Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Insecurity

NOVEL EXPRESS METHODS FOR OUTDOOR RAPID DETECTION OF TOXIC IMPURITIES IN ENVIRONMENT AND SOCIALLY INSECURE PHARMACOLOGICAL SUBSTANCES... [Pg.374]

Attempt to load packages without loading plan to ensure segregation of incompatibles Leave cargo in an insecure CTU Exceed the maximum gross mass of the CTU... [Pg.479]

Besides operational energy use, corporate decisions have an impact throughout society. One reason that per capita energy consumption in North America is much higher than in the rest of the world was the decision of corporate leaders to expand and relocate away from city centers and to major beltway loops in the suburbs. This necessitated more trucking and a workforce reliant on the private automobile instead of mass transit. In an era of tremendous job insecurity, even the most energy-conserving person... [Pg.133]

In spite of the insecure basis which the orbital model possesses, it has proved fruitful in the field of atomic chemistry and physics. Firstly the use of electronic configurations serve as a basis for the classification of the lines shown by atomic spectra (Condon and Shortley [1935], Slater [1949]). [Pg.27]

Patronizing behaviour - even if a mentor has had more experience and acquired more knowledge than a mentee, there is no need to be patronizing or condescending. This will only serve to reinforce any potential insecurities that mentees might harbour, rather than help them build their self-confidence. In extreme cases, such behaviour might even lead to the premature break up of the relationship. [Pg.273]

One important reason for the emergence of Paracelsian alchemical illustration may have been its function as a psychological compensation for the rejection of Catholic imagery by the Protestants and the resulting spiritual and emotional insecurity experienced by many of the faithful. It is not merely coincidental that Paracelsian iconography should appear in Protestant areas where traditional Catholic icons had been destroyed. (The development of a specihcally Catholic interest in alchemy, however, was a phenomenon of the mid-seventeenth century developed in the work of Athanasius Kircher and other Jesuits.) ... [Pg.2]

Although Carothers was transparent and innocently open about his insecurities and mental health, many of his young colleagues stood in awe of him. Thus, when Carothers showed Julian Hill his capsule of cyanide, Hill interpreted it as bravado. More ominously, Carothers could list the famous scientists who had committed suicide. [Pg.130]

Eroding controls in the former Soviet Union. Insecure and oversized nuclear weapons and materials stockpiles in the former Soviet Union, with little transparency in their management, coupled with an oversized and underfunded nuclear complex, pose severe threats to U.S. and international security. The possibility that the essential ingredients of nuclear weapons could fall into the hands of terrorists and proliferating states is all too real, and immediate actions are needed to reduce this threat to the security of America and the world.. . . ... [Pg.96]

The crucial investigative questions for Wilkinson are as follows. How hierarchical is the social hierarchy What are the depths of material insecurity and social exclusion tolerated by society What are the direct and indirect psychosocial effects of social stratification ... [Pg.70]

His name was Maurice Dollfus. He was chairman of the board of the Ford Motor Company s French subsidiary. Indeed, he had good reason to be the first Frenchman in Berlin after France fell. Under his control the Ford enterprises of France had never been a financial success. They had declared only one dividend in then-history. There was only one way he could strengthen his insecure position and put the company back on its feet. [Pg.254]

Where there is hope for everybody is in getting together. But it s very difficult for people who are chemically sensitive to get together. Shyness, insecurity, not being able to communicate—I see it in so many chemically sensitive people. At one point I took classes in modeling and acting to try to develop my self-confidence because, although I didn t realize the cause at the time, my reactions to chemicals had made me a very shy and withdrawn kind of person. [Pg.226]

Those of us who do get out and get heard often make people angry. We re called crazy, and we might look crazy. Some of us are insecure and apologize a lot, or have antisocial behavior from chemical reactions or from the withdrawal from exposures. [Pg.227]

To hide his insecurity, Barton often acted like a so that he... [Pg.73]

The target aims to breach through the field from the starting point that represents the insecure side to the destination point that represents the secure side from the SWN viewpoint. The horizontal and vertical... [Pg.97]

Consequences of environmental stress poverty, food insecurity, poor health conditions, displacement (migration or refugee movements) and disruption of the social and political institutions are regarded as the most important consequences from environmental stress, which then contribute to conflict under a certain set of unfavorable factors. [Pg.173]

Our deepest fear is not that we are inadequate. Our deepest fear is that we are powerful beyond measure. It is our light, not our darkness, that most frightens us. We ask ourselves Who am 1 to be brilliant, gorgeous, talented, fabulous Actually, who are you not to be You are a child of God. Your playing small doesn t serve the world. There s nothing enlightened about shrinking so that other people won t feel insecure around you. [Pg.245]

In addition to the control system vulnerabilities mentioned earlier, several factors have contributed to the escalation of risk to control systems, including (1) the adoption of standardized technologies with known vulnerabilities, (2) the connectivity of control systems to other networks, (3) constraints on the implementation of existing security technologies and practices, (4) insecure remote connections, and (5) the widespread availability of technical information about control systems. [Pg.124]

Potential vulnerabilities in control systems are exacerbated by insecure connections. Organizations often leave access links—such as dial-up modems to equipment and control information—open for remote diagnostics, maintenance, and examination of system status. Such links may not be protected with authentication or encryption, which increases the risk that hackers could use these insecure connections to break into remotely controlled systems. Also, control systems often use wireless communications systems, which are especially vulnerable to attack, or leased lines that pass through commercial telecommunications facilities. Without encryption to protect data as it flows through these insecure connections or authentication mechanisms to limit access, there is limited protection for the integrity of the information being transmitted. [Pg.125]


See other pages where Insecurity is mentioned: [Pg.255]    [Pg.190]    [Pg.468]    [Pg.468]    [Pg.533]    [Pg.801]    [Pg.251]    [Pg.33]    [Pg.65]    [Pg.67]    [Pg.42]    [Pg.44]    [Pg.50]    [Pg.10]    [Pg.70]    [Pg.294]    [Pg.216]    [Pg.98]    [Pg.20]    [Pg.174]    [Pg.14]    [Pg.456]    [Pg.151]    [Pg.103]    [Pg.117]    [Pg.123]    [Pg.148]    [Pg.99]    [Pg.12]    [Pg.16]    [Pg.16]    [Pg.129]   
See also in sourсe #XX -- [ Pg.101 ]

See also in sourсe #XX -- [ Pg.183 , Pg.199 , Pg.202 , Pg.203 , Pg.206 ]




SEARCH



Insecure connections

Job insecurity

Market insecurity

© 2024 chempedia.info