Risk Methodologies for Technological Legacies

Risk Methodologies for Technological Legacies

Author: Dennis Bley

Publisher: Springer Science & Business Media

Published: 2012-12-06

Total Pages: 404

ISBN-13: 9401000972

DOWNLOAD EBOOK

The Cold War Era left the major participants, the United States and the former Soviet Union (FSU), with large legacies in terms of both contamination and potential accidents. Facility contamination and environmental degradation, as well as the accident vulnerable facilities and equipment, are a result of weapons development, testing, and production. Although the countries face similar issues from similar activities, important differences in waste management practices make the potential environmental and health risks of more immediate concern in the FSU and Eastern Europe. In the West, most nuclear and chemical waste is stored in known contained locations, while in the East, much of the equivalent material is unconfined, contaminating the environment. In the past decade, the U.S. started to address and remediate these Cold War legacies. Costs have been very high, and the projected cost estimates for total cleanup are still increasing. Currently in Russia, the resources for starting such major activities continue to be unavailable.


Legacy Data: A Structured Methodology for Device Migration in DSM Technology

Legacy Data: A Structured Methodology for Device Migration in DSM Technology

Author: Pallab Chatterjee

Publisher: Springer Science & Business Media

Published: 2012-12-06

Total Pages: 141

ISBN-13: 1461502411

DOWNLOAD EBOOK

This unique book deals with the migration of existing hard IP from one technology to another, using repeatable procedures. It will allow CAD practitioners to quickly develop methodologies that capitalize on the large volumes of legacy data available within a company today.


Implementing Enterprise Risk Management

Implementing Enterprise Risk Management

Author: James Lam

Publisher: John Wiley & Sons

Published: 2017-03-09

Total Pages: 431

ISBN-13: 1118221567

DOWNLOAD EBOOK

A practical, real-world guide for implementing enterprise risk management (ERM) programs into your organization Enterprise risk management (ERM) is a complex yet critical issue that all companies must deal with in the twenty-first century. Failure to properly manage risk continues to plague corporations around the world. ERM empowers risk professionals to balance risks with rewards and balance people with processes. But to master the numerous aspects of enterprise risk management, you must integrate it into the culture and operations of the business. No one knows this better than risk management expert James Lam, and now, with Implementing Enterprise Risk Management: From Methods to Applications, he distills more than thirty years' worth of experience in the field to give risk professionals a clear understanding of how to implement an enterprise risk management program for every business. Offers valuable insights on solving real-world business problems using ERM Effectively addresses how to develop specific ERM tools Contains a significant number of case studies to help with practical implementation of an ERM program While Enterprise Risk Management: From Incentives to Controls, Second Edition focuses on the "what" of ERM, Implementing Enterprise Risk Management: From Methods to Applications will help you focus on the "how." Together, these two resources can help you meet the enterprise-wide risk management challenge head on—and succeed.


Long-Term Institutional Management of U.S. Department of Energy Legacy Waste Sites

Long-Term Institutional Management of U.S. Department of Energy Legacy Waste Sites

Author: National Research Council

Publisher: National Academies Press

Published: 2000-11-09

Total Pages: 179

ISBN-13: 0309071860

DOWNLOAD EBOOK

It is now becoming clear that relatively few U.S. Department of Energy (DOE) waste sites will be cleaned up to the point where they can be released for unrestricted use. "Long-term stewardship" (activities to protect human health and the environment from hazards that may remain at its sites after cessation of remediation) will be required for over 100 of the 144 waste sites under DOE control (U.S. Department of Energy, 1999). After stabilizing wastes that remain on site and containing them as well as is feasible, DOE intends to rely on stewardship for as long as hazards persistâ€"in many cases, indefinitely. Physical containment barriers, the management systems upon which their long-term reliability depends, and institutional controls intended to prevent exposure of people and the environment to the remaining site hazards, will have to be maintained at some DOE sites for an indefinite period of time. The Committee on Remediation of Buried and Tank Wastes finds that much regarding DOE's intended reliance on long-term stewardship is at this point problematic. The details of long-term stewardship planning are yet to be specified, the adequacy of funding is not assured, and there is no convincing evidence that institutional controls and other stewardship measures are reliable over the long term. Scientific understanding of the factors that govern the long-term behavior of residual contaminants in the environment is not adequate. Yet, the likelihood that institutional management measures will fail at some point is relatively high, underscoring the need to assure that decisions made in the near term are based on the best available science. Improving institutional capabilities can be expected to be every bit as difficult as improving scientific and technical ones, but without improved understanding of why and how institutions succeed and fail, the follow-through necessary to assure that long-term stewardship remains effective cannot reliably be counted on to occur. Long-Term Institutional Management of U.S. Department of Energy Legacy Waste Sites examines the capabilities and limitations of the scientific, technical, and human and institutional systems that compose the measures that DOE expects to put into place at potentially hazardous, residually contaminated sites.


Computer Networks and Information Technologies

Computer Networks and Information Technologies

Author: Vinu V Das

Publisher: Springer Science & Business Media

Published: 2011-03-07

Total Pages: 687

ISBN-13: 3642195415

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the Second International Conference on Advances in Communication, Network, and Computing, CNC 2011, held in Bangalore, India, in March 2011. The 41 revised full papers, presented together with 50 short papers and 39 poster papers, were carefully reviewed and selected for inclusion in the book. The papers feature current research in the field of Information Technology, Networks, Computational Engineering, Computer and Telecommunication Technology, ranging from theoretical and methodological issues to advanced applications.


Ester Boserup’s Legacy on Sustainability

Ester Boserup’s Legacy on Sustainability

Author: Marina Fischer-Kowalski

Publisher: Springer

Published: 2014-08-19

Total Pages: 282

ISBN-13: 940178678X

DOWNLOAD EBOOK

Arising from a scientific conference marking the 100th anniversary of her birth, this book honors the life and work of the social scientist and diplomat Ester Boserup, who blazed new trails in her interdisciplinary approach to development and sustainability.


The Renaissance of Legacy Systems

The Renaissance of Legacy Systems

Author: Ian Warren

Publisher: Springer Science & Business Media

Published: 2012-12-06

Total Pages: 189

ISBN-13: 1447108175

DOWNLOAD EBOOK

Many antiquated or legacy systems are still in operation today because they are critical to the organizations continued operations or are prohibitively expensive to replace. This book guides practitioners in managing the process of legacy system evolution. The author introduces a comprehensive method for managing a software evolution project, from its conception to the deployment of the resulting system. The book helps managers answer two critical decisions: What is the best way to evolve a particular legacy system? and How can the legacy system be migrated to a selected target architecture?