If you are the CEO or General Counsel of your company, you should be preparing for a new challenge. The gaining momentum of the #metoo movement means there will likely be an increase in sexual harassment complaints. Raghu and Suriani certainly think it's already happening (#METOOWHATNEXT: Strengthening workplace sexual harassment protection and accountability, nwlc.org, 2017.), and our clients are certainly calling us more often to investigate claims. To better prepare, here are some suggestions we urge you to consider.
The trend of using smaller operative corridors is seen in various surgical specialties. Neurosurgery has also recently embraced minimal access spine technique, and it has rapidly evolved over the past 2 decades. There has been a progression from needle access, small incisions with adaptation of the microscope, and automated percutaneous procedures to endoscopically and laparoscopically assisted procedures. More recently, new muscle-sparing technology has come into use with tubular access. This has now been adapted to the percutaneous placement of spinal instrumentation, including intervertebral spacers, rods, pedicle screws, facet screws, nucleus replacement devices, and artificial discs. New technologies involving hybrid procedures for the treatment of complex spine trauma are now on the horizon. Surgical corridors have been developed utilizing the interspinous space for X-STOP placement to treat lumbar stenosis in a minimally invasive fashion. The direct lateral retroperitoneal corridor has allowed for minimally invasive access to the anterior spine.
Major innovations in cellular technologies arise largely from the substantial Research and Development (R&D) investments and inventions of relatively few companies, followed by widespread collaborations including many more in the process of standard setting.
In 2002, a violent explosion from inside the basement of a ten-story building in New York City hospitalized 31 people (four critically) and caused extensive damages to the masonry structure. The blast dislodged portions of the basement ceiling and inside walls, collapsed the concrete stairwells and portions of the elevator shaft, and shattered glass windows five stories above ground
Companies invest considerable time, effort and money when selecting and implementing a major mission critical computer system. Successfully completing the process can be complicated and frustrating; as a result, it doesn't take a lot for implementations to fail. The problem is that the business organization that undertook the implementation in the first place is stuck - stuck with the time, money and the inconvenience of not having the system they purchased. The company has not only left without the new system, they are back to using the systems that they originally thought so inadequate that they committed to spending the time and money for a new system.
A powerful adjunct to post-trauma psychotherapy is body-oriented therapies and methods. Yoga, massage therapy, and Pilates are powerful tools that should be considered and included in the comprehensive treatment plan. In my work with auto accident trauma survivors I daily see the value of combining massage therapy and methods such as Pilates with the verbal working through of trauma in psychotherapy. I believe auto insurance carriers would earn big returns on their investments by paying for personal trainers to work with survivors in regular Pilates sessions which somatically supports the psycho-therapeutic work. When combined with regular massage therapy, the synergy of the combined approaches is the perfect combination for many people attempting to gain improved emotional regulation, physical health, and mobility.
The Reg A Conference is the largest gathering of deal-makers and investors interested in Regulation A, a prime opportunity for companies to network with like-minded business executives, as well as financial professionals who assist in bringing capital to companies (https://theregaconference.com/presenting-companies/). Many such companies are today basing their new business ventures and projects, and their search and submissions for funding, on blockchain technology applications. So-called cryptocurrencies such as bitcoin are just one example of the use of this functionality. The business implications of this secure online record-keeping tech are huge – and not only in cryptocurrency. This presentation provides a probing and extensive expert critique of blockchain, its cryptocurrency, distributed ledger and smart contract applications, and argues for a cautionary, savvy approach to implementing and investing in such business systems, on grounds of professional due diligence, rigorous corporate governance and wide experience of past leading-edge ICT systems failures.
When thinking about the safe operation of boilers (and don't we all?), several systems can readily be named; flame control, fuel/air ratio; steam pressure control, levels in the vessel, etc. What about the water? It seems so passive, as long as there is enough for level control, what's the big deal? Well, it turns out, that as the steam produced by a boiler is used in the process, the condensate from that steam is returned to the boiler as feedwater. However, since 100% of the condensate is not returned, whatever solids had been in that water before it evaporated to form steam are left in the remaining water. Fresh feedwater is added to maintain levels, but even fresh water contains some dissolved solids. So over time, the water in the boiler system gets saturated with all sorts of dissolved minerals.
Cloud-based hosting promises cost advantages over conventional in-house (on-premise) application deployment. One important question when considering a move to the cloud is whether it makes sense for 'my' application to migrate to the cloud. This question is challenging to answer due to following reasons. Although many potential benefits of migrating to the cloud can be enumerated, some benefits may not apply to 'my' application. Also, there can be multiple ways in which an application might make use of the facilities offered by cloud providers. Answering these questions requires an in-depth understanding of the cost implications of all the possible choices specific to 'my' circumstances. In this study we identify an initial set of key factors affecting the costs of a deployement choice. Using benchmarks representing two different applications (TPC-W and TPC-E) we investigate the evolution of costs for different deployment choices. We show that application characteristics such as workload intensity, growth rate, storage capacity and software licensing costs produce complex combined effect on overall costs. We also discuss issues regarding workload variance and horizontal partitioning.
We're currently working with a speciality harvesting equipment appraisal in the Salinas area that's compiling an asset list for the upcoming equipment inspection. Several conversations and email exchanges regarding how to compile an effective equipment list – in conjunction with some recent interesting inspection experiences – have freshly reminded me of how important a good asset list is to an efficient equipment appraisal, and certainly to asset inspection.