WorldWideScience

Sample records for mailboxes

  1. New spam-detection engine for CERN mailboxes

    CERN Multimedia

    The flow of spam (unsolicited e-mail) targetting CERN mailboxes is constantly increasing: 96% of the 2.5 million mails received daily at CERN consist in successfully filtered spam, but spammers get smarter and detecting spam is becoming ever more difficult. In order to address this evolution, a new spam-detection software engine will progressively be deployed starting from 15 April 2008. It will not affect how CERN users currently deal with spam: the spam configuration page, the 'CERN Spam' folder and the Outlook 'report spam' button will continue to work exactly as before. Because spam detection is based on probabilities, some legitimate messages can sometimes be incorrectly detected as spam. We invite all users of CERN mailboxes to regularly check their 'CERN spam' folder for such messages. To prevent incorrect filtering of legitimate messages, it is possible to set up a whitelist (list of trusted e-mail addresses that bypass the spam filter) and adjust the spam filtering level from the CERN mailbox confi...

  2. Development of Automatic Quality Check Software in Mailbox Declaration For Nuclear Fuel Fabrication Plants

    International Nuclear Information System (INIS)

    Kim, Minsu; Shim, Hye Won; Jo, Seong Yeon; Lee, Kwang Yeol; Ban, Myoung Jin

    2014-01-01

    Short Notice Random Inspection (SNRI) is a new IAEA safeguards inspection regime for bulk handing facility, which utilities random inspection through a mailbox system. Its main objective is to verify 100% of the flow components of the safeguarded nuclear material at such a facility. To achieve the SNRI objective, it is required to provide daily mailbox declaration, by a facility's operator, to the IAEA with regard to information, such as the receipt and shipment of nuclear materials. Mailbox declarations are then later compared with accounting records so as to examine the accuracy and consistency of the facility operator's declaration at the time of the SNRI. The IAEA has emphasized the importance of accurate mailbox declarations and recommended that the ROK initiate its own independent quality control system in order to improve and maintain its mailbox declarations as a part of the SSAC activities. In an effort to improve the transparency of operational activities at fuel fabrication plants and to satisfy IAEA recommendation, an automatic quality check software application has been developed to improve mailbox declarations at fabrication plants in Korea. The ROK and the IAEA have recognized the importance of providing good quality mailbox declaration for an effective and efficient SNRI at fuel fabrication plants in Korea. The SRA developed an automatic quality check software program in order to provide an independent QC system of mailbox declaration, as well as to improve the quality of mailbox declaration. Once the automatic QC system is implemented, it will improve the quality of an operator's mailbox declaration by examining data before sending it to the IAEA. The QC system will be applied to fuel fabrication plants in the first half of 2014

  3. New spam-detection engine for CERN mailboxes

    CERN Multimedia

    IT Department

    2008-01-01

    The flow of spam (unsolicited e-mail) targetting CERN mailboxes is constantly increasing: 96% of the 2.5 million mails received daily at CERN consist in successfully filtered spam, but spammers get smarter and detecting spam is becoming ever more difficult. In order to address this evolution, a new spam-detection software engine will progressively be deployed starting from 15 April 2008. It will not affect how CERN users currently deal with spam: the spam configuration page, the ‘CERN Spam’ folder and the Outlook ‘report spam’ button will continue to work exactly as before. Because spam detection is based on probabilities, some legitimate messages can sometimes be incorrectly detected as spam. We invite all users of CERN mailboxes to regularly check their ‘CERN spam’ folder for such messages. To prevent incorrect filtering of legitimate messages, it is possible to set up a whitelist (list of trusted e-mail addresses that bypass the spam filter) and adjust the spa...

  4. Study on the System Requirements and Structures of Mailbox Declaration System for Reference Pyroprocessing Facility in the ROK

    International Nuclear Information System (INIS)

    Jeon, Jong Kyu

    2011-01-01

    The mailbox declaration system applied for the implementation of Safeguards at the Reference Pyroprocessing Facility (REPF) plays important role to support the declared information provided from Near-Real Time Accountancy (NRTA) and provides reference data to confirm the measurement results generated from the Unattended Monitoring System (UMS) for the purposes of verification and real-time monitoring of the movements and changes of nuclear materials (NM) at the processes in the REPF. In order to install and operate the mailbox declaration system at the REPF, this study focused on the operation, security, transmission of confidential information, procedure for transmission of mailbox declaration system as system requirements, and structure of mailbox declaration system to review the declared information through the mailbox by the national authority and to transmit the revised information to the IAEA

  5. Rwandan young people's perceptions on sexuality and relationships: results from a qualitative study using the 'mailbox technique'.

    Science.gov (United States)

    Michielsen, Kristien; Remes, Pieter; Rugabo, John; Van Rossem, Ronan; Temmerman, Marleen

    2014-01-01

    This study aimed to gain more insight into young Rwandans' perceptions on sex and relationships, which is essential for formulating effective sexual and reproductive health (SRH) promotion interventions. Using a 'mailbox technique', this paper studies the spontaneous thoughts of Rwandan young people on sexuality. Mailboxes were installed in five secondary schools in the Bugesera district and students were invited to write about their ideas, secrets, wishes, desires and fears on sexuality and relationships. Of the 186 letters collected, 154 addressed SRH topics. The letters were analysed in NVivo 9 using a theoretical model on vulnerability. Two stereotypical sexual interactions co-exist: experimental sex, taking place unprepared, driven by desire among young people of the same age, and transactional sex, occurring after negotiation between older men/women and younger girls/boys in exchange for money or goods. Both types expose young people to poor, though different, SRH outcomes. Young people have little capacity to manage their vulnerability in these relationships: they have limited knowledge on SRH topics, lack adult guidance or support and have difficult access to condoms. They apply seemingly contradictory norms and behaviours concerning sexuality. In conclusion, we have formulated several recommendations for SRH interventions.

  6. The Mailbox Computer System for the IAEA verification experiment on HEU downblending at the Portsmouth Gaseous Diffusion Plant

    International Nuclear Information System (INIS)

    Aronson, A.L.; Gordon, D.M.

    2000-01-01

    IN APRIL 1996, THE UNITED STATES (US) ADDED THE PORTSMOUTH GASEOUS DIFFUSION PLANT TO THE LIST OF FACILITIES ELIGIBLE FOR THE APPLICATION OF INTERNATIONAL ATOMIC ENERGY AGENCY (IAEA) SAFEGUARDS. AT THAT TIME, THE US PROPOSED THAT THE IAEA CARRY OUT A ''VERIFICATION EXPERIMENT'' AT THE PLANT WITH RESPECT TO DOOWNBLENDING OF ABOUT 13 METRIC TONS OF HIGHLY ENRICHED URANIUM (HEU) IN THE FORM OF URANIUM HEXAFLUROIDE (UF6). DURING THE PERIOD DECEMBER 1997 THROUGH JULY 1998, THE IAEA CARRIED OUT THE REQUESTED VERIFICATION EXPERIMENT. THE VERIFICATION APPROACH USED FOR THIS EXPERIMENT INCLUDED, AMONG OTHER MEASURES, THE ENTRY OF PROCESS-OPERATIONAL DATA BY THE FACILITY OPERATOR ON A NEAR-REAL-TIME BASIS INTO A ''MAILBOX'' COMPUTER LOCATED WITHIN A TAMPER-INDICATING ENCLOSURE SEALED BY THE IAEA

  7. Investigating Implementation Methods and Perceived Learning Outcomes of Children’s Library Instruction Programs: A Case of Parent-child Doctors’ Mailbox in National Library

    Directory of Open Access Journals (Sweden)

    Yu-Hua Chang

    2017-06-01

    Full Text Available This study aimed to investigate the implementation methods, process and perceived learning outcomes of children’s library instruction programs. This study adopted a qualitative approach with the Parent-child Doctors’ Mailbox program in National Library of Public Information. Observation (including thinking aloud, interviews and documents were used for data collection in order to elicit perspectives of 31 children, 26 parents and 3 librarians. Main findings derived from this study can be summarized as follows: (1 Parent-child Doctors’ Mailbox integrated play (e.g., prize quizzes and reading guides into the program design, which was based upon the development of different age groups. Children needed to go to the circulation desk in person in order to get designated books and answer sheets. Children earned points to redeem for prizes by answering questions correctly. (2 Motivations for children’s participation in the program were categorized as external (e.g., prizes, recommendations from friends and serendipity and internal (e.g., cultivating habits of reading and writing, and siblings’ company. (3 Children’s perceived learning outcomes of participation in the program included improving children’s attention span, the positive influence of messages delivered by books on children, and the positive progress of children’s reading, writing, logical thinking and interpersonal skills. (4 Parents’ roles in children’s participation in the program included accompanying children and providing reactive assistance. Roles of librarians involved administrative work, encouragement and befriending children. [Article content in Chinese

  8. Important update of CERN Mail Services

    CERN Multimedia

    IT Department

    2009-01-01

    The CERN Mail Services are evolving. In the course of June and July 2009, all CERN mailboxes will be updated with a new infrastructure for hosting mailboxes, running Exchange 2007. This update is taking place in order to provide the capacity upgrade for the constantly growing volume of CERN mailboxes. It is also the opportunity to provide a number of improvements to CERN mailboxes: new and improved Outlook Web Access (the web interface used to access your mailbox from a web browser, also known as "webmail"), new features in the Out-of-Office auto-reply assistant, easier spam management... The update will preserve the mailbox configuration and no specific action is required by users. During the next weeks, each mailbox will be individually notified of the upcoming update the day before it takes place. We invite all users to carefully read this notification as it will contain the latest information for this update. The mailbox will be unavailable for a short time during the ni...

  9. Efficient process migration in the EMPS multiprocessor system

    NARCIS (Netherlands)

    van Dijk, G.J.W.; Gils, van M.J.

    1992-01-01

    The process migration facility in the Eindhoven multiprocessor system (EMPS) is presented. In the EMPS system, mailboxes are used for interprocess communication. These mailboxes provide transparency of location for communicating processes. The major advantages of mailbox communication in the EMPS

  10. MAIL OFFICE Outgoing mail

    CERN Multimedia

    1999-01-01

    The Mail Office once again wishes to remind users that the Organisation's mail service is exclusively reserved for official mail._\tAll outgoing official mail must arrive at the Mail Office unfranked and with the sender's name and Division clearly marked under the Organsation's address (see example below).Private mail must be taken to the Post Offices at Meyrin (63-R-011) or Prévessin (866-R-C02)._\tPlease only use 'PRIORITY' envelopes for mail requiring priority handling. Internal mail_\tPlease do not forget to indicate your correspondent's 'MAILBOX' number on the internal mail envelopes either in the specific box provided (new envelopes) or next to his or her name (old envelopes). This will facilitate and accelerate the handling of your mail. Mailbox numbers can be found on: Macintosh\tin the 'Mailbox' field in 'VIPER'PC\tin the 'Mailbox' field of 'Phone book'Web: http://www.cern.ch/CERN/Phone.htmlin the 'MailBox' fieldonce you have selected your correspondent's name...

  11. Developing a Telecommunications Curriculum for Students with Physical Disabilities.

    Science.gov (United States)

    Gandell, Terry S.; Laufer, Dorothy

    1993-01-01

    A telecommunications curriculum was developed for students (ages 15-21) with physical disabilities. Curriculum content included an internal mailbox program (Mailbox), interactive communication system (Blisscom), bulletin board system (Arctel), and a mainframe system (Compuserv). (JDD)

  12. Customized News in Your Mailbox.

    Science.gov (United States)

    Rudich, Joe

    1996-01-01

    Customized Internet services deliver news and selected research via e-mail, fax, Web browser, or their own software. Some are clipping services while others are full-fledged online newspapers. Most charge a monthly subscription fee, but a few are free to registered users. Provides the addresses, cost, scope, and evaluation of eight services. (PEN)

  13. Top-down and bottom-up aspects of active search in a real-world environment.

    Science.gov (United States)

    Foulsham, Tom; Chapman, Craig; Nasiopoulos, Eleni; Kingstone, Alan

    2014-03-01

    Visual search has been studied intensively in the labouratory, but lab search often differs from search in the real world in many respects. Here, we used a mobile eye tracker to record the gaze of participants engaged in a realistic, active search task. Participants were asked to walk into a mailroom and locate a target mailbox among many similar mailboxes. This procedure allowed control of bottom-up cues (by making the target mailbox more salient; Experiment 1) and top-down instructions (by informing participants about the cue; Experiment 2). The bottom-up salience of the target had no effect on the overall time taken to search for the target, although the salient target was more likely to be fixated and found once it was within the central visual field. Top-down knowledge of target appearance had a larger effect, reducing the need for multiple head and body movements, and meaning that the target was fixated earlier and from further away. Although there remains much to be discovered in complex real-world search, this study demonstrates that principles from visual search in the labouratory influence gaze in natural behaviour, and provides a bridge between these labouratory studies and research examining vision in natural tasks.

  14. Fluence of Product Leaflets on Purchasing Behaviour in Times of Crisis

    Directory of Open Access Journals (Sweden)

    Halina Starzyczná

    2015-01-01

    Full Text Available This paper presents partial results of primary research on consumer purchasing behaviour with regards to the utilization of product leaflets. It deals with the consumer reaction on the use of these leaflets. The main goal is to assess the impulse to purchase goods on the basis of promotional leaflets in mailboxes, depending on the personal characteristics of the consumer. Partial goals are a brief theoretical basis of the examined issues and selected results of secondary research on consumer behaviour based on available statistical data and information. Consumer behaviour changes drastically in times of crisis. Czech consumer is addressed daily by a specific communication media of store chains – the leaflets. These appear daily in mailboxes and are generally positively accepted. There are also negative opinions, both from consumers as well as the EU. Respondents were asked about their financial situation, to what extent they change their buying behaviour with respect to the income level of households. It turned out that the impulse to purchase goods on the basis of promotional leaflets in mailboxes does not depend on the age and sex of respondents, but depends on the income level and education. The largest proportion of respondents considers leaflets because of promotional discounts.

  15. Geographic data: Zip Codes (Shape File)

    Data.gov (United States)

    Montgomery County of Maryland — This dataset contains all zip codes in Montgomery County. Zip codes are the postal delivery areas defined by USPS. Zip codes with mailboxes only are not included. As...

  16. The limiting shape of a full mailbox

    Czech Academy of Sciences Publication Activity Database

    Formentin, Marco; Swart, Jan M.

    2016-01-01

    Roč. 13, č. 2 (2016), s. 1151-1164 ISSN 1980-0436 R&D Projects: GA ČR GAP201/12/2613 Institutional support: RVO:67985556 Keywords : Self-organized criticality * Gabrielli and Caldarelli queueing model * Barabasi queueing model * email communication Subject RIV: BA - General Mathematics Impact factor: 0.382, year: 2016 http://library.utia.cas.cz/separaty/2016/SI/swart-0469224.pdf

  17. New Secure E-mail System Based on Bio-Chaos Key Generation and Modified AES Algorithm

    Science.gov (United States)

    Hoomod, Haider K.; Radi, A. M.

    2018-05-01

    The E-mail messages exchanged between sender’s Mailbox and recipient’s Mailbox over the open systems and insecure Networks. These messages may be vulnerable to eavesdropping and itself poses a real threat to the privacy and data integrity from unauthorized persons. The E-mail Security includes the following properties (Confidentiality, Authentication, Message integrity). We need a safe encryption algorithm to encrypt Email messages such as the algorithm Advanced Encryption Standard (AES) or Data Encryption Standard DES, as well as biometric recognition and chaotic system. The proposed E-mail system security uses modified AES algorithm and uses secret key-bio-chaos that consist of biometric (Fingerprint) and chaotic system (Lu and Lorenz). This modification makes the proposed system more sensitive and random. The execution time for both encryption and decryption of the proposed system is much less from original AES, in addition to being compatible with all Mail Servers.

  18. A CAMAC-resident microprocessor used for field control of a dipole magnet

    International Nuclear Information System (INIS)

    Sharp, F.J.; Greiner, B.F.

    1990-01-01

    An inexpensive, self-contained microprocessor supporting an on-chip BASIC interpreter has been incorporated into a CAMAC auxiliary-crate controller, with an EEPROM and a terminal port. Used with an ASCII computer terminal, the intelligent auxiliary controller is a self-contained program-development system. One application for the intelligent auxiliary controller is closed-loop control of the analyzing dipoles at the negative-ion injector of the TASCC (tandem accelerator superconducting cyclotron) heavy-ion accelerators. A BASIC program stored in the EEPROM runs on power-up of the controller. The program reads control numbers from a CAMAC mailbox, converts the ASCII character string from a precision Hall-probe teslameter to a digital field reading, and writes a control number to the dipole controller. The program iterates until the dipole reaches the demand field, while updating another CAMAC mailbox with a field readback for the main control system. (orig.)

  19. Updated spam filters reduce amount of messages in spam folder

    CERN Multimedia

    IT Department

    2010-01-01

    The flow of spam (unsolicited e-mail) targetting CERN mailboxes is constantly increasing: 96% of the 2 million mails received daily at CERN consist in successfully filtered spam, but spammers get smarter and detecting spam is becoming ever more difficult. In order to address this evolution, a new spam-detection software engine will progressively be deployed in next weeks. The aim is to decrease number of SPAM messages which are delivered to users’ Inboxes and to spam folders. Users can notify mail service about SPAM messages. To submit a spam message one can send it as an attachment. For more details please refer to the help pages (see links below). Useful links: To report spam messages please refer to information on http://cern.ch/mail/Help/?fdid=31 To configure spam filtering for your CERN mailbox, go to http://cern.ch/mail and click ‘spam fight’. Thank you for your collaboration. CERN Mail Services

  20. How To Make Cities More Fun

    NARCIS (Netherlands)

    Nijholt, Anton

    2017-01-01

    For starters: Talking mailboxes, videogames for pedestrians waiting to cross the street and cartoon animals on the sidewalk Let’s face it: Urban living can be kind of grim. People become isolated from each other. They get trapped in routine. They grow so familiar—and bored—with their surroundings

  1. 76 FR 45566 - Information Collection Being Submitted for Review and Approval to the Office of Management and...

    Science.gov (United States)

    2011-07-29

    ... individuals in this collection. Pursuant to section 208(b) of the E-Government Act of 2002, 44 U.S.C. 3501, in... forms of information technology; and (e) ways to further reduce the information collection burden [email protected] ; and to the Federal Communications Commission's PRA mailbox (e-mail address: [email protected

  2. Bijblijven op je vakgebied nieuwe stijl! : Awareness tools voor e-journals

    NARCIS (Netherlands)

    Bijker, Alie; van den Brekel, Guus

    2013-01-01

    "Ik probeer regelmatig een aantal favoriete tijdschriften via email alerts te lezen, maar blijf het omslachtig vinden en mijn mailbox raakt maar voller en voller!" "Ik vind het lastig om op mijn tablet of via de email vanaf thuis toegang te krijgen tot de full text van artikelen" Hoe blijf je op de

  3. Why Teach Abroad: Two American Teachers Explain Their Motivations and Experiences Teaching in Bulgaria

    Science.gov (United States)

    Potash, Betsy; Potash, Brett

    2011-01-01

    A Fulbright poster on the bulletin board, a Search Associates flier in the mailbox, a rumor of something different--everyone has heard about teaching abroad. But is it worth filling out all that paperwork, installing Skype on the family's computers, and learning a new language? In this article, two American teachers explain their motivations and…

  4. Computer Security: Enter the Cloud, pay with your password

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Let me tell you a story that recently happened to a colleague of mine. She was looking for a nice e-mail client for her brand new Android smartphone. She found several apps suiting her needs, installed all of them on her phone, configured them with her CERN password so that they could access her CERN e-mails and tested them thoroughly. In the end, she was happy with one and deleted the other apps.   But she wasn’t happy for long: over the following days, she realized that many new e-mails in her CERN mailbox were mysteriously marked as “read” despite her never having accessed them. A dedicated analysis of the CERN e-mail logs showed that one of the e-mail app providers was still downloading her emails - even though she had uninstalled the corresponding app from her smartphone. In fact, her CERN password had ended up in the Cloud, continuing to allow access to her inbox (similar to what Google does when you let Gmail pull your e-mails from your CERN mailbox). Neit...

  5. Bipartisan proposal calls for SGR repeal

    Directory of Open Access Journals (Sweden)

    Robbins RA

    2013-11-01

    Full Text Available No abstract available. Article truncated at 150 words. The Washington Post (11/1, Carey reports a bipartisan group of legislators has agreed on a framework replacing the “problematic” Medicare payment formula in an attempt to end the annual Sustainable Growth Rate (SGR or “doc fix” debate. The current system is set to reduce Medicare physician payments by approximately 25% on Jan. 1 without Congressional intervention. Senate Finance Committee Chairman Max Baucus (D-MT and House Ways and Means Committee Chairman Dave Camp (R-MI introduced a draft proposal that would “encourage care management services for individuals with complex chronic care needs through the development of new payment codes for such services, as well as leverage physician-developed standard of care guidelines to avoid the unnecessary provision of services”. The Committees value your feedback on this proposal. Please submit written comments to the Finance SGR comments mailbox at sgrcomments@finance.senate.gov and the Ways & Means SGR comments mailbox at sgrwhitepaper@mail.house.gov by Tuesday, November 12, …

  6. The Design of a Secure File Storage System

    Science.gov (United States)

    1979-12-01

    ERROR _CODE (Przi SUCO COPE) !01ile not found; write access to dtrectorv not permitted I t := GATEKEFPER?.TICKFT ’MAIL BOX, 0) G ATE KF YP F I ~D iNC...BOX.MS’T.SUCC CODE F’OF COD? (DIOR SUCO CODE) Ifile_ not found.; Fead acceLss to directoryv file t ~TRKEPE.TIKFT MIT BOX C) GATHYP~PE-I.AWAIT (MAILBOX, C. (t+2

  7. Conservation of diverse old wooden objects by impregnation and radiation curing

    International Nuclear Information System (INIS)

    Schaudy, R.; Slais, E.; Eibner, C.

    1983-12-01

    The conservation by impregnation with radiation-curable impregnating agents and subsequent curing with gamma radiation of an medieval wooden window-frame, several gold-coated frame fragments, a primitive flail and a poppy mallet as well as fragments of a painted mail-box and of a border is described and the results are discussed. The process is especially suited for the consolidation of heavily decayed porous objects, e.g. archaeologic findings. (Author) [de

  8. A CAMAC-VME-Macintosh data acquisition system for nuclear experiments

    Science.gov (United States)

    Anzalone, A.; Giustolisi, F.

    1989-10-01

    A multiprocessor system for data acquisition and analysis in low-energy nuclear physics has been realized. The system is built around CAMAC, the VMEbus, and the Macintosh PC. Multiprocessor software has been developed, using RTF, MACsys, and CERN cross-software. The execution of several programs that run on several VME CPUs and on an external PC is coordinated by a mailbox protocol. No operating system is used on the VME CPUs. The hardware, software, and system performance are described.

  9. Melting lizards and crying mailboxes: Children's preferential recall of minimally counterintuitive concepts

    Science.gov (United States)

    Banerjee, Konika; Haque, Omar S.; Spelke, Elizabeth S.

    2013-01-01

    Previous research with adults suggests that a catalog of minimally counterintuitive concepts, which underlies supernatural or religious concepts, may constitute a cognitive optimum, and is therefore cognitively encoded and culturally transmitted more successfully than either entirely intuitive concepts or maximally counterintuitive concepts. The current study examines whether children's concept recall similarly is sensitive to the degree of conceptual counterintuitiveness (operationalized as a concept's number of ontological domain violations) for items presented in the context of a fictional narrative. Seven-to-nine-year old children who listened to a story including both intuitive and counterintuitive concepts recalled the counterintuitive concepts containing one (Experiment 1) or two (Experiment 2) but not three (Experiment 3) violations of intuitive ontological expectations significantly more and in greater detail than the intuitive concepts, both immediately after hearing the story and one week later. We conclude that one or two violations of expectation may be a cognitive optimum for children: they are more inferentially rich and therefore more memorable, whereas three or more violations diminish memorability for target concepts. These results suggest that the cognitive bias for minimally counterintuitive ideas is present and active early in human development, near the start of formal religious instruction. This finding supports a growing literature suggesting that diverse, early- emerging, evolved psychological biases predispose humans to hold and perform religious beliefs and practices whose primary form and content is not derived from arbitrary custom or the social environment alone. PMID:23631765

  10. Design and application of PDF model for extracting

    Science.gov (United States)

    Xiong, Lei

    2013-07-01

    In order to change the steps of contributions in editorial department system from two steps to one, this paper advocates that the technology of extracting the information of PDF files should be transplanted from PDF reader into IEEE Xplore contribution system and that it should be combined with uploading in batch skillfully to enable editors to upload PDF files about 1GB in batch for once. Computers will extract the information of the title, author, address, mailbox, abstract and key words of thesis voluntarily for later retrieval so as to save plenty of labor, material and finance for editorial department.

  11. Take control of Apple Mail in Leopard

    CERN Document Server

    Kissell, Joe

    2009-01-01

    Go under the hood with new (and old) features in Apple Mail in Leopard! Are you using Apple Mail in Leopard effectively? In this book, completely updated from its previous Panther and Tiger editions, author Joe Kissell provides comprehensive guidance, with a focus on new and updated features. You'll learn how to use and customize the Mail window, control the size and styling of incoming messages, and make rules to move messages into different mailboxes automatically. The book covers outgoing mail, showing you smart ways to address messages, send attachments, and send HTML-based messages. Bu

  12. New course: “Lync – click to call and collaborate with others”

    CERN Multimedia

    2013-01-01

    The presentation will cover main features of Lync: initiating and receiving phone calls from Lync, chatting (Instant Message), how to stay connected as if you were in your office, creating and participating in online meetings, sharing presentations/desktops with other people, using voice mailbox on Exchange, integration with Outlook, CERN Phone book, phone system etc. General information about Lync can be found on http://cern.ch/lync. Softphone features of Lync are detailed on http://cern.ch/softphone. Next session: 16 May 2013 from 2 p.m. to 3 p.m. in English. Please register through the training catalogue. Lync service & Technical training

  13. Paper- or Web-Based Questionnaire Invitations as a Method for Data Collection: Cross-Sectional Comparative Study of Differences in Response Rate, Completeness of Data, and Financial Cost.

    Science.gov (United States)

    Ebert, Jonas Fynboe; Huibers, Linda; Christensen, Bo; Christensen, Morten Bondo

    2018-01-23

    Paper questionnaires have traditionally been the first choice for data collection in research. However, declining response rates over the past decade have increased the risk of selection bias in cross-sectional studies. The growing use of the Internet offers new ways of collecting data, but trials using Web-based questionnaires have so far seen mixed results. A secure, online digital mailbox (e-Boks) linked to a civil registration number became mandatory for all Danish citizens in 2014 (exemption granted only in extraordinary cases). Approximately 89% of the Danish population have a digital mailbox, which is used for correspondence with public authorities. We aimed to compare response rates, completeness of data, and financial costs for different invitation methods: traditional surface mail and digital mail. We designed a cross-sectional comparative study. An invitation to participate in a survey on help-seeking behavior in out-of-hours care was sent to two groups of randomly selected citizens from age groups 30-39 and 50-59 years and parents to those aged 0-4 years using either traditional surface mail (paper group) or digital mail sent to a secure online mailbox (digital group). Costs per respondent were measured by adding up all costs for handling, dispatch, printing, and work salary and then dividing the total figure by the number of respondents. Data completeness was assessed by comparing the number of missing values between the two methods. Socioeconomic variables (age, gender, family income, education duration, immigrant status, and job status) were compared both between respondents and nonrespondents and within these groups to evaluate the degree of selection bias. A total 3600 citizens were invited in each group; 1303 (36.29%) responded to the digital invitation and 1653 (45.99%) to the paper invitation (difference 9.66%, 95% CI 7.40-11.92). The costs were €1.51 per respondent for the digital group and €15.67 for paper group respondents. Paper

  14. Get all the official CERN holidays automatically added to your CERN mailbox calendar

    CERN Multimedia

    CERN Mail Services

    2013-01-01

    A new tool has been created that makes it easy to check the official CERN holidays. These holidays will appear automatically in your calendar. Currently, to check the official CERN holidays, you had to consult either the CERN website or EDH. Now you can see these holidays in your CERN calendar together with absences, meetings and other events. To take advantage of this feature: add yourself as member of the e-group “holidays-to-calendar” here. You can also use this link. Your calendar will be updated the very next day.

  15. Take control of mail on the iPad, iPhone, and iPod Touch

    CERN Document Server

    Kissell, Joe

    2010-01-01

    Questions answered in this ebook include: Why is an IMAP account especially useful on a mobile device? How do I set up my email accounts? How do I move around in the Mail app? How do I set up mailboxes for effective navigation and filing? How do I handle attachments? How does Mail integrate with other apps, like Calendar and Contacts? What are the best ways to find messages in the Mail app? What's the deal with Exchange/ActiveSync accounts? Should I push or fetch my messages? How do I integrate Gmail with the Mail app? Help! I can't send my email... what should I do?

  16. New course: “Lync – click to call and collaborate with others”

    CERN Multimedia

    2013-01-01

    The presentation will cover the main features of Lync: initiating and receiving phone calls from Lync, chatting (Instant Message), how to stay connected as you were in your office, creating and participating in online meetings, sharing presentations/desktops with other people, using the voice mailbox on Exchange, integration with Outlook, CERN Phone book, phone system etc.   General information about Lync can be found on http://cern.ch/lync, Softphone features of Lync are detailed on http://cern.ch/softphone. Next session: 17 June 2013, from 11 a.m. to 12 a.m. in French. Please register through the Training Catalogue. Lync service and Technical Training

  17. Embedded real-time operating system micro kernel design

    Science.gov (United States)

    Cheng, Xiao-hui; Li, Ming-qiang; Wang, Xin-zheng

    2005-12-01

    Embedded systems usually require a real-time character. Base on an 8051 microcontroller, an embedded real-time operating system micro kernel is proposed consisting of six parts, including a critical section process, task scheduling, interruption handle, semaphore and message mailbox communication, clock managent and memory managent. Distributed CPU and other resources are among tasks rationally according to the importance and urgency. The design proposed here provides the position, definition, function and principle of micro kernel. The kernel runs on the platform of an ATMEL AT89C51 microcontroller. Simulation results prove that the designed micro kernel is stable and reliable and has quick response while operating in an application system.

  18. Lync: click to call and collaborate with others

    CERN Multimedia

    2013-01-01

    A new session (in French) will be held Monday 25 November at 11 a.m. in the Technical Training Centre.   The presentation will cover the main features of Lync, including: the use of its softphone with CERN phone number; how to instant message; how to stay connected as if you are in your office; creating and participating in online meetings; how to share presentations/desktops with other people; how to use a voice mailbox on Exchange; integrating with Outlook, CERN phone book, CERN phone system, etc. General information about Lync can be found on http://cern.ch/lync. Please register through our Training catatalogue.   Lync service & Technical Training  

  19. Communication from La Poste

    CERN Multimedia

    2005-01-01

    We should like to remind users that post sent to the CERN site must be correctly addressed in order to reach the right destination as quickly as possible: Correspondence (goods subject to Swiss VAT): Surname, first name CERN (Department, Building & Mailbox) Route de Meyrin 385 Case Postale 1211 Genève 23 CERN (Switzerland) Official orders (goods not subject to Swiss VAT): CERN Goods Reception Order number ( Ca, Ct, Cl....) For the attention of: (surname, first name) Route de Meyrin 385 Case Postale 1211 Genève 23 CERN (Switzerland) Please inform your suppliers of the above addresses. Last minute Swiss motorway sticker on sale at the POST OFFICE, Main Building (63 R 02) 40.- CHF

  20. Reminder - Extension/suppression of allowance for dependent children aged 20 to 25

    CERN Multimedia

    HR Department

    2011-01-01

    Members of the personnel with dependent children aged 20 to 25 (or reaching 20 during the 2011/2012 school year), for whom an allowance for dependent children is currently paid, are invited to provide the Education Fees Service with a: SCHOOL CERTIFICATE Unless we receive, by 31 October 2011 at the latest, a school certificate or similar written proof (contract of work placement, sandwich courses or apprenticeship) covering your child / children for the school year 2011/2012, we will be obliged to stop payment of the allowance for dependent children as well as affiliation to the health insurance at the appropriate date and retroactively if necessary. Education Fees Service Mailbox C20000 schoolfees.service@cern.ch Tel. 72862 / 71421

  1. Melting Lizards and Crying Mailboxes: Children's Preferential Recall of Minimally Counterintuitive Concepts

    Science.gov (United States)

    Banerjee, Konika; Haque, Omar S.; Spelke, Elizabeth S.

    2013-01-01

    Previous research with adults suggests that a catalog of minimally counterintuitive concepts, which underlies supernatural or religious concepts, may constitute a cognitive optimum and is therefore cognitively encoded and culturally transmitted more successfully than either entirely intuitive concepts or maximally counterintuitive concepts. This…

  2. Review: Joachim R. Höflich (2003. Mensch, Computer und Kommunikation. Theoretische Verortungen und empirische Befunde [Man, Computer, Communication. Theoretical Positions and Empirical Findings

    Directory of Open Access Journals (Sweden)

    Jan Schmidt

    2004-05-01

    Full Text Available Joachim R. HÖFLICH presents a theory of the institutionalization of computer-mediated communication that centers on the user and his/her expectations. "Computer frames", consisting of rules and routines for the appropriate use of a medium and its applications as a tool for information, public discussion or interpersonal communication, structure the single usage episodes as well as the users' expectations. Drawing on a variety of data on the development of the Newspaper-Mailbox "Augsburg Newsline" in the Mid-Nineties, HÖFLICH demonstrates the usefulness of his conceptual framework for empirical analysis. His book is, therefore, a valuable contribution to the field of online research in social and communication science alike. URN: urn:nbn:de:0114-fqs040297

  3. Reminder: extension/suppression of allowance for dependent children aged 20 to 25

    CERN Multimedia

    2013-01-01

    Members of the personnel with dependent children aged 20 to 25 (or reaching 20 during the 2013/2014 school year), for whom an allowance for dependent children is currently paid, are invited to provide the Education Fees service with a SCHOOL CERTIFICATE.   Unless we receive, by October 31, 2013 at the latest, a school certificate or similar written proof (contract of work placement, sandwich course or apprenticeship) covering your child / children for the school year 2013/2014, we will be obliged to stop payment of the allowance for dependent children as well as affiliation to the health insurance at the appropriate date and retroactively if necessary.   Education fees service HR/CB-B Mailbox C20000 schoolfees.service@cern.ch Tel.: 72862 / 71421

  4. REMINDER: Extension/suppression of allowance for dependent children aged 20 to 25

    CERN Multimedia

    2012-01-01

    Members of the personnel with dependent children aged 20 to 25 (or reaching 20 during the 2012/2013 school year), for whom an allowance for dependent children is currently paid, are invited to provide the Education fees service with a   SCHOOL CERTIFICATE.   Unless we receive, by October 31, 2012 at the latest, a school certificate or similar written proof (contract of work placement, sandwich courses or apprenticeship) covering your child / children for the school year 2012/2013, we will be obliged to stop payment of the allowance for dependent children as well as affiliation to the health insurance at the appropriate date and retroactively if necessary.   Education fees service HR/CB-B Mailbox C20000 schoolfees.service@cern.ch Tel. 72862 / 71421

  5. Getting down to business with solar energy

    International Nuclear Information System (INIS)

    Niederhaeusern, A.

    2008-01-01

    In this interview with Hans Ruedi Schweizer, President of the Board of Governors of the Swiss Ernst Schweizer AG company and this company's Head of Solar Energy Systems, Andreas Haller, the over thirty year history of the company's solar activities is examined. The company's efforts and its success in the area of solar energy and the efficient use of energy in the company's own facilities are discussed. The other areas of activity of the company cover facade elements, windows and doors through to mailboxes. Competition on the solar collector market and the need for more professional installation experts are discussed, as is the company's patented mounting system for photovoltaic panels. Finally, the wishes of the interviewees with respect to Swiss energy politics are noted.

  6. DEGRADATION MODES OF ALLOY 22 IN YUCCA MOUNTAIN REPOSITORY CONDITIONS

    Energy Technology Data Exchange (ETDEWEB)

    F. Hua; G.M. Gordon; R.B. Rebak

    2005-10-13

    The nuclear waste package design for Yucca Mountain (Nevada, USA), in its current configuration, consists of a double wall cylindrical container fabricated using a highly corrosion resistant Ni-based Alloy 22 for the outer barrier and type 316 stainless steel for the inner structural vessel. A mailbox-shaped drip shield fabricated primarily using Ti Grade 7 will cover the waste packages. The environmental degradation of the relevant materials have been extensively studied and modeled for over ten years. This paper reviews the state-of-the-art understanding of the degradation modes of Alloy 22 (N06022) due to its interaction with the predicted in-drift mountain conditions including temperature and types of electrolytes. Subjects discussed include thermal aging and phase stability, dry oxidation, general and localized corrosion, stress corrosion cracking and hydrogen induced cracking.

  7. DEGRADATION MODES OF ALLOY 22 IN YUCCA MOUNTAIN REPOSITORY CONDITIONS

    International Nuclear Information System (INIS)

    Hua, F.; Gordon, G.M.; Rebak, R.B.

    2005-01-01

    The nuclear waste package design for Yucca Mountain (Nevada, USA), in its current configuration, consists of a double wall cylindrical container fabricated using a highly corrosion resistant Ni-based Alloy 22 for the outer barrier and type 316 stainless steel for the inner structural vessel. A mailbox-shaped drip shield fabricated primarily using Ti Grade 7 will cover the waste packages. The environmental degradation of the relevant materials have been extensively studied and modeled for over ten years. This paper reviews the state-of-the-art understanding of the degradation modes of Alloy 22 (N06022) due to its interaction with the predicted in-drift mountain conditions including temperature and types of electrolytes. Subjects discussed include thermal aging and phase stability, dry oxidation, general and localized corrosion, stress corrosion cracking and hydrogen induced cracking

  8. Read your mail and more with Outlook 2007 - (IT3T/2007/4)

    CERN Multimedia

    CERN. Geneva

    2007-01-01

    IT3T/2007/4 - Lisez vos emails, et plus encore, avec Outlook 2007 Cette presentation vous expliquera, non seulement, comment utiliser Outlook 2007 pour envoyer et recevoir vos messages, mais aussi comment gérer un agenda, partager une boite aux lettres entre plusieurs personnes, conserver vos courriers dans votre ordinateur portable, utiliser la messagerie instantanée et configurer diverses options avancées comme le filtre anti-spam. IT3T/2007/4 - Read your mail and more with Outlook 2007 The presentation will explain how to use Outlook 2007 not only for sending and receiving messages but also for managing a personal calendar, sharing a mailbox between several people, keeping mails in a portable computer, using instant messaging and configuring various options including the anti-spam filter.

  9. No certificate, no chocolate

    CERN Multimedia

    Computer Security Team

    2013-01-01

    Are you already ready to use “certificates” to log into CERN or to connect to the global “eduroam” wireless network? No, I am not talking about your birth certificate, medical certificates or academic certificates. I am referring to “certificates” used for authentication where you would usually use a password.   These digital certificates are a valid alternative to cumbersome passwords. Like the aforementioned personal certificates, a digital certificate is an official document that proves who you are or your qualifications. Your personal digital CERN certificate is tied to your digital identity at CERN. In that respect, a digital certificate is like a password. It is a credential that you must not share with anybody else! With your digital certificate, I can impersonate you and take over your mailbox, your web sessions and more… Digital certificates bind your digital identity to a public/private-key infrastructu...

  10. Send your data into the cloud and make it… vaporize

    CERN Multimedia

    Computer Security Team

    2011-01-01

    “Cloud computing” --- the term is as nebulous as real clouds.   Basically, it means storing data somewhere on the Internet. This certainly has advantages, since this data will be available anytime from anywhere. For example, the Google mailbox is available from everywhere; “Dropbox” provides a central storage for any type of files; “ZAPR” and “TeamViewer”, once installed, allow you to share your local files by just sending around links, or give third parties full remote access to your PC, respectively. In addition, there is a growing number of cloud synchronisation services (e.g. “iCloud”/”MobileMe”, “Firefox Sync”, “Dropbox”) which provide (semi-)automatic back-ups of all local files of a laptop, PC or mobile phone. But hold on. What actually is transferred into the cloud? Personal files like bank statements? Passwords, especially CE...

  11. 75 FR 33657 - Notification of a Public Meeting and Mailbox on the Presidential Memorandum on Federal Small...

    Science.gov (United States)

    2010-06-14

    ... business participation; (2) using innovative strategies and technologies to increase opportunities for... advantage of the creativity, innovation, and technical expertise of the small business community, including... respect to strategies for increasing small business contracting opportunities, and utilizing new...

  12. Data Protection for All

    CERN Multimedia

    Computer Security Team

    2012-01-01

    What a stir… was caused by two articles in the last issue of the Bulletin, on “New Snail Mail Scanning Service” and “CERN meets Facebook”!   Indeed, respondents were completely correct that opening letters addressed to others and scanning such letters violates basic privacy rules. Also, giving your photo, address, computing accounts, personal files and documents to a third party - especially an external party - is a NO-NO, as CERN considers some of this data to be personal. For example, your CERN mailbox and your “private” folders on AFS and DFS are 100% yours. Neither your supervisor, the AFS/DFS/mail service administrators nor the Computer Security Team have any right to access this data. Strict procedures have been established for the rare cases where such access is necessary, and these require the approval of the CERN Chief Information Officer (CIO), the Legal Service and the DG. But did you know tha...

  13. Adaptive Naive Bayesian Anti-Spam Engine

    CERN Document Server

    Gajewski, W P

    2006-01-01

    The problem of spam has been seriously troubling the Internet community during the last few years and currently reached an alarming scale. Observations made at CERN (European Organization for Nuclear Research located in Geneva, Switzerland) show that spam mails can constitute up to 75% of daily SMTP traffic. A naïve Bayesian classifier based on a Bag of Words representation of an email is widely used to stop this unwanted flood as it combines good performance with simplicity of the training and classification processes. However, facing the constantly changing patterns of spam, it is necessary to assure online adaptability of the classifier. This work proposes combining such a classifier with another NBC (naïve Bayesian classifier) based on pairs of adjacent words. Only the latter will be retrained with examples of spam reported by users. Tests are performed on considerable sets of mails both from public spam archives and CERN mailboxes. They suggest that this architecture can increase spam recall without af...

  14. Don’t let your mail leak

    CERN Multimedia

    Computer Security Team

    2012-01-01

    At CERN, data privacy is of paramount importance, and we are currently developing a comprehensive data protection policy. For example, your CERN mailbox and your “private” folders on AFS and DFS are considered yours...   You might feel like you have nothing to hide, but we are not only talking about personal e-mail: data privacy also pertains to financial mail (acquisitions, tenders), mail related to HR (contracts, assessments), medical information, etc.  As this is considered “private” even if it is work-related, the data cannot normally be accessed by your supervisor, the AFS/DFS/mail service administrators or even the Computer Security Team. Tight procedures have been established for the rare cases where such access is necessary, and these require the prior approval of the CERN Computer Security Officer or the IT Department Head, the Legal Service and the DG (see here for more details). Data privacy is not only the responsibility of the O...

  15. Monthly radiation protection training of workers: An evaluation of two years operational practice

    International Nuclear Information System (INIS)

    Berus, D.; Covens, P.

    2011-01-01

    Radiation protection training and education is important in stimulating safety culture of occupationally exposed workers. Taking into account the mandatory requirements in relation to education and training a digital training tool was introduced for communication of personal dose results and regular information on radiation protection. This tool enables that personal dose reports are monthly sent to the individual mailbox of workers together with short comprehensive slideshows on radiation protection topics. After two years of operational practice a survey was organised to evaluate the training tool. The results show that the majority (92%) of the occupationally exposed workers are aware of the communication of personal dose results through e-mail. Furthermore, 81% of these workers are also aware of their monthly and cumulated dose level. The monthly information on radiation protection topics is however less consulted. Around 40% of the workers that noticed the link are indifferent to the monthly information. The interest in radiation protection issues increases however with the education level.

  16. Research and implementation on improving I/O performance of streaming media storage system

    Science.gov (United States)

    Lu, Zheng-wu; Wang, Yu-de; Jiang, Guo-song

    2008-12-01

    In this paper, we study the special requirements of a special storage system: streaming media server, and propose a solution to improve I/O performance of RAID storage system. The solution is suitable for streaming media applications. A streaming media storage subsystem includes the I/O interfaces, RAID arrays, I/O scheduling and device drivers. The solution is implemented on the top of the storage subsystem I/O Interface. Storage subsystem is the performance bottlenecks of a streaming media system, and I/O interface directly affect the performance of the storage subsystem. According to theoretical analysis, 64 KB block-size is most appropriate for streaming media applications. We carry out experiment in detail, and verified that the proper block-size really is 64KB. It is in accordance with our analysis. The experiment results also show that by using DMA controller, efficient memory management technology and mailbox interface design mechanism, streaming media storage system achieves a high-speed data throughput.

  17. The new Bulletin arrives in two weeks

    CERN Multimedia

    2006-01-01

    In May, you will discover a redesigned CERN Bulletin. Starting with the first May issue (No. 19-20/2006), the format of the CERN Bulletin will change completely. The page layout will be more attractive, reminiscent of a proper newspaper, with pictograms to identify the different sections. The information provided will also be more visible. The Bulletin was much in need of a makeover as its current layout dates back to 1976! The introduction of the new format will coincide with the introduction of a new means of distribution. You will still receive the elctronic version of the Bulletin every week directly on your computer. However, in order to avoid the waste from the dozens of copies that linger unread in people's mailboxes, the paper version will be available at a series of distribution points around the Laboratory. You will find the Bulletin along with the Staff Association newsletter at the cafeteria closest to your office. The Bulletin will be available from the following distribution points: On the M...

  18. The redesigned Bulletin is on its way

    CERN Multimedia

    2006-01-01

    In May, you will discover a redesigned CERN Bulletin. Starting with the first May issue (No. 19-20/2006), the format of the Bulletin will change completely. The page layout will be more attractive, reminiscent of a proper newspaper, with pictograms to identify the different sections. The information provided will also be more visible. The Bulletin was much in need of a makeover as its current layout dates back to 1976! The introduction of the new format will coincide with the introduction of a new means of distribution. You will still receive the electronic version of the Bulletin every week directly on your computer. However, in order to avoid the waste from the dozens of copies that linger unread in people's mailboxes, the paper version will be available at a series of distribution points around the Laboratory. You will find the Bulletin along with the Staff Association newsletter at the cafeteria closest to your office. The Bulletin will be available from the following distribution points: On the Meyrin...

  19. Addressing the service linkage problem. Increasing substance abuse treatment engagement using personalized feedback interventions in heavy-using female domestic violence shelter residents.

    Science.gov (United States)

    Ogle, Richard L; Baer, John S

    2003-11-01

    Two personalized substance abuse assessment and feedback interventions were tested for effectiveness in engaging female domestic violence shelter residents in substance abuse treatment. One hundred forty-seven residents were assessed for quantity andfrequency of substance use, negative consequences due to use, motivation to change substance use behavior, and psychopathological symptoms related to substance abuse. Assessment identified (33) 22% of participants as heavy substance users. Twenty of the 33 heavy-using residents received one of two personalized substance use feedback interventions:face-to-face feedback or writtenfeedbackplaced in shelter mailboxes. Treatment engagement was defined as attending at least one substance abuse treatment session within 30 days after the intervention. Results showed a significant difference in treatment engagement rates in favor of the face-to-face feedback group (60% vs. 0%). The results provide preliminary data suggesting that substance abuse assessment can be effectively accomplished in the shelter environment and that the face-to-face feedback procedure may be an effective intervention to bridge the service linkage problem between domestic violence services and substance abuse treatment.

  20. A new open GKS-based supervision system in use at GANIL

    International Nuclear Information System (INIS)

    Lecorche, E.

    1990-01-01

    Since the beginning of 1989, a new supervision system has been added to the GANIL control system in order to get a better view of data handled by programmable controllers. This supervisory system has been designed around software named IMAGIN, provided by the French company Sferca. IMAGIN runs on VAX/VMS workstations and its graphic capabilities are based on the GKS IIc standard. It consists of software modules, including a graphic editor and a 'configurer' used to create dynamic objects associated with external variables. The real-time display achieved by an 'animator' process is synchronized with user software programs by means of mailboxes. This gives the whole system the capability of meeting any specific requirement. Moreover, this supervisory system is capable of controlling the programmable controllers as well as any processor which can be reached from the workstations. This paper describes the main features of IMAGIN software and then emphasizes some implementations which have been carried out at GANIL, to supervise either the programmable controllers or the existing control system. (orig.)

  1. Public PCs: Log Out or Lose Out

    CERN Multimedia

    Computer Security Team

    2013-01-01

    Do you regularly use one of the public Windows or Linux terminals in the CERN library or in front of the Users' Office? Or do you often give presentations or run meetings, workshops or conferences? Did you recently attend a training session in the CERN Training Centre? If you answered at least once with “yes”, we have a plea for you: LOG OUT when done in order to protect your data!   You might recall that CERN considers that “Your Privacy is Paramount”. But this does not come for free. In the few past months, we have received several reports from vigilant people who have spotted open user sessions on public PCs at CERN. Those users simply forgot to log out once their work, training or meeting was over. Their session continued without them being present. Worse, with CERN using a central Single Sign-On (SSO) portal, their login credentials would allow a malicious person at CERN to use those credentials to access that user’s mailbox, DFS ...

  2. Holidays Come - Passwords Go

    CERN Multimedia

    Computer Security Team

    2011-01-01

    The holiday season is approaching and with it, the best chance of losing your password!!   If you are keen to access your CERN mailbox or other computing facilities at CERN from the Internet café at your hotel, hold on and think twice. Is that local PC trustworthy? Most likely it is not. It might never have been patched, and, thus, has been infected by plenty of computer viruses long time ago. Worse, nasty people might have installed tools which aim at stealing your password once you type it. Therefore, it is better to use your own laptop or mobile phone for such activities. If you decided to connect to CERN from an untrustworthy computer and had typed in your CERN password there – please seriously consider changing your CERN password at http://cern.ch/account as soon as you have access to a trustworthy computer. However, also take care when using your own laptop or mobile device: wireless communication can be intercepted. Many wireless access points, e.g. at airports, do no...

  3. The Bulletin turns the page

    CERN Multimedia

    2006-01-01

    Today, the paper version of the CERN Bulletin has a new look, the first since the 1970s. The new layout, which has been designed to improve readability, is part of an ongoing effort to improve internal communication at CERN. The Bulletin is the Organization's main tool for communication with the CERN community. It keeps everyone abreast of information that is important and essential for our working life at CERN. It plays an important role in keeping us up to date with social and scientific developments at the Laboratory. And it should be a force for cohesion across this very diverse organization. At the same time, the distribution for the printed Bulletin is being changed from individual mailboxes to distribution points around the Laboratory. This reflects changing reading habits, with the on-line version gaining a steadily increasing readership. For some time now, the paper Bulletin has been published fortnightly. However, the on-line version is updated weekly, so I encourage you all to look at it. In addi...

  4. Mail Office

    CERN Multimedia

    GS Department

    2009-01-01

    The Mail Office wishes to remind users that the CERN mail service is exclusively reserved for official CERN mail. All external official mail must be sent to the Mail Office in an unstamped envelope on which your name and Department must be clearly indicated below the official CERN address (see example) to help us to find you in the event that it cannot be delivered. If you wish to send private mail from the CERN site you must use the post offices at Meyrin (63-R-011) or Prévessin (866-R-C02). Please use "PRIORITY" envelopes only in the case of urgent mail. Any mail containing merchandise (i.e. anything other than documents) must be sent using an EDH shipping request form. INTERNAL MAIL Please remember to include the recipient’s MAILBOX number on the internal mail envelopes, either in the relevant box (new envelopes) or next to the name (old envelopes). This information, which can be found in the CERN PHONEBOOK, simplifies our t...

  5. UNSOLICITED ELECTRONIC MAIL

    CERN Multimedia

    Judy RICHARDS

    1999-01-01

    Since November 1997 we have been actively trying to reduce the amount of unsolicited electronic mail, commonly known as SPAM mail that arrives in CERN mailboxes. Unfortunately this is not an easy job since the spammers are constantly finding new ways of breaking our defences! Today spammers are 'forging' addresses in the headers and envelopes of mail in such a way that it is difficult to distinguish between legitimate mail and spams. An additional problem, that does not directly affect most CERN users but does use CERN resources and affects the reputation of CERN, is caused by the spammers who try to make mail look as if it comes from a CERN machine.They either try to route the mail via a CERN machine or simply forge the mail headers to a CERN address so it will have less chance of being blocked by the recipient's anti-spam defences.Although some anti-spam measures can be automated, for many someone has to look at the system logs and spam reports from users and make a human judgement as to what should be bloc...

  6. New Snail Mail Scanning Service

    CERN Multimedia

    2012-01-01

    Modernisation does not stop at the CERN postal service (GS/PS). “With more and more digitisation and the prevalence of e-mail throughout the site, we were hoping to provide more timely delivery of letters and make further saving in resources”, said Tueri Datta, head of GS/PS.   Instead of the standard delivery to your P.O. box, the CERN postal service will digitally scan all letters and books up to 100 pages on reception. These scans will subsequently be sent via e-mail to the corresponding recipient as PDF (Portable Data Format - you will need to install “Acrobat Reader” on your PC). Express mail will be handled with priority. Users without a valid CERN mailbox can register at mail.scan.service@cern.ch in order to have their letters read to them via the phone line (we are currently investigating whether we can use the voices of the last five DGs).   This service will start on 1st April 2012 on the Meyrin site and will gradually replace th...

  7. What do passwords and toothbrushes have in common?

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Your password is your entry token into the digital world. eBay, Amazon, Facebook, Twitter, FNAL, DESY, and CERN - all ask you for a password to authenticate and prove that you are you. And vice versa. If I know your password, I can impersonate you and use your money to buy from eBay or Amazon, post nasty messages on your Twitter or Facebook profile, or misuse CERN's/DESY's/FNAL's computing facilities in your name!   CERN accounts have been compromised in the past and misused to send spam across the world. Are you keen to delete tens of thousands of return e-mails from your mailbox? It's no fun. Would you give me your UBS bankcard and its PIN number? Of course not! Please apply the same sensitivity to your digital credentials, i.e. passwords, SSH keys, certificates, CERN card, etc. Beware of attempts to "steal" your password. CERN's computing staff, including the Computer Security Team, will never ask for your password (nor will any other legitimate person at Facebook, FNAL, eBay...

  8. Field test of short-notice random inspections for inventory-change verification at a low-enriched-uranium fuel-fabrication plant: Preliminary summary

    International Nuclear Information System (INIS)

    Fishbone, L.G.; Moussalli, G.; Naegele, G.; Ikonomou, P.; Hosoya, M.; Scott, P.; Fager, J.; Sanders, C.; Colwell, D.; Joyner, C.J.

    1994-01-01

    An approach of short-notice random inspections (SNRIs) for inventory-change verification can enhance the effectiveness and efficiency of international safeguards at natural or low-enriched uranium (LEU) fuel fabrication plants. According to this approach, the plant operator declares the contents of nuclear material items before knowing if an inspection will occur to verify them. Additionally, items about which declarations are newly made should remain available for verification for an agreed time. This report details a six-month field test of the feasibility of such SNRIs which took place at the Westinghouse Electric Corporation Commercial Nuclear Fuel Division. Westinghouse personnel made daily declarations about both feed and product items, uranium hexafluoride cylinders and finished fuel assemblies, using a custom-designed computer ''mailbox''. Safeguards inspectors from the IAEA conducted eight SNRIs to verify these declarations. Items from both strata were verified during the SNRIs by means of nondestructive assay equipment. The field test demonstrated the feasibility and practicality of key elements of the SNRI approach for a large LEU fuel fabrication plant

  9. WASP (Write a Scientific Paper): Open access unsolicited emails for scholarly work - Young and senior researchers perspectives.

    Science.gov (United States)

    Cuschieri, Sarah; Grech, Victor

    2018-04-20

    The increasing demand on academics and researchers to publish has led to the development of fake journals (also known as predatory journals). Such journals lack peer review and precipitate unfair criticism toward legitimate open access journals. Predatory journals tend to bombard a researcher's mailbox on a daily basis, inviting authors to submit a review/manuscript/opinion/short case to their journal while promising expedited publication - against a fee. This study assessed the unsolicited emails received over the period of November 2017 by a young and by a senior researcher. The young researcher received a substantially higher amount of emails (n = 101) compared to the senior researcher (n = 23). The article processing costs for solicited journals received, ranged between $49 and $3019. These journals are almost all only indexed in Google Scholar and do not display any meaningful journal metrics. Furthermore, the majority of the unsolicited emails were not relevant to the researcher's field of study. Therefore authors and readers alike should evaluate emails received with regard to journal legitimacy prior to submission of work to possibly predatory journals. Copyright © 2018 Elsevier B.V. All rights reserved.

  10. Spent Fuel Transfer to Dry Storage Using Unattended Monitoring System

    International Nuclear Information System (INIS)

    Park, Jae Hwan; Park, Soo Jin

    2009-01-01

    There are 4 CANDU reactors at Wolsung site together with a spent fuel dry storage associated with unit 1. These CANDU reactors, classified as On-Load Reactor (OLR) for Safeguards application, change 16- 24 fuel bundles with fresh fuel in everyday. Especially, the spent fuel bundles are transferred from spent fuel bays to dry storage throughout a year because of the insufficient capacity of spent fuel pond. Safeguards inspectors verify the spent fuel transfer to meet safeguards purposes according to the safeguards criteria by means of inspector's presence during the transfer campaign. For the verification, 60-80 person-days of inspection (PDIs) are needed during approximately 3 months for each unit. In order to reduce the inspection effort and operators' burden, an Unattended Monitoring System (UMS) was designed and developed by the IAEA for the verification of spent fuel bundles transfers from wet storage to dry storage. Based on the enhanced cooperation of CANDU reactors between the ROK and the IAEA, the IAEA installed the UMS at Wolsung unit 2 in January 2005 at first. After some field trials during the transfer campaign, this system is being replaced the traditional human inspection since September 1, 2006 combined with a Short Notice Inspection (SNI) and a near-real time Mailbox Declaration

  11. Editorial Research recognition

    Directory of Open Access Journals (Sweden)

    Gabriel Jacobs

    1997-12-01

    Full Text Available Only partly tongue in cheek, I suggested in ALT-N (number 18, July 1997 that we should consider mounting a Campaign for the Acknowledgement of Research into Educational Technology (CARET. I was astonished by the large number of responses in my mailbox, not one of them dissenting from the views I expressed, and many offering examples of how excellent peer-reviewed publications in good journals, sometimes associated with very respectable research grants, had vanished into the ether when it came to the last Research Assessment Exercise (RAE. Outside education as a discipline (and even there . . . , RAE subject panels appear to consider that research into learning technology is not really worth counting. University teachers of languages, history, biology, engineering and so on may produce seminal papers on learning technology within their subject-areas, and for the purposes of their department's RAE rating they might as well not have bothered - indeed, they may even be reprimanded for not having aimed more directly between the RAE goalposts. Even within disciplines such as computer science or psychology, where one might imagine that much research into educational technology would comfortably fit, I know of colleagues who have been on the receiving end of such discouragement.

  12. [Computer-aided Diagnosis and New Electronic Stethoscope].

    Science.gov (United States)

    Huang, Mei; Liu, Hongying; Pi, Xitian; Ao, Yilu; Wang, Zi

    2017-05-30

    Auscultation is an important method in early-diagnosis of cardiovascular disease and respiratory system disease. This paper presents a computer-aided diagnosis of new electronic auscultation system. It has developed an electronic stethoscope based on condenser microphone and the relevant intelligent analysis software. It has implemented many functions that combined with Bluetooth, OLED, SD card storage technologies, such as real-time heart and lung sounds auscultation in three modes, recording and playback, auscultation volume control, wireless transmission. The intelligent analysis software based on PC computer utilizes C# programming language and adopts SQL Server as the background database. It has realized play and waveform display of the auscultation sound. By calculating the heart rate, extracting the characteristic parameters of T1, T2, T12, T11, it can analyze whether the heart sound is normal, and then generate diagnosis report. Finally the auscultation sound and diagnosis report can be sent to mailbox of other doctors, which can carry out remote diagnosis. The whole system has features of fully function, high portability, good user experience, and it is beneficial to promote the use of electronic stethoscope in the hospital, at the same time, the system can also be applied to auscultate teaching and other occasions.

  13. International safeguards without material balance areas

    International Nuclear Information System (INIS)

    Sanborn, J.B.; Lu Mingshih; Indusi, J.P.

    1992-01-01

    Recently altered perceptions of the role of the non-proliferation regime, as well as continued IAEA funding constraints, suggest a need to re-examine the fundamentals of IAEA verification strategy. This paper suggests that abandoning certain material balance area (MBA) related concepts that nominally form the basic framework of ''full-scope'' safeguards would result in a more flexible inspection regime. The MBA concept applied in the domestic context enables a national authority to localize losses in space and in time and to minimize the need to measure in-process inventory. However, these advantages do not accrue to an international verification regime because it cannot truly verify the ''flows'' between MBAs without extensive containment/surveillance measures. In the verification model studied, the entire nuclear inventory of a state is periodically declared and verified simultaneously in one or two large segments (containing possibly many MBAS). Simultaneous inventory of all MBAs within a segment would occur through advance ''mailbox'' declarations and random selection of MBAs for on-site verification or through enhanced containment/surveillance techniques. Flows are generally speaking not verified. This scheme would free the inspectorate from the obligation to attempt to verify on-site each stratum of the material balance of every facility declaring significant quantities of nuclear material

  14. Field test of short-notice random inspections for inventory-change verification at a low-enriched-uranium fuel-fabrication plant

    International Nuclear Information System (INIS)

    Fishbone, L.G.; Moussalli, G.; Naegele, G.

    1995-01-01

    An approach of short-notice random inspections (SNRIs) for inventory-change verification can enhance the effectiveness and efficiency of international safeguards at natural or low-enriched uranium (LEU) fuel fabrication plants. According to this approach, the plant operator declares the contents of nuclear material items before knowing if an inspection will occur to verify them. Additionally, items about which declarations are newly made should remain available for verification for an agreed time. Then a statistical inference can be made from verification results for items verified during SNRIs to the entire populations, i.e. the entire strata, even if inspectors were not present when many items were received or produced. A six-month field test of the feasibility of such SNRIs took place at the Westinghouse Electric Corporation Commercial Nuclear Fuel Division during 1993. Westinghouse personnel made daily declarations about both feed and product items, uranium hexafluoride cylinders and finished fuel assemblies, using a custom-designed computer ''mailbox''. Safeguards inspectors from the IAEA conducted eight SNRIs to verify these declarations. They arrived unannounced at the plant, in most cases immediately after travel from Canada, where the IAEA maintains a regional office. Items from both strata were verified during the SNRIs by meant of nondestructive assay equipment

  15. Animal-eyeball vs. road-sign retroreflectors.

    Science.gov (United States)

    Greene, Nathaniel R; Filko, Brian J

    2010-01-01

    The retroreflective characteristics of ex-vitro cow and deer eyeballs were compared to those of man-made materials used in road signs and bicycle-style reflectors. Reflected intensities were measured using a goniometer that consists of a green He-Ne laser as the light source, and a photomultiplier tube as the detector. It was found that the best quality road-sign reflector, made from a 200-micron-scale, close-packed array of corner cubes, is approximately six times more efficient than a cow eyeball at returning light in the direction of the incoming beam. Less expensive man-made retroreflectors, utilizing 35-micron glass beads (as in mailbox decals) or millimeter-scale arrays of corner cubes (bicycle-style reflectors) are, however, less efficient than the cow eye. The high quality of animal eyeball optics is evidenced by their extremely tight angular spread (full width half maximum congruent with 1 degrees) of retroreflected intensity about the incident path. Moreover, as the reflector itself is rotated relative to the incident beam, the eyeballs preserve their efficiency of retroreflection better than the man-made materials. Interference-diffraction patterns were observed in the retroreflected beams from the small-scale corner cubes, but were not observed in eyeball retroreflection.

  16. Programming database tools for the casual user

    International Nuclear Information System (INIS)

    Katz, R.A; Griffiths, C.

    1990-01-01

    The AGS Distributed Control System (AGSDCS) uses a relational database management system (INTERBASE) for the storage of all data associated with the control of the particle accelerator complex. This includes the static data which describes the component devices of the complex, as well as data for application program startup and data records that are used in analysis. Due to licensing restraints, it was necessary to develop tools to allow programs requiring access to a database to be unconcerned whether or not they were running on a licensed node. An in-house database server program was written, using Apollo mailbox communication protocols, allowing application programs via calls to this server to access the interbase database. Initially, the tools used by the server to actually access the database were written using the GDML C host language interface. Through the evolutionary learning process these tools have been converted to Dynamic SQL. Additionally, these tools have been extracted from the exclusive province of the database server and placed in their own library. This enables application programs to use these same tools on a licensed node without using the database server and without having to modify the application code. The syntax of the C calls remain the same

  17. RADIO FREQUENCY IDENTIFICATION DEVICES: EFFECTIVENESS IN IMPROVING SAFEGUARDS AT GAS-CENTRIFUGE URANIUM-ENRICHMENT PLANTS

    International Nuclear Information System (INIS)

    JOE, J.

    2007-01-01

    Recent advances in radio frequency identification devices (RFIDs) have engendered a growing interest among international safeguards experts. Potentially, RFIDs could reduce inspection work, viz. the number of inspections, number of samples, and duration of the visits, and thus improve the efficiency and effectiveness of international safeguards. This study systematically examined the applications of RFIDs for IAEA safeguards at large gas-centrifuge enrichment plants (GCEPs). These analyses are expected to help identify the requirements and desirable properties for RFIDs, to provide insights into which vulnerabilities matter most, and help formulate the required assurance tests. This work, specifically assesses the application of RFIDs for the ''Option 4'' safeguards approach, proposed by Bruce Moran, U. S. Nuclear Regulatory Commission (NRC), for large gas-centrifuge uranium-enrichment plants. The features of ''Option 4'' safeguards include placing RFIDs on all feed, product and tails (F/P/T) cylinders, along with WID readers in all FP/T stations and accountability scales. Other features of Moran's ''Option 4'' are Mailbox declarations, monitoring of load-cell-based weighing systems at the F/P/T stations and accountability scales, and continuous enrichment monitors. Relevant diversion paths were explored to evaluate how RFIDs improve the efficiency and effectiveness of safeguards. Additionally, the analysis addresses the use of RFIDs in conjunction with video monitoring and neutron detectors in a perimeter-monitoring approach to show that RFIDs can help to detect unidentified cylinders

  18. Digital Environmental Governance in China: Information Disclosure, Pollution Control, and Environmental Activism in the Yellow River Delta

    Directory of Open Access Journals (Sweden)

    Jiaxin Tan

    2017-10-01

    Full Text Available The Chinese water bureaucracy increasingly utilises information and communications technology (ICT in order to strengthen interaction with the population, which is severely affected by industrial pollution. Government webpages, mailboxes, and online interviews with officers have become prevalent tools for environmental governance, including information disclosure, and a virtual communication forum between the state and its citizens. The present study employs a mixed methods approach with a qualitative emphasis to explore the process of communication and interaction between government agencies and local residents in Dongying, Shandong Province. The results show that information disclosure of pollution data remains far from being transparent, despite the fact that the local government has implemented digital environmental governance, as encouraged by the central Chinese state. Internet technologies empower resource-poor environmental activists in Dongying to strengthen their social network and build communication with the authorities. The application of bureaucratic techniques, however, is key for them to enter the communication interface with government agencies in order to influence political decisions. Results suggest that local cadres tend to send mixed signals to activists and display wariness towards them. They also tend to take preventive measures to keep the situation under control when environmental disputes arise. The proposed communication interface approach sheds a clearer light on the complexity among the emergent ICTs, environmental activism, and digital governance.

  19. Sampling strategies and materials for investigating large reactive particle complaints from Valley Village homeowners near a coal-fired power plant

    International Nuclear Information System (INIS)

    Chang, A.; Davis, H.; Frazar, B.; Haines, B.

    1997-01-01

    This paper will present Phase 3's sampling strategies, techniques, methods and substrates for assisting the District to resolve the complaints involving yellowish-brown staining and spotting of homes, cars, etc. These spots could not be easily washed off and some were permanent. The sampling strategies for the three phases were based on Phase 1 -- the identification of the reactive particles conducted in October, 1989 by APCD and IITRI, Phase 2 -- a study of the size distribution and concentration as a function of distance and direction of reactive particle deposition conducted by Radian and LG and E, and Phase 3 -- the determination of the frequency of soiling events over a full year's duration conducted in 1995 by APCD and IITRI. The sampling methods included two primary substrates -- ACE sheets and painted steel, and four secondary substrates -- mailbox, aluminum siding, painted wood panels and roof tiles. The secondary substrates were the main objects from the Valley Village complaints. The sampling technique included five Valley Village (VV) soiling/staining assessment sites and one southwest of the power plant as background/upwind site. The five VV sites northeast of the power plant covered 50 degrees span sector and 3/4 miles distance from the stacks. Hourly meteorological data for wind speeds and wind directions were collected. Based on this sampling technique, there were fifteen staining episodes detected. Nine of them were in summer, 1995

  20. Continuous improvement program in ENUSA: personnel participation and six sigma

    International Nuclear Information System (INIS)

    Montes Navarro, J.

    1998-01-01

    Since the beginning of its activities ENUSA has been a company committed with the quality of its products and services. To talk about quality is something inherent in ENUSA's daily work ENUSA's position in the market depends on its capacity to satisfy customers expectations with the best products and services, as a result of an efficient management of its processes. The word quality in its broadest sense, means that any activity can be improved. ENUSA has implemented a continuous improvement program as part of its company change project. That program consists of six basic steps: 1.- Managers commitment. 2.- Organization for continuous improvement. 3.- Quality goals. 4.- Training and informing. 5.- Personnel participation. 6.- Methodology. ENUSA has introduced these six steps during 1997-98 period. It is important to point out the commitment degree at all the company levels, focusing the organization to the continuous improvement in a multifunctional way, following the business processes: - Board of Directors - Quality Steering Committee - Quality Improvement Groups (GMC) - Quality Operative Groups (GOC) - Suggestions Mailboxes The following GMC's have been set up and are operative. - Manufacturing GMC - Supplies GMC - Installation GMC - Design GMC - Quality System GM - Projects GMC - Administrative GMC These GMC's have established thirty-six Quality Operative Groups which carry out the improvement projects. The methodology chosen by ENUSA is known as ''SIX SIGMA''. Six sigma programs have proved their huge power in big companies as MOTOROLA and, recently, GE being recognized in all the quality fields. It is, by itself, a change program in which a quality improvement methods is structured with an excellent view of processes, products and services. (Author)

  1. Open Computer Forensic Architecture a Way to Process Terabytes of Forensic Disk Images

    Science.gov (United States)

    Vermaas, Oscar; Simons, Joep; Meijer, Rob

    This chapter describes the Open Computer Forensics Architecture (OCFA), an automated system that dissects complex file types, extracts metadata from files and ultimately creates indexes on forensic images of seized computers. It consists of a set of collaborating processes, called modules. Each module is specialized in processing a certain file type. When it receives a so called 'evidence', the information that has been extracted so far about the file together with the actual data, it either adds new information about the file or uses the file to derive a new 'evidence'. All evidence, original and derived, is sent to a router after being processed by a particular module. The router decides which module should process the evidence next, based upon the metadata associated with the evidence. Thus the OCFA system can recursively process images until from every compound file the embedded files, if any, are extracted, all information that the system can derive, has been derived and all extracted text is indexed. Compound files include, but are not limited to, archive- and zip-files, disk images, text documents of various formats and, for example, mailboxes. The output of an OCFA run is a repository full of derived files, a database containing all extracted information about the files and an index which can be used when searching. This is presented in a web interface. Moreover, processed data is easily fed to third party software for further analysis or to be used in data mining or text mining-tools. The main advantages of the OCFA system are Scalability, it is able to process large amounts of data.

  2. [Towards a safety culture in the neonatal unit: Six years experience].

    Science.gov (United States)

    Esqué Ruiz, M T; Moretones Suñol, M G; Rodríguez Miguélez, J M; Parés Tercero, S; Cortés Albuixech, R; Varón Ramírez, E M; Figueras Aloy, J

    2015-10-01

    A safety culture is the collective effort of an institution to direct its resources toward the goal of safety. An analysis is performed on the six years of experience of the Committee on the Safety of Neonatal Patient. A mailbox was created for the declaration of adverse events, and measures for their correction were devised, such as case studies, continuous education, prevention of nosocomial infections, as well as information on the work done and its assessment. A total of 1287 reports of adverse events were received during the six years, of which 600 (50.8%) occurred in the neonatal ICU, with 15 (1.2%) contributing to death, and 1282 (99.6%) considered preventable. Simple corrective measures (notification, security alerts, etc.) were applied in 559 (43.4%), intermediate measures (protocols, monthly newsletter, etc.) in 692 (53.8%), and more complex measures (causal analysis, scripts, continuous education seminars, prospective studies, etc.) in 66 (5.1%). As regards nosocomial infections, the prevention strategies implemented (hand washing, insertion and maintenance of catheters) directly affected their improvement. Two surveys were conducted to determine the level of satisfaction with the Committee on the Safety of Neonatal Patient. A rating 7.5/10 was obtained in the local survey, while using the Spanish version of the Hospital Survey on Patient Safety Culture the rate was 7.26/10. A path to a culture of safety has been successfully started and carried out. Reporting the adverse events is the key to obtaining information on their nature, etiology and evolution, and to undertake possible prevention strategies. Copyright © 2014 Asociación Española de Pediatría. Published by Elsevier España, S.L.U. All rights reserved.

  3. Japanese Quality Assurance System Regarding the Provision of Material Accounting Reports and the Safeguards Relevant Information to the IAEA

    International Nuclear Information System (INIS)

    Goto, Y.; Namekawa, M.; Kumekawa, H.; Usui, A.; Sano, K.

    2015-01-01

    The provision of the safeguards relevant reports and information in accordance with the comprehensive safeguards agreement (CSA) and the additional protocol (AP) is the basis for the IAEA safeguards. The government of Japan (Japan Safeguards Office, JSGO) has believed that the correct reports contribute to effective and efficient safeguards therefore the domestic quality assurance system for the reporting to the IAEA was already established at the time of the accession of the CSA in 1977. It consists of Code 10 interpretation (including the seminars for operators in Japan), SSAC's checks for syntax error, code and internal consistency (computer based consistency check between facilities) and the discussion with the IAEA on the facilities' measurement system for bulk-handling facilities, which contributes to the more accurate reports from operators. This spirit has been maintained for the entry into force of the AP. For example, questions and amplification from the IAEA will be taken into account the review of the AP declaration before sending to the IAEA and the open source information such as news article and scientific literature in Japanese is collected and translated into English, and the translated information is provided to the IAEA as the supplementary information, which may contribute to broadening the IAEA information source and to their comprehensive evaluation. The other safeguards relevant information, such as the mail-box information for SNRI at LEU fuel fabrication plants, is also checked by the JSGO's QC software before posting. The software was developed by JSGO and it checks data format, batch IDs, birth/death date, shipper/receiver information and material description code. This paper explains the history of the development of the Japanese quality assurance system regarding the reports and the safeguards relevant information to the IAEA. (author)

  4. Israeli nurse practice environment characteristics, retention, and job satisfaction.

    Science.gov (United States)

    Dekeyser Ganz, Freda; Toren, Orly

    2014-02-24

    There is an international nursing shortage. Improving the practice environment has been shown to be a successful strategy against this phenomenon, as the practice environment is associated with retention and job satisfaction. The Israeli nurse practice environment has not been measured. The purpose of this study was to measure practice environment characteristics, retention and job satisfaction and to evaluate the association between these variables. A demographic questionnaire, the Practice Environment Scale, and a Job Satisfaction Questionnaire were administered to Israeli acute and intensive care nurses working in 7 hospitals across the country. Retention was measured by intent to leave the organization and work experience. A convenience sample of registered nurses was obtained using a bi-phasic, stratified, cluster design. Data were collected based on the preferences of each unit, either distribution during various shifts or at staff meetings; or via staff mailboxes. Descriptive statistics were used to describe the sample and results of the questionnaires. Pearson Product Moment Correlations were used to determine significant associations among the variables. A multiple regression model was designed where the criterion variable was the practice environment. Analyses of variance determined differences between groups on nurse practice environment characteristics. 610 nurses reported moderate levels of practice environment characteristics, where the lowest scoring characteristic was 'appropriate staffing and resources'. Approximately 9% of the sample reported their intention to leave and the level of job satisfaction was high. A statistically significant, negative, weak correlation was found between intention to leave and practice environment characteristics, with a moderate correlation between job satisfaction and practice environment characteristics. 'Appropriate staffing and resources' was the only characteristic found to be statistically different based on

  5. Farm Mapping to Assist, Protect, and Prepare Emergency Responders: Farm MAPPER.

    Science.gov (United States)

    Reyes, Iris; Rollins, Tami; Mahnke, Andrea; Kadolph, Christopher; Minor, Gerald; Keifer, Matthew

    2014-01-01

    Responders such as firefighters and emergency medical technicians who respond to farm emergencies often face complex and unknown environments. They may encounter hazards such as fuels, solvents, pesticides, caustics, and exploding gas storage cylinders. Responders may be unaware of dirt roads within the farm that can expedite their arrival at critical sites or snow-covered manure pits that act as hidden hazards. A response to a farm, unless guided by someone familiar with the operation, may present a risk to responders and post a challenge in locating the victim. This project explored the use of a Web-based farm-mapping application optimized for tablets and accessible via easily accessible on-site matrix barcodes, or quick response codes (QR codes), to provide emergency responders with hazard and resource information to agricultural operations. Secured portals were developed for both farmers and responders, allowing both parties to populate and customize farm maps with icons. Data were stored online and linked to QR codes attached to mailbox posts where emergency responders may read them with a mobile device. Mock responses were conducted on dairy farms to test QR code linking efficacy, Web site security, and field usability. Findings from farmer usability tests showed willingness to enter data as well as ease of Web site navigation and data entry even with farmers who had limited computer knowledge. Usability tests with emergency responders showed ease of QR code connectivity to the farm maps and ease of Web site navigation. Further research is needed to improve data security as well as assess the program's applicability to nonfarm environments and integration with existing emergency response systems. The next phases of this project will expand the program for regional and national use, develop QR code-linked, Web-based extrication guidance for farm machinery for victim entrapment rescue, and create QR code-linked online training videos and materials for limited

  6. Some Materials Degradation Issues in the U.S. High-Level Nuclear Waste Repository Study (The Yucca Mountain Project)

    Energy Technology Data Exchange (ETDEWEB)

    F. Hua; P. Pasupathi; N. Brown; K. Mon

    2005-09-19

    The safe disposal of radioactive waste requires that the waste be isolated from the environment until radioactive decay has reduced its toxicity to innocuous levels for plants, animals, and humans. All of the countries currently studying the options for disposing of high-level nuclear waste (HLW) have selected deep geologic formations to be the primary barrier for accomplishing this isolation. In U.S.A., the Nuclear Waste Policy Act of 1982 (as amended in 1987) designated Yucca Mountain in Nevada as the potential site to be characterized for high-level nuclear waste (HLW) disposal. Long-term containment of waste and subsequent slow release of radionuclides into the geosphere will rely on a system of natural and engineered barriers including a robust waste containment design. The waste package design consists of a highly corrosion resistant Ni-based Alloy 22 cylindrical barrier surrounding a Type 316 stainless steel inner structural vessel. The waste package is covered by a mailbox-shaped drip shield composed primarily of Ti Grade 7 with Ti Grade 24 structural support members. The U.S. Yucca Mountain Project has been studying and modeling the degradation issues of the relevant materials for some 20 years. This paper reviews the state-of-the-art understanding of the degradation processes based on the past 20 years studies on Yucca Mountain Project (YMP) materials degradation issues with focus on interaction between the in-drift environmental conditions and long-term materials degradation of waste packages and drip shields within the repository system during the 10,000 years regulatory period. This paper provides an overview of the current understanding of the likely degradation behavior of the waste package and drip shield in the repository after the permanent closure of the facility. The degradation scenario discussed in this paper include aging and phase instability, dry oxidation, general and localized corrosion, stress corrosion cracking and hydrogen induced

  7. Some Materials Degradation Issues in the U.S. High-Level Nuclear Waste Repository Study (The Yucca Mountain Project)

    International Nuclear Information System (INIS)

    Hua, F.; Pasupathi, P.; Brown, N.; Mon, K.

    2005-01-01

    The safe disposal of radioactive waste requires that the waste be isolated from the environment until radioactive decay has reduced its toxicity to innocuous levels for plants, animals, and humans. All of the countries currently studying the options for disposing of high-level nuclear waste (HLW) have selected deep geologic formations to be the primary barrier for accomplishing this isolation. In U.S.A., the Nuclear Waste Policy Act of 1982 (as amended in 1987) designated Yucca Mountain in Nevada as the potential site to be characterized for high-level nuclear waste (HLW) disposal. Long-term containment of waste and subsequent slow release of radionuclides into the geosphere will rely on a system of natural and engineered barriers including a robust waste containment design. The waste package design consists of a highly corrosion resistant Ni-based Alloy 22 cylindrical barrier surrounding a Type 316 stainless steel inner structural vessel. The waste package is covered by a mailbox-shaped drip shield composed primarily of Ti Grade 7 with Ti Grade 24 structural support members. The U.S. Yucca Mountain Project has been studying and modeling the degradation issues of the relevant materials for some 20 years. This paper reviews the state-of-the-art understanding of the degradation processes based on the past 20 years studies on Yucca Mountain Project (YMP) materials degradation issues with focus on interaction between the in-drift environmental conditions and long-term materials degradation of waste packages and drip shields within the repository system during the 10,000 years regulatory period. This paper provides an overview of the current understanding of the likely degradation behavior of the waste package and drip shield in the repository after the permanent closure of the facility. The degradation scenario discussed in this paper include aging and phase instability, dry oxidation, general and localized corrosion, stress corrosion cracking and hydrogen induced

  8. Effective Strategies to Recruit Young Adults Into the TXT2BFiT mHealth Randomized Controlled Trial for Weight Gain Prevention.

    Science.gov (United States)

    Partridge, Stephanie R; Balestracci, Kate; Wong, Annette Ty; Hebden, Lana; McGeechan, Kevin; Denney-Wilson, Elizabeth; Harris, Mark F; Phongsavan, Philayrath; Bauman, Adrian; Allman-Farinelli, Margaret

    2015-06-05

    Younger adults are difficult to engage in preventive health, yet in Australia they are gaining more weight and increasing in waist circumference faster than middle-to-older adults. A further challenge to engaging 18- to 35-year-olds in interventions is the limited reporting of outcomes of recruitment strategies. This paper describes the outcomes of strategies used to recruit young adults to a randomized controlled trial (RCT), healthy lifestyle mHealth program, TXT2BFiT, for prevention of weight gain. The progression from enquiry through eligibility check to randomization into the trial and the costs of recruitment strategies are reported. Factors associated with nonparticipation are explored. Participants were recruited either via letters of invitation from general practitioners (GPs) or via electronic or print advertisements, including Facebook and Google-social media and advertising-university electronic newsletters, printed posters, mailbox drops, and newspapers. Participants recruited from GP invitation letters had an appointment booked with their GP for eligibility screening. Those recruited from other methods were sent an information pack to seek approval to participate from their own GP. The total number and source of enquiries were categorized according to eligibility and subsequent completion of steps to enrolment. Cost data and details of recruitment strategies were recorded. From 1181 enquiries in total from all strategies, 250 (21.17%) participants were randomized. A total of 5311 invitation letters were sent from 12 GP practices-16 participating GPs. A total of 131 patients enquired with 68 participants randomized (68/74 of those eligible, 92%). The other recruitment methods yielded the remaining 182 randomized participants. Enrolment from print media was 26% of enquiries, from electronic media was 20%, and from other methods was 3%. Across all strategies the average cost of recruitment was Australian Dollar (AUD) $139 per person. The least expensive

  9. Strengthening IAEA Safeguards for Research Reactors

    Energy Technology Data Exchange (ETDEWEB)

    Reid, Bruce D. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Anzelon, George A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Budlong-Sylvester, Kory [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-09-01

    broaden the IAEA safeguards toolbox, the study recommends that the Agency consider closing potential gaps in safeguards coverage by, among other things: 1) adapting its safeguards measures based on a case-by-case assessment; 2) using more frequent and expanded/enhanced mailbox declarations (ideally with remote transmission of the data to IAEA Headquarters in Vienna) coupled with short-notice or unannounced inspections; 3) putting more emphasis on the collection and analysis of environmental samples at hot cells and waste storage tanks; 4) taking Safeguards by Design into account for the construction of new research reactors and best practices for existing research reactors; 5) utilizing fully all legal authorities to enhance inspection access (including a strengthened and continuing DIV process); and 6) utilizing new approaches to improve auditing activities, verify reactor operating data history, and track/monitor the movement and storage of spent fuel.

  10. Effective Strategies to Recruit Young Adults Into the TXT2BFiT mHealth Randomized Controlled Trial for Weight Gain Prevention

    Science.gov (United States)

    Balestracci, Kate; Wong, Annette TY; Hebden, Lana; McGeechan, Kevin; Denney-Wilson, Elizabeth; Harris, Mark F; Phongsavan, Philayrath; Bauman, Adrian; Allman-Farinelli, Margaret

    2015-01-01

    Background Younger adults are difficult to engage in preventive health, yet in Australia they are gaining more weight and increasing in waist circumference faster than middle-to-older adults. A further challenge to engaging 18- to 35-year-olds in interventions is the limited reporting of outcomes of recruitment strategies. Objective This paper describes the outcomes of strategies used to recruit young adults to a randomized controlled trial (RCT), healthy lifestyle mHealth program, TXT2BFiT, for prevention of weight gain. The progression from enquiry through eligibility check to randomization into the trial and the costs of recruitment strategies are reported. Factors associated with nonparticipation are explored. Methods Participants were recruited either via letters of invitation from general practitioners (GPs) or via electronic or print advertisements, including Facebook and Google—social media and advertising—university electronic newsletters, printed posters, mailbox drops, and newspapers. Participants recruited from GP invitation letters had an appointment booked with their GP for eligibility screening. Those recruited from other methods were sent an information pack to seek approval to participate from their own GP. The total number and source of enquiries were categorized according to eligibility and subsequent completion of steps to enrolment. Cost data and details of recruitment strategies were recorded. Results From 1181 enquiries in total from all strategies, 250 (21.17%) participants were randomized. A total of 5311 invitation letters were sent from 12 GP practices—16 participating GPs. A total of 131 patients enquired with 68 participants randomized (68/74 of those eligible, 92%). The other recruitment methods yielded the remaining 182 randomized participants. Enrolment from print media was 26% of enquiries, from electronic media was 20%, and from other methods was 3%. Across all strategies the average cost of recruitment was Australian Dollar

  11. Division of Information Technology - Overview

    International Nuclear Information System (INIS)

    Szlachciak, J.

    2010-01-01

    Physics and Technology and Accelerator Physics and Technology are located. The network speed was upgraded to gigabit Ethernet in this LAN segment. The second achievement was the inclusion of the originally independent network of the ZdAJ Production Unit in the global LAN infrastructure in Swierk. Together with this task we migrated all ZdAJ users to the main computer domain. The migration included moving of their mailboxes located on external servers. In order to improve security and management of our desktop computers we implemented the following software: · Microsoft Windows Server Update Services for automatic distribution of updates and upgrades for Microsoft products; · ESET Nod32 business edition for protection against viruses: this software replaced Symantec antivirus products used in the past; · GFI MailSecurity for e-mail protection against viruses. Implemented at the end of 2006. the Scientific Activity Database continued its operation and was extended by several useful reports and fields containing important information. One of the main extensions was a development of the subsystem for financial bonuses for scientists by implementation of a scientific publication score system based on rating introduced by the Ministry of Science and Higher Education. (author)

  12. [Book review] The Eastern Screech Owl: Life History, Ecology and Behavior in the Suburbs and Countryside, by Frederick Gehlback

    Science.gov (United States)

    Hahn, D.C.

    1995-01-01

    Review of: Eastern Screech Owl: Life History, Ecology, and Behavior in the Suburbs and Countryside. Frederick R. Gehlbach. Issue 16; Issue 2008 of W. L. Moody Jr. Natural History Series. Texas A&M University Press; 1st edition (November 1994). ISBN: 0890966095. For ornithologists and ecologists alike, Fred Gehlbach's book promises to hold both interest and information value as a comprehensive study of the eastern screech owl (Otus asio hasbroucki). Gehlbach was intrigued with screech owls as a boy and encouraged as an undergraduate by William Hamilton, who underscored that in-depth studies of familiar backyard species can be as fascinating as those in exotic sites. Correspondence with another owl-aficionado, the late H. N. Southern, inspired the author's long-term study of screech owls in a woodland landscape in central Texas and led him to provide nest boxes to enhance his access and sample size. This book is based on observations over a 25-year period-beginning in 1967, with intensive study during an 11-year period (1976-1987) in Texas south of Waco, where Gehlbach teaches at Baylor University. The study represents observations on 659 screech owls, covering several generations of birds and entire lives of many individuals. Gehlbach compares screech owl nesting behavior in a rural versus suburban setting and includes chapters on food supplies and predation tactics; egg-laying, incubation, and parental behavior; vocalizations; and population structure and flux. He discusses why screech owls are widespread across the eastern half of North America and why they succeed among people in suburban environments, where they adapt as easily to mailboxes and porch columns as to natural tree cavities. The book mixes two approaches: on the one hand the dense style of a technical book in which the professional biologist can find information on many aspects of screech owl behavior, life history, and population, including tables, figures, summary statistics, results of statistical

  13. Security engineering: Phisical security measures for high-risk personnel

    Directory of Open Access Journals (Sweden)

    Jelena S. Cice

    2013-06-01

    : Security Lighting: Provide security lighting around the residential exterior, G-5R: Unobstructed Space, G-6R: Access Control Point, G-7R: Visitor Parking, E-8R: Exterior Door Locks, E-9R: Windows, E-10R: Under-building Access Control, E-11R: Roof Access, E-12R: Residential Mailbox Guidelines, E-13R: Trash Receptacles, I-9R: Fire Protection System, I-10R: Intrusion Detection System (IDS.   Conclusion The challenge is twofold. The first challenge is to reach an agreement that something needs to be done. This involves altering mindsets, building consensus and getting senior management support. The second challenge is in developing and implementing an effective and tailor-made integrated physical security plan. This plan consists of three mutually supporting elements – physical security measures, operational procedures and policies. Physical security covers all the devices, technologies and specialist materials for perimeter, external and internal protection. This covers everything from sensors and closed-circuit television to barriers, lighting and access controls for HRP offices and residences. The following crucial elements must be taken into account – deterrence, detection, delay and response and then recovery and re-assessment. All are mitigation measures. These are the foundations on which any integrated physical security plan must be built.