, a UC San Diego associate professor of<br /> computer science, says in a phone interview. "People think it's very cool. ...<br /> No one uses money. They have accounts. What would be fun is if (the machine)<br /> recognizes you and says, 'Would you like your usual?' "If UC San Diego students<br /> are reluctant to use the machine, their privacy concerns are outweighed by<br /> convenience -- a sentiment echoed in survey after survey on biometric<br /> technology. In March, Unisys Corp. released a report on public perception of<br /> "identity management" that said convenience and efficiency were the two biggest<br /> reasons consumers would use biometric technology. (The most preferred biometric<br /> methods are fingerprints and voice recognition, according to the survey. The<br /> least preferred, because of its perceived intrusiveness, is an iris or eye<br /> scan.)Two of the biggest turnoffs for those who shun biometric technology:<br /> suspicion of how the technology works and loss of privacy. Among respondents<br /> from North America, just 56 percent said they'd be willing to share their<br /> fingerprint with a government organization such as a post office or tax<br /> authority. Among respondents from the Asia-Pacific region, 71 percent said<br /> they'd share their fingerprint with the government."As consumer confidence grows<br /> in the large-scale usage of (biometric technology) and standards are more<br /> generally comfortably adopted, you're going to see a pretty rapid migration" to<br /> it, says Mark Cohn, Unisys vice president for homeland security solutions.Cohn,<br /> a principal architect of the Department of Homeland Security's US-VISIT Exit<br /> system, which uses fingerprint technology to run background checks on visa<br /> applicants and verify their entry to and arrival from the United States, says<br /> Malaysia offers a preview of how the United States may change in the coming<br /> years.Since 2001, the Malay government has issued a biometric "multipurpose<br /> card" to Malaysians 12 years and older. The card, which features a thumbprint<br /> and photograph, acts as a passport, driver's license, ATM card, toll and parking<br /> pass, and medical record that lists blood type and any allergies.The card is<br /> convenient to use -- but it's a nightmare for Malaysians who lose it or have it<br /> stolen. Crime syndicates in Malaysia have altered cards with different<br /> photographs and used them to give members new identities, though the Malay<br /> government insists these identity thieves can't access the original cardholders'<br /> personal information. Special chip technology and other password features<br /> prevent this, they say. Also, the cardholder's fingerprint -- rather than being<br /> visible on the card -- is encrypted in the card itself: To reveal the<br /> fingerprint, the card must be inserted into a special biometric device that<br /> compares the encrypted print with that of the person claiming to be the<br /> cardholder.For anyone who has read Orwell's "Nineteen Eighty-Four," where<br /> "telescreens" keep track of people's lives, this new biometric technology will<br /> seem like fiction come to life. It's showing up everywhere. By the end of this<br /> year, U.S. passport agencies hope to issue "electronic passports" with computer<br /> chips that have digital photos of the holders. With the help of face-recognition<br /> machines, airport security can compare a photo with the face of the passport<br /> holder. For two years, an American corporation, VeriChip, has sold<br /> government-approved electronic chips that are inserted under people's skin to<br /> give doctors instant access to patients' medical histories.In 2008, as mandated<br /> by the Real ID Act, states plan to issue driver's licenses linked to a database<br /> that includes each license holder's photo and Social Security number. These<br /> licenses (civil liberties groups call them national identity cards) will likely<br /> include a biometric photo of the driver accessible by authorities.In the<br /> meantime, banks are considering using iris scans and even palm scans at ATMs in<br /> an effort to cut down on fraud. (In 1999, Bank United in Texas adopted iris-scan<br /> technology at three of its ATMs in a test that was discontinued when Washington<br /> Mutual took over the bank.)Some people love the new technology. Others shun<br /> it.Pay By Touch admits it has encountered some resistance among shoppers it<br /> approached in supermarkets that already use the company's fingerprint service.<br /> But Morris, its president, says many of these customers are quickly won over by<br /> the convenience of Pay By Touch, which is free for consumers, and that the<br /> company keeps data points based on users' fingerprints, not actual fingerprints.<br /> So far, supermarkets in 40 states use the Pay By Touch system.Pay By Touch,<br /> which is based in San Francisco, wouldn't say which Bay Area supermarket chain<br /> will start using its fingerprint system in the next four months -- only that the<br /> chain will use the system in just a handful of its Bay Area stores. Pay By Touch<br /> users sign up voluntarily and are under no obligation to use it at the checkout<br /> line.Pay By Touch says it takes great care to safeguard its users' data. After<br /> fingerprints are converted into algorithms, they're encrypted, then stored in<br /> IBM computers. Those algorithms can't be reconverted into an exact copy of the<br /> fingerprint, though Pay By Touch may eventually store users' actual fingerprints<br /> if the technology improves, Morris says. The company insists it will never sell<br /> users' personal information or fingerprints to anyone else -- a pledge that's<br /> backed up in writing when users sign up with the company. But what if federal<br /> authorities, citing national security, insist on the finger scan and payment<br /> history of a Pay By Touch user?Pam Dixon, who heads the World Privacy Forum, a<br /> public research group, went to Chicago to warn potential Pay By Touch users<br /> about possible dangers."It didn't stick," she says. "People were (more)<br /> concerned with (convenience than) the potential risks. People can put their<br /> thumb on a pad and be done with it. But meanwhile, their biometric data is<br /> sitting with another company, a third party, that's subject to subpoena. One<br /> argument that I made: Let's say that every supermarket in the country,<br /> particularly the large chains, (use) a biometric payment system. It's a law<br /> enforcement dream because who needs a biometric database run by the U.S.<br /> government when you've got one being run by private companies?"Citing the recent<br /> disclosure by the Veterans Administration, which said a computer with credit<br /> information on millions of veterans had been stolen, Dixon says, "The second<br /> issue is information security. If the VA can't keep its records secure, which is<br /> a government agency that has all sorts of strict controls that are supposed to<br /> be in place, how on Earth can a private company without the resources of<br /> something like the VA manage to keep something secure? When we have a credit<br /> card stolen, we can call the credit card company and say, 'Give me a new<br /> number.' But you can't do that with your biometric. You can't say, 'Give me a<br /> new fingerprint.' "Morris dismisses such concerns, saying that Pay By Touch will<br /> actually decrease the likelihood that consumers' credit information is stolen or<br /> misappropriated. "I think (Pay By Touch users) get pretty rapidly that it's the<br /> ultimate way to secure their private data," he says. "It connects (their<br /> accounts) to something that's uniquely them, as opposed to handing a credit card<br /> over to a stranger or writing a personal check that seven or eight humans touch<br /> before it gets in their statement. Securing information by a biometric is a<br /> giant leap forward. (Users) like that they don't have to pull their card out<br /> anymore. They (tell us they) like that they don't have to carry their (purses or<br /> wallets) through the parking lot of an urban supermarket. There's a physical<br /> security benefit. Their numbers are never displayed. The safety of securing<br /> their data is the No. 1 thing they like."The marketplace will determine whether<br /> the public is ready to accept commercial fingerprint identification. Investors<br /> in Pay By Touch believe that day is here, capitalizing the company with $190<br /> million in the past 12 months. More than 2.5 million shoppers already use the<br /> Pay By Touch system. Morris envisions a day when all stores -- even mom-and-pop<br /> ones -- offer a Pay By Touch option.Soon, customers will be able to use Pay By<br /> Touch from home with the help of fingerprint readers attached to their<br /> computers. In ancient China, rulers would put their fingerprints on documents to<br /> give them an official seal. Artists would also mark their work with prints. It<br /> wasn't until the late 1800s that authorities realized they could use<br /> fingerprints to catch criminals. Their evolution as a way to pay for groceries<br /> is a 21st century twist fueled by technology. It's also a trade-off between<br /> privacy and convenience. Welcome to the brave new world in Aisle 5.</blockquote>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-9008758843622421774.post-21741807666689307192009-02-23T03:53:00.000-08:002009-02-23T03:55:17.108-08:00Petroleum Technology Transfer Council<blockquote><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://www.statoilhydro.com/no/NewsAndMedia/News/2008/PublishingImages/gullfaksa468.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 468px; height: 260px;" src="http://www.statoilhydro.com/no/NewsAndMedia/News/2008/PublishingImages/gullfaksa468.jpg" border="0" alt="" /></a><br /><br /><br /> The Petroleum Technology Transfer<br /> Council (PTTC) is an American national not-for-profit organization established<br /> in 1994 by producers, state organizations and the Department of Energy (DOE).<br /> While emphasizing the needs of independent oil and gas producers, PTTC’s<br /> activities also benefit industry consultants, service and supply companies, and<br /> other industry participants. To ensure timeliness and relevance of technical<br /> workshops and other activities, PTTC’s regional programs are developed under the<br /> guidance of local Producer Advisory Groups. Through these volunteers and the<br /> National Board of Directors, who are primarily domestic oil and natural gas<br /> operators, hundreds of producers and other industry participants nationwide<br /> contribute their time and expertise to the technology transfer program.<br /> PTTC<br /> is involved with foster networking people, who impact domestic<br /> production.<br /> Oil and Gas Producers rely upon the network for non-biased,<br /> straight forward technical information;<br /> Provides Technology providers with an<br /> avenue to communicate developing or under-applied technologies to producers,<br /> consultants, and explorationists;<br /> Consultants better equip themselves for<br /> serving producers, which further broadens application; and<br /> The DOE uses the<br /> network to disseminate its R&D results and gather insights on domestic<br /> concerns and issues.<br /> The relationships that are developed between the various<br /> entities and individuals have achieved technology information transfer through<br /> the PTTC’s programs and are reducing costs, while increasing profits, and<br /> ultimately increasing recovery in existing mature fields, expanding recovery<br /> from unconventional reservoirs, profitably developing ever-smaller domestic<br /> production and reserves, and increasing environmental stewardships.<br /> Since<br /> 1994, the PTTC was funded primarily by the DOE with matching funds by the states<br /> and Oil and Gas industry. The PTTC's work has been a recognized force for<br /> transferring exploration and production technology to domestic U.S. producers.<br /> In 2006, the U.S. Congress declined to provide fiscal year 2007 funding for many<br /> elements of the DOE’s natural gas and oil R&D program, from which PTTC drew<br /> its federal funds. DOE ultimately provided $1 million of funding through<br /> September 2008 to help PTTC transition to a primarily industry-funded<br /> organization.<br /> Due these evets, the Executive Committee of AAPG and the Board<br /> of PTTC both voted in late September for AAPG to assume management of the new<br /> organization. The American Association of Petroleum Geologists and the Petroleum<br /> Technology Transfer Council have announced that AAPG has assumed management of<br /> PTTC activities effective October 9, 2007.This includes fundraising, marketing<br /> and corporate operation of the PTTC Program. The vote followed a 90-day due<br /> diligence period. AAPG President Will Green, of Midland, Texas, said “PTTC has<br /> perhaps the most successful scientific technology transfer program for the<br /> independent U.S. producer and has proven its value to the industry. The<br /> Association considers the program important for the industry, the members of<br /> AAPG and the country.” Outgoing PTTC Chairman Gene Ames noted: “Strengths of<br /> PTTC will be the same – most universities will stay engaged, regional volunteer<br /> groups will be autonomous and work closely with the universities,<br /> cross-discipline diversity will be encouraged, and producers will comprise the<br /> majority of the volunteers. DOE remains a strong supporter and will strive<br /> toward some funding albeit at a lower level than historical.” Members of the new<br /> board of directors will be announced later. Green said PTTC’s primary tool for<br /> transferring E&P technology will continue to be regional workshops, which<br /> will be supplemented with a strong Web presence, newsletters and other personal<br /> outreach. Using these tools, PTTC will continue to connect producers, the<br /> service sector, consultants, researchers and others with the data and technology<br /> information needed to spur technology application.<br /> Topics addressed by PTTC<br /> activities have covered the full spectrum of E&P operations, including<br /> exploration, unconventional resources, enhanced recovery processes, imaging<br /> technology, drilling and completion, hydraulic fracturing and many others.<br /> Serving industry locally through Regional Lead Organizations, typically at<br /> universities or geological surveys, PTTC’s primary focus has been serving<br /> independents. This operation model will continue in the future.<br /></blockquote>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-9008758843622421774.post-63135058576777306632009-02-23T02:26:00.000-08:002009-02-23T02:27:10.029-08:00iComply forges ahead with the Australian Logistics Council<blockquote><br /><br />iComply announced today that the company had been appointed by the Australian Logistics Council as one of four compliance firms authorised to conduct audits against the ALC Retail Logistics Code of Conduct.<br /><br />This appointment recognises iComply's professional accreditations, and its specialised experience in the transport industry.<br /><br />The ALC Retail Logistics Code of Conduct was established in November 2006 by the Australian Logistics Council and key players within the transport and logistics industry.<br /><br />The ten point Code of Conduct establishes a clear set of principles for freight logistics, involving the retailer, supplier, carrier and logistics provider, allowing the industry to respond in a coordinated way to help all involved across the retail supply chain operate under a national set of retail logistics supply chain industry standards.<br /><br />Every transport business wishing to supply to the retail industry must adhere to the Code and undertake annual audits.<br />What we do<br /><br />iComply is a leading provider of compliance audit software and compliance audit services to the public and private sector. Continually awarded for its innovation in software development, iComply combines technical excellence with over 50 years of professional experience to implement the best audit, compliance and risk management solutions for businesses worldwide.<br />Our background<br /><br />iComply was formed in 2003 with the joining of two successful boutique compliance companies. The partnership brought together a unique combination of specialist audit services and state-of-the-art audit software to address the ever increasing regulations and legislation facing businesses today.<br /><br />Based in Melbourne, Australia, iComply is now one of the world’s leading compliance consultancies with a team of highly qualified and accredited personnel. Recognised by Microsoft and the international software industry for their innovative solutions, iComply’s compliance software products and compliance audit services have become integral to the success of public and private organisations across the globe.<br />Our clients<br /><br />iComply’s prestigious international client list speaks for itself. Ranging from multi-national corporations, government organisations and small cutting-edge businesses, our clients reflect the quality, flexibility and value of our services.<br /><br /></blockquote>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-9008758843622421774.post-65743347296950849922009-02-22T02:37:00.000-08:002009-02-22T02:39:05.025-08:00OL-55 On-Line Tensiometer<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://img2.blogcu.com/images/e/f/e/efeliden/ol_55_diagram_1_.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 500px; height: 285px;" src="http://img2.blogcu.com/images/e/f/e/efeliden/ol_55_diagram_1_.jpg" border="0" alt="" /></a><br /><br /> <br /><br />By continuously measuring surface tension, the OL-55 monitors the level of surface active chemical additives in water-based process liquids. Based on the information from the measurement the operator can either manually dose chemicals into the process or the optional auto-dosing system can be used.<br /><br /> <br />On-line tensiometer<br /><br /> * Continuous monitoring of surface tension and other parameters, including pH, temperature, and conductivity, in various process liquids for optimising the dosing of chemicals<br /> * Rugged design for factory applications<br /> * Fully automatic computer controlled operation<br /> * Patented technology<br /><br />Benefits<br /><br /> * Eliminates overdosing of surfactants - reducing costs<br /> * Controls processes - improves efficiency and quality<br /> * Reduces waste and improves yield<br /> * Improves environmental control<br /> * Extends chemical lifetime in processes<br /><br /> <br />Specifications<br />Surface tension measuring range 20 to 80 mN/m<br />Resolution 0.1 mN/m<br />Update time for liquid<br /> 3 minutes from change in process liquid <br />Temperature measuring range (optional)<br /> 15 to 85°C<br />pH measuring range (optional)<br /> 2 to 14<br />Flow rate<br /> 18 l/h<br />Self-cleaning filter<br /> Standard 100 μm (others by request)<br />Voltage<br /> 100-240 V (automatic) 50/60 Hz<br />Power consumpiton<br /> < 60 W<br />Fuses 315 mA<br />Dimensions 544 x 428 x 236 mm (H x L x D)<br />Optional features<br /># On-line pH monitoring<br /># On-line conductivity monitoring<br /># On-line process temperature measurement<br /># Automatic dosing of surfactants and clean water based on measurement dataUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-9008758843622421774.post-44682338451667246552009-02-21T19:02:00.000-08:002009-02-21T19:03:00.326-08:00Overview<blockquote>IBM Cognos 8 Controller provides Finance organizations with unmatched capabilities for managing the close, consolidation, and reporting process. An automated, menu-driven application that is owned and managed by Finance, IBM Cognos 8 Controller can consolidate diverse ledgers representing thousands of operating units and accounts into a common chart-of-accounts structure.<br /><br />IBM Cognos 8 Controller reduces close cycle times and gives you the transparency that is essential for sustained compliance with Sarbanes-Oxley and IFRS. It supports local, regional, or global requirements, and enables you to adapt to business and regulatory changes in real time.<br /><br />What IBM Cognos 8 Controller Offers to Finance Leaders<br />IBM Cognos 8 Controller offers critical benefits for the key members of your finance team—and for the CIO, who needs to ensure compatibility with existing IT investments:<br /><br />* For Corporate Controllers: IBM Cognos 8 Controller enables the corporate controller to automate the entire close process, from data collection to financial consolidation to output. Close cycle times are reduced while data integrity is assured.<br />* For the CFO: IBM Cognos 8 Controller reduces risk and provides the CFO with an enterprise view of key financial ratios and results. Greater visibility improves strategic decision making across the organization, while the high quality of financial results eases external reporting and compliance.<br />* For the CIO: IBM Cognos 8 Controller allows the CIO to leverage current IT investments while ensuring that centralized systems meet the demand for secure and reliable data. And it offers the opportunity for performance management standardization from a single vendor, with enterprise planning and business intelligence across a single architecture and platform.<br /><br />IBM Cognos 8 Controller is the only solution that includes more than 200 pre-configured, standard reports to satisfy the demands of management and regulators. All the reports required at key stages of the close process are available automatically—no custom report creation is needed.<br /><br />In addition, IBM Cognos 8 Controller is seamlessly integrated with IBM Cognos 8 Planning and IBM Cognos 8 Business Intelligence. It enables performance management to be integrated at the data, security and process level—all at a low total cost of ownership.<br />Learn more:<br /><br />* Features and Benefits of IBM Cognos 8 Controller<br />* Read the IBM Cognos 8 Controller Fact Sheet<br />* Read about the 200+ Standard Reports available with IBM Cognos 8 Controller<br />* Visit the Compliance Resource Center<br />* Learn best practices thru IBM Cognos 8 Controller Performance<br /><br />BluePrints</blockquote>Unknownnoreply@blogger.com0