1948 years ago in AD 63 an earthquake in southern Italy by the gulf of Naples seriously damaged the ancient city of Pompeii causing an undetermined number of deaths and spread out destruction, but the locals went to work rebuilding in the same spot until they were buried by the eruption of the Vesuvius volcano 16 years later in AD 79.
Galveston TX Hurricanes
Average Brushed or hit every 2.94 years Average Direct hit every 8.63 years
The Great Storm of 1900 - Sep 8th 1900 - Pop: 42,000 residents Category 4 @ 135 mph -Great loss of life between 6,000 and 12,000 individuals – officially 8,000
The 1915 Storm, August 17th, Category 4 @ 135 mph 42 people dead in the Galveston area
$60 - 1915 million dollars in damage
Ike Sep 13th 2008 - The third most destructive hurricane to ever make landfall in the United States Final landfall in Galveston Texas as a strong cat 2 with cat 5 equivalent storm surge winds extended 120 miles from the center.
Blamed for at least 195 deaths – 74 in Haiti and 112 in the USA 300 still missing. - Damages estimated at 24 billion (2008) US Dollars
Resulted in the largest evacuation in the state of Texas history and the largest search and rescue operation in US history
Chernobyl, An Experiment Gone Wrong
On Saturday, April 26th, 1986 at 1:23 am, one of the reactors at the Chernobyl nuclear power plant exploded. Ironically, the experiment consisted in testing how the power plant would respond in the event of an accident. The operators at the plant wanted to bring down the power output of the reactor to 25%, but over-confidence, poor training and poor knowledge of how a reactor works caused them to overdo it, and they ended up bringing down the power output to 1%. When they then tried to bring it up to 25%, the reactor overheated and exploded causing the worst nuclear accident in history.
Human Concerns: Workplace Violence Is Real
Merely having a workplace violence prevention policy does not do enough to address the need. Proactive prevention strategies must include new employee orientations and continuing education at all levels of the organization. Such proactive measures must not sugar coat the realities by pretending there are no problems, avoiding to address past incidents and how they were resolved as valued-added prevention training, identification of risk factors, recognition of hazards, reporting and proper assessment of at risk situations. Training though helpful must not be the end to the means, it must be supported by a range of programs including ongoing physical security and personnel assessments, conduct accountability, leadership responsibilities and consequences.
Human Concerns: I have a dream!
Human Concerns: El Internet, un Mar Peligroso de Navegar
Human Concerns: California Wildfires
Thousands ordered to evacuate
Human Concerns: 40 Million Credit & Debit Card Numbers Stolen
Human Concerns: The Smart-Phone Attitude
Human Concerns: Coming to your Neighborhood?
A Ban on Multi-tasking while Walking?
Human Concerns: Prepare for the Next Flood
Human Concerns: Contributing Factors of Workplace Violence
By Felix Nater
Human Concerns: Enhance Your PC Security Thinking About Securing Your Home Computer?
Things you ought to know to prevent your computer from being hijacked or become a target for intruders.
Intruders are after your personal information, your computer's resources, meaning your harddisk (containing your stored personal information), your fast processor and your internet connection. They use these resources to access and attack other computers on the Internet.
Home computers are typically not very secured, have vulnerabilities and are easy to break into to gain access to these resources.
Home computer owners do not realize how exposed their data is, if they do not exercise due care to protect their computer or block an attack.
By being aware and taking some preventive measures you can minimize your exposure and improve the security of your home computer.
The issues and vulnerabilities are the same regardless of the operating system you utilize to run your computer and will remain so as new versions are released.
You need to know that all types of communications and information sent across the Internet or exchanged between computers (email, messaging, voice etc) is not concealed or hidden in any way. Information may be exposed or at risk of others listening in or capturing data patterns that may provide valuable information to access your computer. Once inside they may try to steal your information, use it to harm your computer or gain access to other computers.
Viruses, worms, trojan horses and other malware can reach your computer in many ways, through email, web sites, memory sticks, CD-ROMs and downloaded files. They all need to be checked for viruses every time you use them.
Securing your home computer is not a trivial task. There are many aspects to consider and many steps to follow.
Here are some suggestions you may want to implement:
Human Concerns: Home Computer Security
Home Computer Security - Firewalls
What are some of the issues with security and protection of your personal data.