Audiology Grand Rounds-Quinn TranRead more >
The fatty acid composition of a fat or oil is most commonly assessed by gas chromatography, following conversion of the fatty acids methyl esters. The current most refined analytical methods for the quantitation of trans fatty acids rely on the separations provided by long cyanopropyl siloxane capillary columns. The introduction of capillary columns coated with ionic liquids, such as Supelco SLB-IL111, provide an alternative separation tool characterized by a higher stationary phase polarity and selectivity toward geometric and positional isomers of unsaturated fatty acids. The use of these novel capillary columns can provide more refined separations of complex lipid samples. As a result, most conjugated linoleic acid isomers (including t7,c9- and c9,t11-18:1 FA) can be quantitated in a single separation using a 100 m SLB-IL111 capillary column and most 18:1 FA positional and geometric isomers can be separated using a 200 m SLB-IL111. Ionic liquid columns provide more detailed FA profiles, especially for unsaturated fatty acid positional/geometric isomers.Read more >
Spireon, an IoT company, needed a BI platform that could turn over 3 billion records of data, with a projected growth rate of 3x per year, into operational insights both for their internal teams as well as their customers.
Watch this webinar and learn:
How Spireon used Birst to transform semi-structured data into analytic format
Best practices in approaching analytics for data volumes with exponential growth
How analytics is used internally by product and customer success teams
How Spireon has disrupted the IoT market by creating a data product
Even behind the firewall, hackers can access your data through network printers - find out why and what to do.Read more >
History teaches us that when things go seriously wrong in the legal and financial world the effects can take Nations to the edge of the abyss and spell personal and economic disaster for citizens and organisations not protected. The scandals of sub-prime mortgages, Libor and Payment Protection Insurance (PPI) provide a sobering reminder of what happens when professionals don’t follow the rules. This presentation exposes a risk that is often unseen – translation.
In his presentation, David will:
• Discuss the factors that contributed to recent financial scandals;
• Ask why scandals such as PPI went undetected for so long despite being identified a decade earlier.
• Highlight the nature of threat society faces from financial crime; and the new tougher enforcement approach being adopted by regulators.
He will then shed light on a major compliance risk that has had little or no coverage to date: The use of translation and interpreting to facilitate fraud and money laundering and misinform customers of their rights and obligations.
He will consider the potential scale of the problem and outline weaknesses in current practices in the professional services sector that poses a significant risk.
David advocates ‘drawing a line in the sand’ and offers 5 steps to help regulated professionals to defuse the multilingual time bomb before it explodes into another major scandal.
Recent studies have shown that at least 20% of the animal cell cultures currently in use in the US are contaminated by either microorganisms or other cell lines. This three part live, on-line seminar series will review the scope of this major problem and examine some of its causes and techniques for avoiding it. It will also explore some key, easy to employ strategies for preventing these losses by careful culture management.
This webinar will discuss good aseptic technique: developing a practical approach to aseptic technique; reducing day-to-day contamination problems in the lab; and helpful hints for avoiding contamination.
Defending against today’s sophisticated attacks requires a shift in security investments from prevention to a balanced mix of prevention, detection, and response. The challenge is how to make this shift given limited resources and expertise.
The RSA Advanced Cyber Defense Practice can help by improving your breach readiness, response and resiliency with a three-prong approach: optimize the use of preventive controls, reduce attacker free time, and reduce the time it takes to execute an appropriate response.
Join this webcast and learn how to:
•Enhance your security posture
•Prepare for and respond to security incidents, and evolve in line with the threat environment
•Develop strategies and tactics for building and improving your security operations programs, including designing and optimizing a security operations center (SOC)
•Layer in advanced capabilities, such as intelligence and analytics, to develop a more agile and proactive security monitoring function
Unify your security strategy, operations and technology implementations, and produce an actionable security improvement plan with the help of the RSA Advanced Cyber Defense Practice. Learn more at this important webcast.
You will learn about the latest new technical features and benefits of the just released Nexus 1010-X v1.4.Read more >
Please join us on Thursday, December 3, 2015, from 1:00 to 2:00 pm Central as we present the free EDRM webinar, “Practical Options for US Litigators and Investigators Dealing with EU Data,” sponsored by EDT.
Since early October when the Court of Justice of the European Union deemed the Safe Harbor regime for European data transfers to the US to be invalid, many organizations have struggled to evolve their information management strategies to accommodate the changing international data privacy landscape.
While there are concerted diplomatic efforts underway to establish a robust new trans-Atlantic data transfer framework, the negotiations, are intrinsically linked to personal privacy and national security perspectives so resolution and clarity may take some time. Many litigators and investigators are, in the meantime, reeling in murky waters of uncertainty.
How effective are the alternative data transfer mechanisms? What are their limitations and how can these be addressed? Are there any new options available? Are different strategies needed for investigations as compared with discovery for litigation?
Join our EDRM webinar at 1pm on 3rd December 2015 to hear our international panel canvas key considerations and practical options for trans-Atlantic litigation and investigations in light of these recent developments.
Blending of imported and domestic coal is becoming more important. Until recently, coal blending in power stations was adopted mainly to reduce the cost of generation and increase the use of indigenous or more readily available coal. Low-grade (high ash) coal can be mixed with higher grade (imported) coal without deterioration in thermal performance of the boiler, thus reducing the cost of generation. As coal markets change, new reasons for coal blending are becoming apparent. As indigenous coals become less available, of lower quality or more expensive to mine in some regions, blending of imported coals becomes necessary. It can be challenging to ensure that the resulting blend will maintain plant output without damaging the boiler.
In some cases coal blending is used as a form of pollution control, such as the combination of inexpensive high sulphur coals with more costly low sulphur coals to ensure compliance with sulphur emission limits. It is even possible to blend different coal types to maximise mercury emission reduction.
Many methods of coal blending are used. Coals can be blended at the coal mine, at the preparation plant, trans-shipment point, or at the power station. The method selected depends upon the site conditions, the level of blending required, the quantity to be stored and blended, the accuracy required, and the end use of the blended coal. Normally in large power stations handling very large quantities of coal, the stacking method with a fully mechanised system is followed.
In this webinar Lesley discusses the different reasons and priorities for coal blending. She summarises the methods of coal blending, from coal characterisation though to mixing and storage methods, including some case studies of challenging situations.