A core aspect of hygiene in any healthcare setting is the aspect pertaining to environmental cleaning. A proper environmental cleaning program should consist of a plan in which the healthcare unit ensures that the possibility of risk of infection is minimized. Prevention of infection is the main purpose of environmental cleaning. This is because hospitals are a very likely source of infections, given that people with almost all kinds of contagious diseases visit or stay in them. Since hospitals
All Posts (5984)
I have completed a two-year study of a trading system, in which 578 trades were executed. 91.6% of these were profitable, resulting in an average annual return of 35%.
The system I used is that of relative correlation, which refers to the attributes of price movement and signals. These attributes, when all found together, create a powerful system for signal and confirmation.
This is based on the use of candlestick signals and other technical signals (including gaps, triangles, and wedges, f
I was reading an article by Ross Gittins in the Sydney Morning Herald the other day. He was discussing how the media is driving us to believe the world is in much worse shape than it actually is. As he explained, we are programmed to check for threats to our well-being and hence the news we are most drawn to is the bad news. Consequently, the media has found the easiest way to keep their distribution and website statistics up is to feed us plenty of bad news stories. Hence the “fear factor” heav
The King of Atlantis! The Protector of the Seas and Oceans! A beloved member of the Justice League! It’s none other than Aquaman! While he is most well-known for his ability to control marine animals and breathing underwater, he is also the superhero who poses the biggest threat to you online, according to Intel Security’s list of Most Toxic Superheroes.
Superhero movies and television shows are booming like never before. They have been resurrected and reinvented with the new and improved costume
Enrique Suarez Presenting:
WikiLeaks Email Release Reveals Hacking by Governments Worldwide
WikiLeaks last week published more than one million emails from the Italian surveillance malware vendor Hacking Team, shedding further light on the extent of the spying being conducted by governments around the world against their populations.
Emails in the searchable database disclose the company’s negotiations with intelligence and polic
ERM Software in Action
As discussed in part 1 of this blog series, many businesses do not formally recognize their critical risk networks. Without proper acknowledgment, fundamental risks remain essentially invisible. That being said, it’s vital to create conditions that enable a useful risk management network to be formed and used across the enterprise. So, how does this “right” network of problem solvers form?
Relatively routine problems can be solved by rapidly created, temporary teams that are
I have completed a two-year study of a trading system, in which 578 trades were executed. 91.6% of these were profitable, resulting in an average annual return of 35%.
The system I used is that of relative correlation, which refers to the attributes of price movement and signals. These attributes, when all found together, create a powerful system for signal and confirmation.
This is based on the use of candlestick signals and other technical signals (including gaps, triangles, and wedges, for exam
Benefits of the covered call include generation of income without added market risk. The comparison between the covered call and simply owning shares of stock demonstrates that added covered call income discounts the basis in stock, thus reducing market risk.
There are two criticisms of the covered call. First, if the underlying price declines below the discounted basis in stock (stock reduced by option premium), the overall position loses. However, if you own shares prior to opening the covered
In next couple of years there will be sweeping changes to existing Basel III Accord what will pave way for a new game changing regime called Basel 4. In obvious intent, the new Accord will raise risk-based capital ratio, revise risk weighting and move away from too much emphasis on model-based approach. One of key measures will be leverage Ratio.
It will stay ahead of 3% ratio as a front-stop measure. Another key measure will be balancing risk sensitivity with simplicity in the new regime. The Ba
When someone online presents as a different person than their true self, this is called catphishing, and it occurs on online dating sites.
- Google the name of the object of your interest. Obviously, “Kelly Smith” and “John Miller” won’t get you far, but “Jaycina McArthur” just might. What comes up?
- See if they have social media accounts, as these suggest they’re a real person. But the absence doesn’t prove they’re a phony, either. Not every legitimate person is into the social media thing.
Here are
Talk about getting taken to the cleaners: Imagine you spot a great summer rental property advertised online. Looks wonderful. The deal sounds too good to be true, but the owner tells you (via e-mail or even phone) that the fee is correct. You apply for the rent and send in the required upfront payment.
Then you head down there for the first time to see an empty lot. It then dawns on you that the owner was really a crook who used some photo he found online and advertised it for rent. And if losing
Risks are known far in advance by at least one employee – and typically by several – on the front lines of every business. However, problems arise when managers lack mechanisms to escalate and connect their risks with the concerns shared by colleagues in other parts of the organization.
When critical business interdependencies are not formally recognized, they remain invisible, and the cumulative impact of these concerns is rarely addressed. Without the ability to identify connections between ris
According to a recent report from Pew Research, many Americans take privacy seriously—as in the cyber kind, but also offline.
- 9% of survey respondents thought they had strong control over how much of their personal information was collected and shared.
- 38% thought they had moderate control; 37% believed they had little control; 13% said they had zero control.
- 25% used temporary e-mail addresses or usernames for some online activities.
- 24% gave non-truthful information about themselves (e.g., when re
Do you know what ATM stands for? For crooks, it stands for A Thief’s Moneymaker.
A new report from FICO says that “skimming” crimes have made their biggest spike in the past 20 years. This includes ATMs on bank premises, but of course, public ATM kiosks have seen the biggest spike.
The thief tampers with the ATM’s card receiver; the installed gadget collects card data which the thief retrieves later. “Skimming,” as this is called, also refers to capturing the PIN via a hidden camera.
With the stole
Enrique Suarez Presenting:
Greece and the Euro: Towards Financial Implosion
Source:
Prof. Rodrigue Tremblay
Global Research, July 07, 2015
This incisive article by Professor Rodrigue Tremblay on the nature of the Greek economic crisis was written four years ago.
In response to recent developments, the author has written an update, which is published below.
July 6, 2015
The EU Sows the Seeds of the Greek Economic Crisis
Prof. Rodrigue Tremblay
Update to July 2011 article entitled Greece and the Euro: Towa
"BigData is now, the future"
August 10 - 14
Bootcamp where specialist will focus on how BigData is changing our world and how it will benefit the financial services.
Book your pass:
mmedina@riskmathics.com
Tel: (+52) 55-36-43-25 int. 212
Cyber crooks have phony websites that masquerade as the legitimate site you want to log onto. They’ve spun their web and are just waiting for you to fly into it. Google now has Password Alert, which will tell you if you’ve landed into such a non-Google web.
For the Chrome browser, this extension will prompt the user to change their password.
When you change a password (regardless of reason) or sign up for a new account and it’s time to come up with a password…don’t just make up an easy word to rem
Of all the weird things that can happen to your iOS device, the latest is a relatively benign situation in which a string of text is sent to the phone…and it causes the phone to crash.
The phone will reboot if the particular nonsensical text string is received while the phone is locked.
Data won’t be stolen; nobody will gain remote control of your device (yet); but heck, who wouldn’t be very annoyed that their phone crashes? And this is going on all over the world. The text characters can also be
Enrique Suarez Presenting:
Greece — The One Biggest Lie You Are Being Told By The Media
Source:
Every single mainstream media has the following narrative for the economic crisis in Greece: the government spent too much money and went broke; the generous banks gave them money, but Greece still can’t pay the bills because it mismanaged the money that was given. It sounds quite reasonable, right?
Except that it is a big fat l
Hi All,
The paperback and Kindle edition of the book "Risk-based Management in the World of Threats and Opportunities: A Project Controls Perspective" is now available in Amazon. Copy and paste the following on your browser. You can grab a copy now.
- http://www.amazon.com/RUFRAN-C.-FRAGO-PMI-RMP/e/B01055MPYI
- http://www.amazon.com/dp/B0104OFUDI/ref=rdr_kindle_ext_tmb
- https://www.linkedin.com/pulse/risk-based-management-world-threats-opportunities-rufran?trk=prof-post
Cheers,
RUFRAN C. FRAGO, P.Eng