Tuesday, July 22, 2008

What Is The Price Of A Topsy Turvy Cake

Governance: A model in the pursuit of democratic participation

Governance: A model in the pursuit of democratic participation

In the formulation of public policies in general and risk management in particular, there are three models describing the relationship between the three agents (Khademian & Feldman, 2007). The first model focuses on state power, typical in countries with authoritarian governments. A second model, the most common in so-called democratic states, is one that takes into account the experts. A third model, the true ideal democratic states, is one that takes into account all those involved or affected (stakeholders). This latest model is called by Khademian & Feldman (2007, pg. 308) as a model for public participation, to express respect, "A third model of public participation has its roots in the planning and efforts to include people directly affected by the practices resulting from this planning, as well as efforts to democratize the development and implementation of public policies. In this model, the primary role of public manager is to engage the public affected by public policies, creating opportunities for participation and the provision of information to facilitate discussion and decision making. "

(Khademian & Feldman, 2007, pg. 308)

In the context of this model of public participation is to understand the concept of governance, a concept introduced in the debates on development in the late eighties of last century. Stop talking about governance imply a further discussion about how concepts are used in one context or another. For example, the World Bank defined governance as "... the Manner in Which power is Exercise in the management of a country's Economic and social resources for development ", being evaluated further through a series of indicators linked to growth and developing countries. An indicator on the economic governance that allows public participation is "accountability", but in democratic and corrupt states, owners and sources of information or data management performance, no accountability responds to reality. Data are altered or makeup for the incumbent government does not lose its credibility.

According to Hirst (2000, pp. 14-19), as well as the version in the economic context, there are four other versions of governance. A brief analysis of these texts and their relevance to the topic at hand is below.

A second version of global governance is centered in the field of international institutions, which are dealt with problems that can not be controlled locally, climate change and international trade regulation are examples of this, another on urgent international regulations which Internet governance in an attempt to regulate the uncontrolled use of the Internet, control that has resulted in the emergence of new risks to the network (viruses, Trojans, spyware, spam, phishing, child pornography, etc.). The Working Group of Internet Governance WGIG (Working Group on Internet Governance) consist of forty members representing various governments, the private sector and civil society made the following concept of governance,

"Internet governance is the Development and application by Governments, the private sector and Civil Society, in Their respective roles, of shared Principles, Norms, rules, decision-making Procedures, and Programmes That shape the evolution and use of the Internet. "

http://www.wgig.org/docs/REPORTS.doc

In this definition all stakeholders play an important role, from any of the areas of participation: state , private sector or civil society. The Internet itself becomes a stage that facilitates participation. Through the blogs (the new world of the blogosphere), forums or wikis, public participation had never found a better partner to participate. In this third environment, as called Echeverría (2007, pg. 69), social networks are created torno a una problemática común. La sociedad civil puede entrar a discutir sobre aquellos riesgos que no tienen mayor atención por los otros actores. Un caso real que puede servir para apoyar mi anterior afirmación es el retiro del mercado de más de cuatro millones de baterías por parte de la empresa Dell Computer en 2006 por las denuncias en cientos de blogs de las explosiones que se presentaban en los equipos de cómputo. La proliferación de “noticias”, en otros medios, hizo que se presentara una reacción mundial frente a estas baterías; algunas aerolíneas, por ejemplo, prohibieron el uso de portátiles Dell en sus aviones . El sector privado (Dell, Apple, Sony) tuvieron que aceptar sus errores tecnológicos and support the economic costs it implied. Civil society, through social networks, won the battle for these corporations to make decisions in an attempt to eliminate the risk materialized.

Internet governance, in turn, has two versions: the governance of necessity of technological regulation (domains especially) and social governance of the Internet as a need to respond to risks associated with xenophobia, satanic sects racism, terrorism, pornography, among others, which proliferate in the network.

A third version focuses on the context of corporations and is known as corporate governance. This version seeks to regulate and protect the interests of investors and shareholders (shareholders) of companies, firms and corporations in general. Contrary to the concept of governance, which I welcome, the state and civil society do not play an important role in this model. Except for its involvement through activities such as the above, from which corporations are obliged to regulate to keep its competitive power in the market.

The fourth version is governance as a new model of public sector governance which stresses the introduction of business practices and new management styles in the public sector, about Hirst (2000, pg. 18) states: "a new model of public services distinct from That of public administration under hierarchical control and Answer to Directly Elected Officials. "

The latest version of civil society is the main actor. It is the social or governance governance system where they are present unions, environmental groups, NGOs, community groups and civic associations in general. However, the prominence of one of the agents, the lay public, in this type of governance does not fertilize the discussions. Environmental groups like Greenpeace have been branded a radicalism that prevents the development of technology.

A version of governance that are not in the categories of Hirst is the "good governance" version used in the European community. There are five principles that constitute good governance: openness, participation, accountability, effectiveness and coherence. Each of these principles are essential for a more democratic governance (Commission of the European Communities, 2001, pg. 10). In regard to the principle of participation in the white paper on good governance is expressed

"The quality, relevance and effectiveness of EU policies ensuring wide participation of citizens in each and every different stages, from conception to implementation of policies. Improved participation create more confidence in the final results and the Institutions which deliver policies. Participation depends essentially on the adoption of an integrated approach of this kind from central government in the design and implementation of EU policies. " In this version

public participation demand a capacity of citizens to participate in the debate. In that sense, it is possible to have a predominant agent in a model of governance. The lay of the expert required capacity for debate, the expert must approach the civil society to understand the context in which they develop their research results, and both should approach the government for democratic decision-making and policy formulation in science and technology that affect the least involved. Is how I conceive social governance, where all policy makers are finally (policemakers).

A governance that transcends the state incorporating the private sector and civil society creates a political environment, social and economic environment for fertile discussion. The solutions to the problems of risk will be on consensus and results will be everyone's responsibility. It can then reach levels in the debate in which the risk will have a single notion, is the global risk in global governance, risk will be local in local governance, whatever the scope, under the same goals and environments of trust, discussions will be fertile.

debates about subjectivity and objectivity in the assessment of risk will be fruitful if there is a participatory discourse, in which both the mathematical models as the beliefs and values \u200b\u200bare widely discussed (Renn, 2005, pg. 52).

Note: the image of this item is a Dell laptop caught fire at a conference in Japan in 2006 (image taken from the blog http://wappsite.blogspot.com/ )


BIBLIOGRAPHY
Khademian, AM, & Feldman, MS (2007). The Role of the Public Manager in Inclusion: Creating Communities of Participation. Governance: An International Journal of Policy, Administration, and Institutions, 20 (2), 305-324.
Hirst, P. (2000). Democracy and Governance. In J. Pierre, Debating Governance: Authority, seering and democracy (pp. 13-35). Unviversity Oxford Press.
Echeverría, J. (2007). Governance of the European information society. CTS, 3 (8), 67-80.
Commission of the European Communities. (2001). European governance. A white paper. Brussels.
Renn, O. (2005). White paper on risk governance: Towards an approach intergrative. Geneva: International Risk Governance Council.


Monday, June 16, 2008

Patient Advocate Jobs Michigan

TEOREMA DE PITAGORAS

Pythagoras THEOREM
To speak of another proof of the theorem of Pythagoras mention Euclidean movements.


* Rotation: to make a rotation is needed at the point around which will make the rotation and an angle that determines how many degrees is this.

parallel
* Translations:
To make a parallel translation takes a segment AB. If a point Q moves to a point Q 'on AB, then the length of QQ' is equal to the length of AB and QQ 'is parallel to AB, while QA is parallel to Q `B.


* Reflection and symmetry
To make a reflection or symmetry is making a line called the axis of reflection or symmetry axis.
Thus if a point is in the axis of symmetry, the reflection is the same point, ie that the line is reflected in itself. Any other point on the plane is reflected across the axis of symmetry.



Another proof of the theorem of Pythagoras

Three Euclidean transformations can be used to give another demonstration of the Pythagorean theorem, namely: the whole triangle, the sum of the squares of the lengths of the legs equals the square the length of the hypotenuse.

Be A `BC a right triangle where BC is the hypotenuse.
Now make the following changes:


1. By reflection symmetry axis BC, obtain the right triangle ABC.


2. For translation, according to BC, the triangle ABC we subtract the triangle T1.




















3. By rotating 90 ° around, we subtract the triangle T2.

4. With the triangle T2 is repeated step 2 and continues until the triangle T6.

is clear that the hypotenuse of the triangle ABC, T2, T4 and T6 are all equal to BC and that two consecutive 90-degree angle form. This means that they form a square.








As the area of \u200b\u200bthe square is (BC) 2 and square area can be found in the area of \u200b\u200b5 parts that compose it, namely the four equal triangles and square then you must:


Simple Diagram Of A Camera

TESELACION HEXAGONAL

regular tessellations

regular tessellation is coverage of the plane with regular polygons and congruent. Are only three regular polygons that cover (or tile) the Euclidean plane: the equilateral triangle, square and regular hexagon.
The only regular polygons that completely cover a flat surface are the equilateral triangle, square and hexagon.
As the union at each vertex must sum to 360 º no gaps, the only regular polygons that add up to 360 when joined by their corners, interior is all three.

equilateral triangles, squares and hexagons





semi-regular tessellation are those containing 2 or more regular polygons in their training. A semi-regular tessellation has the following properties:
1. This consists only of regular polygons.
2. The arrangement of polygons at each vertex is identical.
3. There are only 8 semi-regular tessellations





tiles Construction Method removable

This is a very good technique where you draw a figure on paper and then cut it and superimpose it on another paper take their boundary several times to get a tiling. Method

rabbits
is a method by which they are used only circles and ovals and create figures like rabbits but can only do black and white but is rarely used in the does white tessellation, but many do so in combination with method Encino, francaso "which is a mistake because with that method does not create tessellations but forms of alcohol bottles. With this method it is essential that not a single figure is equal to another but what differentiates the color can be put on a black and white alike in shape and the first tiling to be done with this method was the form of a bunny rabbit with 54 but all different from each other.


IMPLEMENTATION OF THE TILES IN REAL LIFE


The tessellations have been used around the world from ancient times to coat floors and walls, and also as decorative furniture, carpets, tapestries in this case speak of the hexagonal tiling of a soil as shown in the picture.


method to tessellate that has been used on the floor shown in the photograph

tessellation Allen is one of the simplest methods, the construction of your employer, involves turns 60 º and 180 º of two arbitrary lines, to which underlies an equilateral triangle.
As in all cases equilateral pattern, turning it 60 degrees is obtained a hexagonal pattern (based on a regular hexagon), exactly as when turning a triangle of 60 º is generated a regular hexagon.

Since the underlying design a regular hexagon, the tiling is a special case of the previous case, as a regular hexagon is a polygon with even number of sides and has parallel. Therefore, the tiling is generated by translation, as the vectors joining midpoints of opposite sides.


Photograph of a hexagonal floor tiling




One advantage of the hexagonal tessellation is that it be cheaper and performs better.
Indeed, it is easy to see that the ratio between the square of perimeter and area worth:
For the triangle to the square 16 and the hexagon.

Tuesday, April 22, 2008

Sleeping On Side Face Asymmetrical

Navigating the risks of Internet

risk Corner

Navigating the risks of Internet

One night, tired of surfing the Internet, I kept watching detective film. I generally do not like this kind of movies but the dialogue was between a detective and his daughter, sitting at a computer, I drew attention: " daughter, I have always tried your safety. I have always protected from damage you may cause. This home features the most modern security systems, is connected to the nearest police station. Therefore we have never had an intruder, but ... so I never imagined is that the intruder enter through the screen. "

I recently gave some talks about the great benefits provided by the Internet, use blogs, forums, wikis, free software and many other free resources that, properly used, allows us to interact with the world. However, every opportunity is accompanied by risk. Technological developments raises the risk.

In this part we will deal with the risks of the Internet. Input, to reassure the Internet, there are many more benefits than risks. That is, it's worth the risk.

The risks of the Internet. The virtual world of the Internet or, if preferred, the wild world of Internet is populated by strange creatures, hackers, bloggers, geeks, freaks, surfers, nerds, chaters, spammers, spywarers, mixed with real-world creatures known: pedophiles, pedophiles, voyeurs, thieves, swindlers, counterfeiters, pirates, rapists, and many others that escape my mind. My wild world qualifier is not due to the strange creatures, many inserted into a collective consciousness that promotes freedom of consciousness and social justice, but it is a world characterized by little control. On the Internet, the rules are conspicuous by their absence.

The interaction with these people on the network creates risk, but such interaction is transparent to us. Being connected means interaction with some or many of the creatures of the network, for example, a cracker might be trying to undermine our security, if indeed we do. A pederast could be trying to have virtual contact with our children (the intruder who surprised the detective), a spammer is sending us unwanted information, or at least not requested. A spyware is putting a Trojan on our team as we visit your page incautiously.

are many risks to which we submit to become Internet users, with a little help from wikipedia and some web pages will outline the most Common:

1. Risk of infection.

When we become infected is because our immune system has been compromised. Bugs are handled can be viruses or bacteria. The virtual forest also has various forms: viruses, worms and Trojans, but with a special feature: "All are global," ie, not cause epidemics ... generate pandemics. Like real-world viruses, there are those that produce small discomfort to those who generate big headaches and even pocket:

Virus: program that can infect other programs by modifying them to include a copy of itself. Some may remember messages like this: " is shutting down the system. Save all work in progress and log off. Any changes will be lost unsaved. Time remaining to shutdown: 00:00:59 ... Windows must now restart because the service ... Remote Procedure Call (RPC) service terminated unexpectedly " . If you remember it because they were attacked by the Blaster virus , one of the viruses written to attack both the Windows operating system vulnerabilities:

The Windows, he always hated Windows, whatever version, system is attacked by virus writers. The Melissa virus (1999), for example, generated losses of more than $ 300 million affecting more than 15% of the world's computers that used Windows and Word. In those years I was terrified of any. Doc external.

Windows users should be patching the cracks this system. Therefore, many have opted to change the system. I told a friend: "My best antivirus is Linux." However, neither the Linux escapes attack. Maybe it's a good antivirus, antispam good, a good anti spyware, anti trojan good and, in general, a good sailor. That is, carefully navigate the tangled jungle of the Internet.

worms and Trojans. worms or worms are programs that copy themselves, saturate the resources of our teams making slower, they differ from viruses because they infect files and programs. Moreover, u No Trojan is a program that unlike viruses and worms do not infect programs or files or copy themselves. When you run it opens doors to allow the intruder to control our team. This is called cracker intruder or thief information. Its main objective is to break or crack security systems, not only equipment but also commercial software. That is, some crackers are also software pirates. An interesting variant of these Trojans are called spyware.

Spyware. spyware These gather information about a person or organization without their knowledge. The most common function is to collect user information and distribute it to advertising companies or other organizations. Because spyware is commonly used Internet connection to transmit information, makes the consumption of bandwidth is increasing, posing as a further consequence the slowness of our equipment. When someone tells me that your Internet is slow, we always recommend running a good anti-spyware. Spyware Terminator is one of them is also free.






2. Risk mail

The e-mail are growing rapidly. For example, in 1998 there were 253 million, while in 2006 amounted to 1,600. Generally mail viruses we receive, in addition to the always annoying spam email

Spam. Some email users first thing they do is clear more than half of their post dubious origin, including spam . This unsolicited email, generates waste of time and, of course, productivity.

Phishing. "Dear customer of Bancolombia ...." Sure, some recall an email that began with this sentence. Do not miss the unwary who fell into the networks of these hackers. But not only was Bancolombia, the attack is the major banking institutions in the world. Phishing unwary searches the network to supply personal information, especially data from your bank account or credit card. There are cases renowned as Bancolombia, Citibank, BVA and Santander, asking that they update their accounts or y occasion. The most unusual, funniest say, is that fraudulent activity has been reported in the state. Phishing is via email, leading the unwary to a rogue site, with full appearance be real.

These thieves send your emails to everyone and are not attacking bank users, know some of will and will not miss the unwary.


Attachments. A friend frequently have problems with viruses, slow computer, and other symptoms that reflect the misuse of your emails. I could not make him understand that the beautiful PowerPoint presentations (ppt or pps extension), mass, bring one or another virus, worm or Trojan. The e-mail attachments are ideal hiding places for the Trojans, is a means of rapid spread and which fall many, many, unsuspecting, especially lovers of PowerPoint slides.

"Unfortunately Care should be taken now to open this type of email because a new vulnerability in Power Point, presents the risk that anyone can take advantage and install a Trojan called MDropper-BH that makes the computer download malware, turning your PC a zombie "

Taken from the following blog: http://mipropiadecadencia . blogspot.com /

way of malware. This is a word that means malware (bad icious soft ware) in this category are the above programs. That is a Trojan horse, worm, virus and spyware are malware.

3. Risk chat.


Here we return to the introduction this corner. For the chat is that the intruder entered the house detective. Online criminals lure victims with cute phrases, chat know the language of children and youth, the emoticons used properly, posing as another child or young person, share the latest music, in order to spend ... time until the victim falls into your network. By this means it is possible to convince the unsuspecting child or young person to connect your camera and display her body are also known cases where the victim provides parental information (bank accounts and credit cards) and, most regrettable, information on the habits, which allows the criminal, you know when your victim is alone. This is just a sample of what the attacker can do. The effects on moral, ethical, religious, etc. yet to explore. It is well known the proliferation of sects, terrorist groups, xenophobic, racist, anarchist, well ... how much pollution can control the world without the Internet.

4. Risk of slippage. The absence of governance


The issue of Internet governance is in vogue. The lack of control they demand. However, it will be a topic for another corner. Also there are other risks of the Internet have not tried as the case of online games, free programs , useless information (Internet junk), impersonations, violations of privacy, piracy, and a very long list . My purpose is to call attention to the most common ones to which we are exposed.

I end on a note published in the newspaper El Tiempo of Bogotá, on 30 March: " In two years could collapse too much information online to Nemertes Research says " the apocalypse of the Internet?


Some excerpts of note are the following: " At some point it will be almost impossible to see a video, download a song or 'chat' ", " research [...] that only the current traffic YouTube is equal to that endured throughout the Network in 2000. On that website you can see more than 80 million people post videos at a rate of almost 200,000 Daily ".

The note ends with the effects of a paralysis of Internet banking collapse of virtual goodbye to our emails, most telephony services could not be used (goodbye to the blackberry and other new technologies), E-commerce lose millions,

Some benefits that have led to the Big Bang of the Internet are:

Your free email: www. gmail.com , Www.hotmail.com

Your photos. Http://www.flickr.com/

Your blog : www.blogspot.com , http : / / www.blogia.com/ , http://www.vox.com/

Your Internet documents: Www.scribd.com

Your videos: http://es.youtube.com/ , http://video . google.es / , http://es.video.yahoo.com/

Your free programs: www.cdlibre.org

Your virtual hard disk: http://www.mediamax.com/ 25 GB free, Your wiki: http://www.geogebra.org/en/upload/

Hey there great risk, the digital explosion out of control. All profit comes risk. These are the brief findings of this corner.

The images used were downloaded from the following addresses

Figure 1: http://www.20minutos.es/data/img/2007/07/ 11/651948.jpg

Figure 2: http://www.20minutos.es/data/img/2005/02/22/31535.jpg

Figure 3. http://www.enriquedans.com/tag/malware

Figure 4: http://support.onshore.com/?q=wiki/spyware

Figure 5: http://img404.imageshack.us/img404/3407/phishingrt6.jpg