Thankfully, mowing down pedestrians in a crosswalk is not yet commonplace. But it is also not rare. This incident scenario is most common to transit buses making left turns (see "The Danger Deterrent," NATIONAL BUS TRADER, April 2016) But it happens occasionally with almost every transportation mode. Yet the defenses almost always cited by the drivers are no match for someone with a high school diploma.
NFPA 921 advises the use of a systematic approach to fire investigation that is best embodied by the scientific method. The scientific method includes the steps of collecting data, analyzing that data, developing a hypothesis, and then testing that hypothesis. The final step of this process, testing the hypothesis, can be done either physically or analytically. In some cases, a physical test may be conducted to confirm or falsify some aspect of the hypothesis. However, in many cases creating a physical test may be difficult or even practically impossible. It is these cases, and others, where analytic testing using computer simulations may be helpful to the fire investigator.
For the first time, end-of-life issues and the impact of the loss on the insured is the topic. Most of my writings concern insurance in one form or another. I have discussed the many types of insurance, what to look for in each policy, what coverages are available. I've written about what to expect from an insurance company, an agent, or a broker.
Imagine this scenario: Early stage company Smallco develops an exciting new technology, which it uses to create the prototype of its first product - Brakethroo! A large company in the same field, Bigco, becomes aware of Brakethroo, and realizes that if the product works as hoped, it could be a valuable addition to Bigco's product range. Bigco offers to buy the technology and product from the shareholders of Smallco. The merger and acquisition (M&A) agreement specifies an up-front payment, and one or more payments dependent on achievement of milestones. Bigco agrees to use "commercially reasonable efforts" to achieve the milestones. Smallco and Bigco sign the agreement, the shareholders of Smallco get an immediate payout and look forward to further milestone payments.
The Title of this publication as "Drug Injury", allows a wide range of sub-topics and an almost endless level of health related information. Thus, the inclusion of this Chapter is a de facto statement that Marijuana/Cannabinoids are an integral part of our Drug Lexicon. Historically, the Medical/Drug aspect of Marijuana is well documented in the On-Line entity at ProCon.org as recently as 08/13/2013. And, lest the reader retain some skepticism as to the Drug categorization of Marijuana/Cannabinoids, our U.S. Government was issued a Patent # 6630507 in Oct. 2003 for Marinol. This synthetic Cannabinoid Drug had a recommendation as "cannabinoids as antioxidants and neuroprotectants". This Patent stands not withstanding the statement of "no medical use" for Marijuana in the 1970 placement as a Schedule 1 substance in the Controlled Substance Act. And, even more incredulous, given the 1937 Marijuana Stamp Act that established Marijuana as an Illegal Substance.
The final installment of this series examines the socio-economic dynamics and choices which led to the increasing commission of safety compromises by America’s public transportation services.
Since the electricity bill of a data center constitutes a significant portion of its overall operational costs, reducing this has become important. We investigate cost reduction opportunities that arise by the use of uninterrupted power supply (UPS) units as energy storage devices. This represents a deviation from the usual use of these devices as mere transitional fail-over mechanisms between utility and captive sources such as diesel generators. We consider the problem of opportunistically using these devices to reduce the time average electric utility bill in a data center. Using the technique of Lyapunov optimization, we develop an online control algorithm that can optimally exploit these devices to minimize the time average cost. This algorithm operates without any knowledge of the statistics of the workload or electricity cost processes, making it attractive in the presence of workload and pricing uncertainties. An interesting feature of our algorithm is that its deviation from optimality reduces as the storage capacity is increased. Our work opens up a new area in data center power management.
Older American adults are at an increased risk of becoming a victim of financial fraud or exploitation and criminals don't want you to know it. An estimated $36 billion is lost to these con artists each year. They gain the trust of our loved ones and use it against them in ways that leave victims emotionally and financially devastated.
According to the OSHA regulations, a confined space is anyplace that meets the following criteria: (1) Is large enough and so configured that an employee can bodily enter and perform assigned work; and (2) Has limited or restricted means for entry or exit; and (3) Is not designed for continuous employee occupancy.
Emerging energy-aware initiatives (such as billing of power usage based on de-coupling between electricity sales and utility profits/fixed-cost recovery) render current capacity planning practices based on heavy over-provisioning of power infrastructure unprofitable for data centers. We explore a combination of statistical multiplexing techniques (including controlled under-provisioning and overbooking) to improve the utilization of the power hierarchy in a data center. Our techniques are built upon a measurement-driven profiling and prediction technique to characterize key statistical properties of the power needs of hosted workloads and their aggregates. As a representative result from our evaluation on a prototype data center, by accurately identifying the worst-case needs of hosted workloads, our technique is able to safely operate 2.5 times as many servers running copies of the e-commerce benchmark TPC-W as allowed by the prevalent practice of using face-plate ratings. Exploiting statistical multiplexing among the power usage of these servers along with controlled under-provisioning by 10% based on tails of power profiles offers a further gain of 100% over face-plate provisioning. Reactive techniques implemented in the Xen VMM running on our servers dynamically modulate CPU DVFS-states to ensure power draw below safe limits despite aggressive provisioning. Finally, information captured in our profiles also provides ways of controlling application performance degradation despite the above under-provisioning: the 95th percentile of TPC-W session response time only grew from 1.59 sec to 1.78 sec.