title
stringlengths 1
105
| content
stringlengths 5
58.1k
|
|---|---|
International Security Assistance Force
|
time swedish force consisted troops cv patria xa bae rgm super puma medevac helicopters.ukraine – mostly military doctors serving lithuanianled prt chagcharan one officer works isaf hq kabul.nonnato noneapc nations australia – australia one largest nonnato contributors war afghanistan.called operation slipper core australian contingent based southern province uruzgan.australia joint command uruzgan province united states combined team uruzgan.
|
International Security Assistance Force
|
australia provided majority combat forces uruzgan.included infantry based battle group known mentoring task force also includes cavalry engineer artillery supporting assets.battle groups main effort operational mentoring liaison teams omlts embedded afghan national army units remote combat outposts forward operating bases.omlts conduct almost daily patrolling green zone afghan national army involved heaviest combat experienced regular australian defence force members since vietnam war.australia also contributed strong special operations task group code named task force manned special air service regiment nd commando regiment st commando regiment.
|
International Security Assistance Force
|
task force operated uruzgan helmand zabul surrounding provinces significant success capturing inflicting large numbers casualties taliban.australian army chd chinook heavylift helicopters served afghanistan coalition heavy lift transport helicopters royal australian air force also committed c globemaster c hercules transport aircraft apc orion surveillance aircraft unmanned aerial vehicles.australian soldiers killed another wounded action.bahrain el salvador jordan – jordanian troops deployed december establish ‑bed medical facility mazarisharif.according us department defense hospital provided care local patients day february people treated jordanians.
|
International Security Assistance Force
|
kuwait malaysia mongolia – mongolia sent troops back u.s. surge country.soldiers protect camp eggers others serve trainers afghan national army.new zealand – new zealand deployed undisclosed number nzsas number regular troops assist u.s. rnzaf deployed c aircraft boeing transport aircraft later deployment quantity nzlav armoured fighting vehicles sent supplement force.soldiers killed deployment.singapore – singapore armed forces deployed close personnel afghanistan since may part singapores contributions multinational stabilisation reconstruction efforts there.
|
International Security Assistance Force
|
may fiveman team sent central afghanistan set dental clinic serving local citizens training afghans dentistry could eventually assume responsibility.contributions included uav team weapons locating radar provide rocketlaunch warnings camp holland.south korea – first south korean contingent withdrawn december due expiration mandate despite american calls continued presence.withdrawal one pledges made taliban captors south korean christian missionaries july return hostages release.deployment consisted medics comprising dongeui unit military engineers forming dasan unit bagram airbase north kabul.
|
International Security Assistance Force
|
sent afghanistan respectively.afterwards seoul took role providing medical vocational training assisting united states two dozen volunteers working inside bagram air base north kabul.according isaf statement june south korea returned operating small hospital near airbase bagram military civilian personnel.december south korean defence ministry announced would send troops protect south korean civilian engineers working reconstruction.troops would engage fighting except protect base south korean provincial reconstruction team prt escort protect activities prt members.
|
International Security Assistance Force
|
south korean contingent would based parwan province north kabul months july .invoked threats taliban.statement e‑mailed international media taliban insurgents said seoul must ready face bad consequences troops deployed.south korean government said made promises stay afghanistan withdrew troops .south korea redeployed troops afghanistan july prt leading nation parwan province.
|
International Security Assistance Force
|
korea also dispatched uh‑ black hawks came tactical control rd us infantry division.thailand tonga united arab emirates – uae soldiers serving tarin kowt province march .financing resolution united nations security council established expense isaf operation must borne participating states.purpose resolution established trust fund contributions could channeled participating states operations concerned encouraged participating states contribute fund.see also afghanistan mission networkresolute support missionbritish forces casualties afghanistan since canadian forces casualties afghanistancoalition casualties afghanistangerman armed forces casualties afghanistannato logistics afghan warparticipants operation enduring freedomrole united kingdom war afghanistan –presentlist isaf installations afghanistan notes reading auerswald david p. stephen m. saideman eds.
|
International Security Assistance Force
|
nato afghanistan fighting together fighting alone princeton u.p.maloney sean m. enduring freedom rogue historian afghanistan.. dulles potomac books incorporated isbn mattelaer alexander.afghanistan strengthened nato.survival .–.morelli vincent.
|
International Security Assistance Force
|
nato afghanistan test transatlantic alliance congressional research servicesuhrke astri.contradictory mission nato stabilization combat afghanistan.international peacekeeping .–.stene lillian k. rational beliefs inconsistent practices civil military coordination north afghanistan.phd thesis university stavanger .
|
Web presence
|
september external links official websiteisaf youtube videosisafs voice toward afghan people english darivideo british isaf patrol actionofficial site allied joint force command brunssum netherlandsuk defence news operations afghanistanpeace operations monitor afghanistanbelu isaf official isaf site belgium luxembourg archived november wayback machine dutch frenchthe isafsite czech ministry defence englishnorwegian isaf photos –official swedish armed forces afghanistan – isaf site english swedishinfos commanders nations apos isafbased classical spiral model.versions see also trusted computing base reading external links official websitelinkedin profile facebook account twitter account.examples web presence business entity could corporate website microsite page review site wiki page social media point presence e.g.linkedin company page andor group facebook businessbrandproduct page twitter account.every web presence associated unique web address distinguish one point presence another.owned vs. unowned web presence either owned unowned.owned media exists single person group control content published web presence e.g.
|
Web presence
|
corporate website personal twitter account.however single person group cannot solely control content creator different owner.considered unowned media see earned media.wikipedia yelp page person company product would example known earned web presence.occasionally first form media known paid media often included discussion media types earned vs. owned vs. paid.paid media commonly found form advertisements considered form web presence.
|
Web presence
|
management web presence management process establishing maintaining digital footprint web.three factors considered include following person business web presence web presence represents enterprise published point presence.web presence management discipline determining governingthe distribution policy documentswhich platforms appropriate e.g.internal vs. external blog youtube vs. vimeothe single inventory personal corporate web presence e.g.partners advocateswhere web business relatable assets representedwhere web business relatable assets impersonated piratedweb properties particular entities representwho control web propertiesnew web properties personal corporate inventory e.g.someone creates new presenceauthorized unauthorized changes creation e.g.
|
Web presence
|
branding web presencea workflow creating web property follows corporate standards management system purpose web presence management system manage web presence person business.includes collection domain names websites social media web pages represented.tool generally offers following key functions new presence discovery inventory management change detection access control stakeholder coordination compliance workflow.a web presence management system meant broader reach emphasizes presence established established must maintained must remediated.example web presence management system brandle presence manager.in order publish content various points web presence multiple content management systems sometimes even social media management systems often used.primary focus content social media management systems limited specific web platforms.
|
Web presence
|
domain names another aspect web presence management managing collection domain names registered person business.entity may register multiple domain names property.result link alternative spellings different toplevel domains aliases brands products website.similarly negative derogatory domain names may also registered.done prevent certain domain names used person business.it common larger business domain names registered multiple employees multiple domain name registrars possibly result organizational geographical requirements.
|
Web presence
|
consequently web presence management system used monitor domain names registered business regardless registrars used.discovery web presence discovery process monitoring web new point presence person business.web presence discovery often included web presence management system.whether new domain registered new website published new social media account established occurs outside persons business’ control.result purpose assess new point presence appropriately handle violations.it important note web presence discovery differs content listening.
|
Web presence
|
former involves looking new properties web whereas latter refers analyzing content already exists hear person business seen often near real time.examples content listening systems include sysomos radian subsidiary salesforce.com.brand protection person business may choose watch new web presence might appear misrepresent mislead audience counterfeiters spoofers malicious hackers.one early software online brand protection marketplace markmonitor part thomson reuters.software helped detect rogue domain names websites.however modern day growth social media seen rise number fraudulent brand impersonations.
|
Web presence
|
become much easier new web presence created platforms results greater frequency today.preventive measure online brand protection providers adding social media domain website discovery options.security widespread growth social media also made easier unauthorized individuals impersonate employee.consequently social media become recognized threat vector used socially engineer attack business.counter companies able use web presence monitoring tools detect new points presence web thereby defend socially engineered attacks.
|
Web presence
|
distributed inventory management web presence monitoring system used business associate new web property corporate inventory.designed address autonomous distributed behaviors.usually applies larger businesses whose geographically diverse employees prone creating new points presence web.example retail chain may allow local store create manage web presence market communicate local customer base.similarly global business may teams country region create manage web presence adapt local languages cultures.
|
Web presence
|
monitoring web presence monitoring process monitoring known inventory web presence detect changes made.web presence monitoring often included web presence management system serve multiple purposes larger corporations certain individuals celebrities.it important note presence monitoring differs content listening.former involves monitoring properties e.g.branding web property established inventory whereas latter refers analyzing content already exists hear person business seen often near real time.additionally presence monitoring focuses owned media content listening earned media.
|
Web presence
|
corporate brand regulatory compliance many companies ensure certain standards met property web represents business.companies regulated industries finance healthcare company may required law ensure publicized content regardless platform technology follow specific requirements.the widespread growth social media seen rise number fraudulent corporate impersonations.become much easier new web presence created platforms much prevalent used be.preventive measure web presence monitoring system alerts company known property changed allowing property reviewed amended follows proper standards.. web presence monitoring system helps alert company known property changed reviewed brought back necessary compliance appropriate standards.audit web presence audit performed enterprise determine points presence web meet objectives well governance risk management compliance grc needs.
|
Web presence
|
ensure neutrality audits often conducted part information technology audit professional services agency internal audit team.however less formal web presence audit often performed internal members routine meet grc objectives.a web presence audit usually includes web presence discovery review webbased content business’ inventory web presence.even though web presence monitoring performed web presence audit review nature scope companys web presence monitoring policies procedures tools considered.social media audit due emerging challenges introduced dynamic nature social media business may choose perform specific social media audits greater frequency.social media audit similar web presence audit may also include purposes maintaining accurate inventory business social media points presence.
|
Web presence
|
alternatively business may choose employ automated web presence discovery compliance systems keep corporate social media inventory uptodate compliant grc needs.web presence vs. web reputation management reputation management systems often associated web presence management.web presence management knowing individual business represented whereas reputation management knowing people saying individual business.web presence management handles owned media reputation management systems earned media.both systems offer similar degree remediation.web presence management systems remediation would include finding counterfeit properties infringe brand trademark.
|
Web presence
|
reputation management systems remediation would include identifying eliminating misleading reviews andor encouraging contribution authentic comments.even though web presence monitoring tool help identify unowned web properties people talking person product brand part solution.reputation management system often includes content listening system monitor stream messages particular subject may coming point presence web e.g.comment product customer personal twitter account.examples reputation management companies click here.see also references
|
Security question
|
commonly used banks cable companies wireless providers extra security layer.history financial institutions used questions authenticate customers since least early th century.speech meeting section american bankers association baltimore banker william m. hayden described institutions use security questions supplement customer signature records.described signature cards used opening new accounts spaces customers birthplace residence mothers maiden name occupation age.hayden noted items often left blank residence information used primarily contact customer mothers maiden name useful strong test identity.although observed rare someone outside customers family try withdraw money customer account said mothers maiden name useful verification rarely known outside family even people opening accounts often unprepared question.
|
Security question
|
similarly modern practice credit card provider could request customers mothers maiden name issuing replacement lost card.in security questions came widespread use internet.form selfservice password reset security questions reduced information technology help desk costs.allowing use security questions online rendered vulnerable keystroke logging bruteforce guessing attacks well phishing.addition whereas human customer service representative may able cope inexact security answers appropriately computers less adept.users must remember exact spelling sometimes even case answers provide poses threat answers written exposing physical theft.
|
Security question
|
application due commonplace nature socialmedia many older traditional security questions longer useful secure.important remember security question another password.therefore security question shared anyone else include information readily available social media websites remaining simple memorable difficult guess constant time.understanding every question work everyone rsa u.s. network security provider division emc corporation gives banks questions choose from.many questioned usefulness security questions.security specialist bruce schneier points since public facts person easier guess hackers passwords.
|
Elie Bursztein
|
users know create fake answers questions forget answers thus defeating purpose creating inconvenience worth investment.see also cognitive passwordknowledgebased authenticationpassword fatigue referencescurrently leads google’s security antiabuse research team.education early career bursztein obtained computer engineering degree epita master’s degree computer science paris diderot universityens phd computer science école normale supérieure parissaclay dissertation titled anticipation games game theory applied network security.his phd advisor jean goubaultlarrecq.before joining google bursztein postdoctoral fellow stanford universitys security laboratorywhere collaborated dan boneh john mitchellon web security gamesecurity andapplied cryptographic research.his work stanford university included first cryptanalysis innerworkings microsoft’s dpapi data protection application programming interface thefirst evaluation effectiveness private browsingand many advances captcha security usability.bursztein discovered reported helped fix hundreds vulnerabilities including securing twitter’s framebusting code exploiting microsofts location service track position mobile devices exploiting lack proper encryption apple app store steal user passwords install unwanted applications.career google bursztein joined google research scientist.he founded antiabuse research team became lead security antiabuse research team .burszteins notable contributions google include developing deeplearning engine helps block malicious documents targeting gmail users.developing passwordchecking service allowed hundreds millions users check whether credentials stolen data breach preserving privacy.developing keras tuner became default hypertuner tensorflow tfx.
|
Elie Bursztein
|
conducting first largescale study illegal online distribution child sexual abuse material partnership ncmec.finding st sha full collision.deprecating security questions google completing first large inthewild study effectiveness security questions showed insecure low recall rate.redesigning google captcha make easier humans resulting .improvement pass rate.
|
The Web Conference
|
strengthening google accounts protections hijackers fake accounts.awards honors best academic papers awards usenix security distinguished paper award wouldnt someone think democracy target security practices challenges people involved u.s. political campaignsbursztein usenix security distinguished paper award protecting accounts credential stuffing password breach alerting chi best paper award “they don’t leave us alone anywhere go” gender digital abuse south asia crypto best paper award first collision full sha www best student paper award secrets lies account recovery lessons use personal knowledge questions google sp distinguished practical paper award ad injection scale assessing deceptive advertisement modifications sp best student paper award openconflict preventing real time map hacks online games wispt best paper award probabilistic protocol identification hard classify protocol industry awards recognized one influential french people cybersecurity blackhat pwnie award first practical sha collision irtf applied networking research prize neither snow rain mitm … empirical analysis email delivery security top web hacking techniques attacking https cache injection trivia bursztein accomplished magician posted magic tricks weekly instagram pandemic.in following talk hacking hearthstone using machine learning decided make prediction tool open source hearthstone’s community disappointment blizzard entertainment’s request.selected publications references external links elie burszteins personal siteelie bursztein twitter elie burszteins channel youtubeelie bursztein google scholarfirst conference many held organized robert cailliau cern geneva switzerland.conference organized international world wide web conference committee iwc also founded robert cailliau colleague joseph hardin every year since.conferences location rotates among north america europe asia events usually span period five days.conference aims provide forum key influencers decision makers technologists businesses standards bodies present ongoing work research opinions well receive feedback knowledgeable people field.the conference series aimed providing global forum discussion debate regard standardization associated technologies impact said technologies society culture.developers researchers internet users well commercial ventures organizations come together conference discuss latest advancements web evolving uses trends development popularization etv ebusiness.
|
The Web Conference
|
conferences usually include variety events tutorials workshops well main conference special dedications space memory history web specific notable events.conferences organized iwc collaboration world wide web consortium wc local organizing committees technical program committees.history robert cailliau founder world wide web lobbied inside cern conferences like hypertext conference san antonio texas seattle washington.came back conference announced new conference called world wide web conference actually hours faster ncsa announced mosaic web.founding iwc joseph hardin ncsa decided next conferences geneva.
|
The Web Conference
|
content though way content organized varies year year worldwide web conference nevertheless continued premiere venue researchers academics businesses standard bodies come together discuss latest updates state evolutionary path web.people across world come together spirit tradition submitting cuttingedge exciting new research peer reviewed world wide web communitys knowledgeable members.at recent conference wwws largest program peer reviewed research paper presentations fell one eleven categoriesbehavioral analysis personalizationcontent analysiscrowd phenomenainternet economics monetizationsecurity privacy trust abusesemantic websocial networks graph analysissoftware infrastructure performance scalability availabilityuser interfaces human factors smart devicesweb miningweb search systems applicationsthose papers accepted presented conference appear online conference proceedings published acm digital library well conferences website.furthermore many papers continue submitted peerreviewed journals consequent conclusion conference.in addition presenting breakthrough research web associated technologies conference acts stage developers demonstrate receive feedback ongoing work dedicated session.demo track allows researchers practitioners demonstrate new systems dedicated session.developer track track dedicated solely web development stage upon web developers present new trends interesting ideas well code apis emerging applications platforms standards.though peerreviewed research paper presentations demo developer tracks large portion conferences program merely launch pad individuals completed cuttingedge research field.
|
The Web Conference
|
students studying web associated technologies submit unfinished work review.beginner well senior phd students encouraged present ideas phd symposium review.unique opportunity receive feedback work experienced researchers well senior phd students working related research areas.applications submissions looked symposium program committee.committee includes experienced researches.
|
The Web Conference
|
people able help applicants guide work.researchers practitioners also encouraged submit new innovative workinprogress.providing unique opportunity gain feedback peers informal setting poster track provides presenters invaluable feedback knowledgeable sources well conference attendees opportunity learn novel ongoing research projects whose results already appear promising despite incompletion.lastly conference allows series colocated workshops attendees dedicated emergent web topics.workshops work create open dialogue amongst researchers practitioners web technologies also potential means collaboration present future endeavors.list conference editions past future conferences include see also acm kddacm sigiracm cikmwsdmieee icdmsdmicmlnips references external links list past future www conferences iwc site
|
Social Security Act
|
law created social security program well insurance unemployment.law part roosevelts new deal domestic program.by united states modern industrial country without national system social security.midst great depression physician francis townsend galvanized support behind proposal issue direct payments elderly.responding movement roosevelt organized committee led secretary labor frances perkins develop major social welfare program proposal.roosevelt presented plan early signed social security act law august .
|
Social Security Act
|
act upheld supreme court two major cases decided .the law established social security program.oldage program funded payroll taxes ensuing decades contributed dramatic decline poverty among elderly spending social security became major part federal budget.social security act also established unemployment insurance program administered states aid dependent children program provided aid families headed single mothers.law later amended acts social security amendments established two major healthcare programs medicare medicaid.background history industrialization urbanization th century created many new social problems transformed ideas society government function together them.
|
Social Security Act
|
industry expanded cities grew quickly keep demand labor.tenement houses built quickly poorly cramming new migrants farms southern eastern european immigrants tight unhealthy spaces.work spaces even unsafe.by united states modern industrial country people faced depression without national system social security though handful states poorlyfunded oldage insurance programs.federal government provided pensions veterans aftermath civil war wars states established voluntary oldage pension systems otherwise united states little experience social insurance programs.american workers retirement old age realistic option.
|
Social Security Act
|
physician francis townsend galvanized support pension proposal called federal government issue direct amonth payments elderly.roosevelt attracted general thinking behind townsends plan would provide longer capable working stimulate demand economy decrease supply labor.roosevelt charged committee economic security chaired secretary labor frances perkins developing oldage pension program unemployment insurance system national health care program.proposal national health care system dropped committee developed unemployment insurance program would largely administered states.committee also developed oldage plan roosevelts insistence would funded individual contributions workers.in january roosevelt proposed social security act presented practical alternative townsend plan.
|
Social Security Act
|
series congressional hearings social security act became law august .congressional debate social security program expanded provide payments widows dependents social security recipients.job categories covered act included workers agricultural labor domestic service government employees many teachers nurses hospital employees librarians social workers.result percent african american workforce excluded initial social security program well percent white workers.many workers covered later social security expanded .the program funded newlyestablished payroll tax later became known federal insurance contributions act tax.
|
Social Security Act
|
social security taxes would collected employers states employers employees contributing equally tax.social security tax regressive social security benefits based much individual paid system program would contribute income redistribution way reformers including perkins hoped.addition creating program social security act also established stateadministered unemployment insurance system aid dependent children provided aid families headed single mothers.compared social security systems western europe social security act rather conservative.however first time federal government took responsibility economic security aged temporarily unemployed dependent children handicapped.
|
Social Security Act
|
titles social security act amended significantly time.initial act ten major titles title xi outlining definitions regulations.titles added social security act amended.title i—old age title designed give money states provide assistance aged individuals.title ii—federal reserve account title ii establishes federal reserve account used pay social security benefits gives secretary treasury authority invest excess reserves account.
|
Social Security Act
|
title iii—unemployment title iii concerns unemployment insurance.title iv—child aid title iv concerns aid families dependent children.title v—child welfare title v concerns maternal child welfare.title vi—public health title vi concerns public health services investigation disease problems sanitation.grants surgeon general power distribute money states purpose approval secretary treasury.
|
Social Security Act
|
title vii—social security board title vii establishes social security board outlines composed three appointees chosen president approved senate serving six years.title viii—taxes respect employment title viii establishes payroll tax used fund social security.amendments tax removed social security act placed internal revenue code renamed federal insurance contributions act.medicare established fica tax increased fund program well.title ix—tax employers eight title ix establishes excise tax paid first day every year employers proportional total wages employees.
|
Social Security Act
|
also establishes first federal unemployment insurance program united states.title x—blindness title x concerns support blind people.title xi—general provisions peer review progressive sampling administrative simplification title xii—advances state unemployment funds title xiii—reconversion unemployment benefits seamen title xiv—grants states aid permanently totally disabled title xv—unemployment compensation federal employees title xvi—grants states aid aged blind disabled title xvi—supplemental security income aged blind disabled title xvi establishes concerns supplemental security income ssi.title xvii—grants planning comprehensive action combat mental retardation title xviii—health insurance aged disabled title xviii establishes concerns medicare.title xix—grants states medical assistance programs title xix establishes concerns medicaid.
|
Social Security Act
|
title xx—block grants states social services title xxi—state childrens health insurance program title xxi establishes concerns chip.amendments social security act amendments h.r.approved august public law expansion benefits original act provided one federallyadministered benefit oldage insurance paid insured worker.amendments transformed nature social security program.amendments created two new benefit categories § actpayments spouse children retired worker called dependents family benefits provision oldage insurance.payments family insured worker event premature death worker called survivors benefits provision thennewly created survivors insurance program.retirementaged wives children attending school widowed mothers caring eligible children aged widows made eligible dependents survivors benefits.under select circumstances parents deceased insured workers also made eligible survivors insurance.
|
Social Security Act
|
eligible parents must least age entitled oldage insurance wholly dependent upon insured worker income mustnt married since death insured worker.furthermore parents eligible deceased insured worker leaves widow unmarried surviving child age .the amendments also increased benefit amounts accelerated start monthly benefit payments .alternation financing mechanisms oldage reserve account previously established § act replaced federal oldage survivors insurance trust fund administered board trustees.secretary treasury secretary labor chairman social security board exofficious members.composition board trustees significantly altered since.
|
Social Security Act
|
war mobilization reconversion act s. approved october public law title xii social security act amendments h.r.approved august public law title xiii social security act amendments h.r.approved august public law amendments raised benefits first time placed program road virtually universal coverage today.specifically introduction costofliving adjustment cola.h.r.
|
Social Security Act
|
approved june public law social security act amendments h.r.approved july public law social security act amendments h.r.approved september public law h.r.approved september public law title xv maternal child health mental retardation planning amendments h.r.approved october public law title xvii social security amendments h.r.
|
Social Security Act
|
approved july public law title xviiititle xix constitutional litigation supreme court struck many pieces roosevelts new deal legislation including railroad retirement act.court threw centerpiece new deal national industrial recovery act agricultural adjustment act new york states minimumwage law.president roosevelt responded attempt pack court via judicial procedures reform bill .february sent special message congress proposing legislation granting president new powers add additional judges federal courts whenever sitting judges age older refused retire.practical effect proposal president would get appoint six new justices supreme court judges lower federal courts thus instantly tipping political balance court dramatically favor.
|
Social Security Act
|
debate proposal lasted six months.beginning set decisions march april may including social security act cases court would sustain series new deal legislation.chief justice charles evans hughes played leading role defeating courtpacking rushing pieces new deal legislation ensuring courts majority would uphold it.march associate justice owen roberts previously sided courts four conservative justices shocked american public siding hughes courts three liberal justices striking courts previous decision case adkins v. childrens hospital held minimum wage laws violation fifth amendments due process clause thus unconstitutional upheld constitutionality washington states minimum wage law west coast hotel co. v. parrish.roberts joined four conservative justices using adkins decision strike similar minimum wage law new york state enforced morehead v. new york ex rel.tipaldo decision reverse previous vote morehead decision would known switch time saved nine.
|
Social Security Act
|
spite widespread speculation roberts agreed join courts majority upholding new deal legislation social security act spring court packing plan hughes wrote autobiographical notes roosevelts court reform proposal slightest effect courts decision parrish case delayed announcement decision created false impression court retreated fire.following vast support demonstrated new deal roosevelts reelection – hughes persuaded roberts longer base decisions political maneuvering side future cases involved new deal legislation – records show roberts indicated desire overturn adkins decision two days oral arguments concluded parrish case december .time however court divided following initial conference call associate justice harlan fiske stone one three liberal justices continuously voted uphold new deal legislation absent due illness even division court holding washington supreme court finding minimum wage statute constitutional would stand.hughes desired clear strong – affirmation washington supreme court judgment rather – default affirmation convinced justices wait stones return deciding announcing case.us supreme court cases two supreme court rulings affirmed constitutionality social security act.steward machine company v. davis u.s held – decision given exigencies great depression late today argument heard tolerance crisis extreme use moneys nation relieve unemployed dependents use purpose narrower promotion general welfare.
|
Social Security Act
|
arguments opposed social security act articulated justices butler mcreynolds sutherland opinions social security act went beyond powers granted federal government us constitution.argued imposing tax employers could avoided contributing state unemploymentcompensation fund federal government essentially forcing state establish unemploymentcompensation fund would meet criteria federal government power enact program.helvering v. davis u.s. decided day steward upheld program proceeds employee employer taxes paid treasury like internalrevenue taxes generally earmarked way.social security tax constitutional mere exercise congresss general taxation powers.cases flemming v. nestor us upholding § allowing congress amend revise schedule benefits.however recipients benefits contractual rights them.goldberg v. kelly us william brennan jr. held must evidentiary hearing recipient deprived government benefits due process clause fourteenth amendment.weinberger v. wiesenfeld held male widower entitled deceased wifes benefit female widow entitled deceased husbands equal protection due process clauses fourteenth amendment.
|
Social Security Act
|
impact social security benefits paid totaled million rose million .billion .billion .billion .billion figures nominal dollars adjusted inflation.
|
Social Security Act
|
billion benefits paid .million beneficiaries.nearly million americans received billion social security benefits.during continued highest poverty rate age group us largest percentage nations wealth concentrated hands americans .figure dramatically reversed largest percentage wealth hands americans – among poorest.elder poverty normal sight thus become rare st century.reflecting continuing importance social security act biographer kenneth s. davis described social security act important single piece social legislation american history.
|
Social Security Act
|
see also us labor lawlist social security legislation united states references bibliography bethell thomas n. roosevelt redux.american scholar .– online popular account.ikenberry g. john.theda skocpol expanding social benefits role social security.political science quarterly .
|
Social Security Act
|
.onlinekennedy david m. .freedom fear american people depression war .oxford university press.isbn .mcjimsey george .
|
Nuclear weapons and Ukraine
|
presidency franklin delano roosevelt.university press kansas.isbn .electorate expressed support ukraines declaration independence elected chairman parliament leonid kravchuk first president country.meetings brest belarus december alma ata december leaders belarus russia ukraine formally dissolved soviet union formed commonwealth independent states cis.after dissolution soviet union ukraine held one third soviet nuclear arsenal third largest world time well significant means design production.urn intercontinental ballistic missiles icbm six warheads rt molodets icbms ten warheads apiece well heavy bombers totaling approximately warheads remained ukrainian territory.formally weapons controlled commonwealth independent states.ukraine agreed destroy weapons join treaty nonproliferation nuclear weapons npt.
|
Nuclear weapons and Ukraine
|
former military units republic soviet union ukraine base following nuclear forcesrd rocket armyth rocket division rakovo khmelnytskyi oblast see ukта ракетна дивізія срсрth guards rocket division lutsk volyn oblastrd guards rocket division romny sumy oblastth rocket division pervomaisk nikolayev oblastth rocket division bilokorovychi zhitomir oblast denuclearization international relations theorist university chicago professor john mearsheimer published article including prediction ukraine without nuclear deterrent likely subjected aggression russia much minority view time.a study argues denuclearization ukraine stupid mistake unclear ukraine would better nuclear state.study argues push ukrainian independence view make nonnuclear state.united states would also made ukraine exception came denuclearization postsoviet states belarus kazakhstan.deterrent value nuclear weapons ukraine also questionable ukraine would spend months establish full operational control nuclear arsenal left russians.icbms also range – km initially targeting united states meant could retargeted hit russias far east.
|
Nuclear weapons and Ukraine
|
airlaunched cruise missiles alcms left russians disabled russians collapse soviet union even reconfigured made work ukrainians unlikely would deterrent effect.ukraine decided establish full operational control nuclear weapons would faced sanctions west perhaps even withdrawal diplomatic recognition united states nato allies.ukraine would also likely faced retaliatory action russia.ukraine would also struggled replacing nuclear weapons service life expired ukraine nuclear weapons program.exchange giving nuclear weapons ukraine received financial compensation well security assurances budapest memorandum.
|
Nuclear weapons and Ukraine
|
budapest memorandum december leaders ukraine russia britain united states signed memorandum provide ukraine security assurances connection accession npt nonnuclear weapon state.four parties signed memorandum containing preamble six paragraphs.memorandum reads followsthe united states america russian federation united kingdom great britain northern irelandwelcoming accession ukraine treaty nonproliferation nuclear weapons nonnuclearweapon statetaking account commitment ukraine eliminate nuclear weapons territory within specified period timenoting changes worldwide security situation including end cold war brought conditions deep reductions nuclear forces.confirm following.russian federation united kingdom great britain northern ireland united states america reaffirm commitment ukraine accordance principles final act conference security cooperation europe respect independence sovereignty existing borders ukraine.. russian federation united kingdom great britain northern ireland united states america reaffirm obligation refrain threat use force territorial integrity political independence ukraine none weapons ever used ukraine except selfdefence otherwise accordance charter united nations.. russian federation united kingdom great britain northern ireland united states america reaffirm commitment ukraine accordance principles final act conference security cooperation europe refrain economic coercion designed subordinate interest exercise ukraine rights inherent sovereignty thus secure advantages kind.. russian federation united kingdom great britain northern ireland united states america reaffirm commitment seek immediate united nations security council action provide assistance ukraine nonnuclearweapon state party treaty nonproliferation nuclear weapons ukraine become victim act aggression object threat aggression nuclear weapons used.. russian federation united kingdom great britain northern ireland united states america reaffirm case ukraine commitment use nuclear weapons nonnuclearweapon state party treaty nonproliferation nuclear weapons except case attack territories dependent territories armed forces allies state association alliance nuclearweapon state.. ukraine russian federation united kingdom great britain northern ireland united states america consult event situation arises raises question concerning commitments.france chinas commitments france china also provided ukraine assurances similar budapest memorandum significant differences.
|
Nuclear weapons and Ukraine
|
instance frances pledge contain promises laid paragraphs refer aggression un security council consult event question regarding commitments.chinas pledge takes different form entirely dating december reading followsthe chinese government welcomes decision ukraine destroy nuclear weapons territory commends approval verkhovna rada ukraine november ukraine’s accession treaty nonproliferation nuclear weapons nonnuclearweapon state.china fully understands desire ukraine security assurance.chinese government always maintained circumstances china use threaten use nuclear weapons nonnuclearweapon states nuclearweaponfree zones.principled position also applies ukraine.chinese government urges nuclearweapon states undertake commitment enhance security nonnuclearweapon states including ukraine.the chinese government constantly opposed practice exerting political economic pressure international relations.
|
Nuclear weapons and Ukraine
|
maintains disputes differences settled peacefully consultations equal footing.abiding spirit sinoukrainian joint communiqué january establishment diplomatic relations sinoukrainian joint communiqué october sinoukrainian joint statement september china recognizes respects independence sovereignty territorial integrity ukraine stands ready develop friendly cooperative sinoukraine relations basis five principles peaceful coexistence.thus chinas pledge similar frances pledge involve un consultative mechanisms case crisis.however pledge respect sovereignty territorial integrity ukraine.annexation crimea despite russias claimed annexation crimea un general assembly rejected invalid government ukraine reaffirmed decision accede nuclear nonproliferation treaty nonnuclearweapon state.pavlo rizanenko member ukrainian parliament told usa today ukraine may arm nuclear weapons united states world leaders hold end agreement.said gave nuclear weapons agreement.
|
Nuclear weapons and Ukraine
|
theres strong sentiment ukraine made big mistake.also said future matter situation resolved crimea need much stronger ukraine.nuclear weapons people dont invade you.on december ukrainian president petro poroshenko stated want ukraine become nuclear power again.russian forces russian forces withdrew nuclear weapons delivery systems crimean peninsula dissolution soviet union mid exception nuclearcapable ships submarines black sea fleet stationed accordance agreements ukraine.annexation russian federation deployed nuclearcapable weapons peninsula including antiaircraft missiles later tum backfire bombers iskanderm ballistic missiles.
|
Nuclear weapons and Ukraine
|
ukrainian nsdc official stated russia done work soviet nuclearweapons storage facility feodosiia krasnokamianka kyzyltash added new tunnels nuclear submarine base balaklava.in july russian foreign minister stated country right defend crimea using nuclear weapons march president putin said invasion crimea he’d prepared put nuclear forces alert.around time russian foreign ministry official said russia right deploy nuclear arms peninsula internationally recognized ukrainian territory.renewed tensions russia april andriy melnyk ukrainian ambassador germany told deutschlandfunk radio ukraine allowed become nato member country might reconsider status nonnuclear weapon state guarantee defense.in february ukrainian president volodymyr zelensky renewed sentiments suggesting ukraine would potentially view budapest memorandum invalid security guarantees met.see also vladimir chelomeydneprkhartronstanislav konyukhovmassandra accordsmayakmolodetsrmrdtsyklonurnvladimir utkinmikhail yangelyuzhmashyuzhnoye design officezenit reference list external links ukraine crisis unsettling decadesold nuclear weapons agreementsukraine votes quit soviet union independence voters approve historic break kremlin.presidentelect calls collective command countrys nuclear arsenalrussia ukraine breakup soviet unionmemorandums security assurances ukraine may go nuclear says kiev lawmakerthe ukraine crisis unsettling decadesold nuclearweapons agreements militarization crimea paneuropean threat nato response.
|
GhanaWeb
|
third editionlaunched ghanaweb b.v. privatelyowned dutch company .also offers background information classifieds radio stations social network ghanaians diaspora.according alexa top sites rankings country ghanaweb ranks third ghana popular among ghanaian migrants united states united kingdom germany canada italy south africa netherlands france many countries.ghanaweb part africaweb holding group.evolved years include video content ghanaweb tv social media components well mobile app ghanaweb reporter.initiatives july ghanaweb partnered africa consumer pane cooperative effort digital publisher africa business communities market research firm msiaci launch ghana election polls conducted monthly enable citizens express opinions projections elections.in february ghanaweb ghanaian media company receive funding google google news initiative gni innovation enable media company thrive digital era expand projects.
|
GhanaWeb
|
history ghanaweb.com began print magazine serving growing ghanaian community amsterdam collating news stories ghanaian newspapers.website launched january amalgamation ghanahomepage blog domain university uta finland conceived early nineties ghanaian lecturer working finland.ghanaweb.comghanahomepage featured links news sports announcements chat rooms ghanaian dictionary many resources.news stories ghana republished different sources mailing lists magazines.ghanaweb currently evolved news aggregator producer original content.also mobile app.
|
GhanaWeb
|
first google news initiative gni innovation challenge ghanaweb reporter project.on thursday th july gmt visitors ghanaweb noticed entertainment news publishing site hacked used fun purposes hacker.left many people shocked pages werent leading supposed article idea going on.working around clock technical team ghanaweb able regain full access website whiles tightening security avoid future hacks.responsible day perpetrators still unknown hacker used political parties divert attention hisher identity.references
|
Security convergence
|
security convergence motivated recognition corporate assets increasingly informationbased.past physical assets demanded bulk protection efforts whereas information assets demanding increasing attention.although generally used relation cyberphysical convergence security convergence also refer convergence security related risk resilience disciplines including business continuity planning emergency management.security convergence often referred converged security.definitions according united states cybersecurity infrastructure security agency security convergence formal collaboration previously disjointed security functions.
|
Security convergence
|
survey participants asis foundation study state security convergence united states europe india define security convergence getting securityrisk management functions work together seamlessly closing gaps vulnerabilities exist space functions.in book security convergence managing enterprise security risk dave tyson defines security convergence integration cumulative security resources organization order deliver enterprisewide benefits enhanced risk mitigation increased operational effectiveness efficiency cost savings.background concept security convergence gained currency within context fourth industrial revolution according founder executive chairman world economic forum wef klaus schwab characterised fusion technologies blurring lines physical digital biological spheres.key results fusion include developments cyberphysical systems cps growth internet things iot seen proliferation number types internet connected physical objects.gartner predicted would billion internetconnected things .security convergence endorsed early three leading international organizations security professionals – asis international isaca issa – together cofounded alliance enterprise security risk management part promote concept.types convergence cyberphysical convergence risk convergence context internet things cyber threats readily translate physical consequences physical security breaches also extend organisations cyber threat surface.
|
Security convergence
|
according united states cybersecurity infrastructure security agency adoption integration internet things iot industrial internet things iiot devices led increasingly interconnected mesh cyberphysical systems cps expands attack surface blurs clear functions cybersecurity physical security.according wef global risks report operational technologies increased risk cyberattacks could cause traditional kinetic impacts technology extended physical world creating cyberphysical system.according united states department homeland security consequences unintentional faults malicious attacks cyberphysical systems could severe impact human lives environment.notable examples attacks internet connected facilities include stuxnet attack irans natanz nuclear facilities december ukraine power grid cyberattack.“today’s threats result hybrid blended attacks utilizing information technology physical infrastructure operational technology ot enemy avenue approach notes former cisa assistant director infrastructure security brian harrell.highlighting future threat landscape ensure better situational awareness rapid response.” organisational convergence traditionally distinct siloed approaches physical security cyber security viewed proponents security convergence unable adequately protect organisation attacks involving cyber physical cyberphysical dimensions.organisational aspect security convergence focuses extent organisations internal structure capable adequately addressing converged security risks.according cybersecurity infrastructure security agency physical security cybersecurity divisions often still treated separate entities.security leaders operate siloes lack holistic view security threats targeting enterprise.
|
Security convergence
|
result attacks likely occur.many conventional physical information security risks viewed isolation states pricewaterhousecoopers document convergence security risks.risks may converge overlap specific points risk lifecycle could become blind spot organisation individuals responsible risk management.in survey senior physical security cybersecurity disaster management business continuity professionals asis foundation study state security convergence united states europe india found despite “years predictions inevitability security convergence percent respondents converged physical cybersecurity functions.” survey also found percent organisations converged two security functions reported positive results convergence percent reporting convergence strengthened overall security.overall percent surveyed believed convergence would strengthen overall security function.citing work jay wright forrester systems thinking optic security group ceo jason cherrington argues system systems approach provides useful lens understanding security subgroups within organisation contribute organisations overall security goals.ideal sos world organisations would see security collection taskoriented dedicated systems pool resources capabilities together part overall system offering functionality performance sum parts.
|
Security convergence
|
importantly oversight overall system would ensure gaps component systems identified failures avoided.solutions convergence unified security increasing prevalence hybridised cyberphysical security threats driven parallel emergence range converged security solutions cover cyber physical domains.according jason cherrington contemporary security threats we’re seeing convergence physical digital vectors protection hybridised threats requires hybridised approach.according united states cybersecurity infrastructure security agency organizations converged cybersecurity physical security functions resilient better prepared identify prevent mitigate respond threats.convergence also encourages information sharing developing unified security policies across security divisions.
|
PH
|
bibliography anderson k. convergence holistic approach risk management network security elsevier ltd. volume issue may .anderson k. security professionals must evolve changing market sc magazine october .references external links alliance enterprise security risk managementacidic solutions solutions higher concentrations h ions measured lower ph values basic alkaline solutions.the ph scale logarithmic inversely indicates concentration hydrogen ions solution.ph − log h − log h displaystyle ce phlogace hlogce hce mol dm.°c solutions ph less acidic solutions ph greater basic.solutions ph temperature neutral e.g.pure water.
|
PH
|
neutral value ph depends temperature – lower temperature increases °c.ph value less concentrated strong acids greater concentrated strong bases.the ph scale traceable set standard solutions whose ph established international agreement.primary ph standard values determined using concentration cell transference measuring potential difference hydrogen electrode standard electrode silver chloride electrode.ph aqueous solutions measured glass electrode ph meter colorchanging indicator.measurements ph important chemistry agronomy medicine water treatment many applications.
|
PH
|
history concept ph first introduced danish chemist søren peder lauritz sørensen carlsberg laboratory revised modern ph accommodate definitions measurements terms electrochemical cells.first papers notation h• subscript lowercase p thus ph•.for sign p propose name hydrogen ion exponent symbol ph•.hydrogen ion exponent ph• solution negative value briggsian logarithm related hydrogen ion normality factor understood.the exact meaning letter p ph disputed sørensen explain used it.sørensen describes way measuring ph using potential differences represents negative power concentration hydrogen ions.letter p could stand french puissance german potenz danish potens meaning power could mean potential.
|
PH
|
words start letter p french german danish—all languages sørensen published carlsberg laboratory frenchspeaking german dominant language scientific publishing sørensen danish.also used letter q much way elsewhere paper.might also labelled test solution p reference solution q arbitrarily letters often paired.little support suggestion ph stands latin terms pondus hydrogenii quantity hydrogen potentia hydrogenii power hydrogen.currently chemistry p stands decimal cologarithm also used term pka used acid dissociation constants poh equivalent hydroxide ions.bacteriologist alice c. evans famed works influence dairying food safety credited william mansfield clark colleagues one developing ph measuring methods wide influence laboratory industrial use thereafter.memoir mention much little clark colleagues knew sørensens work years prior.
|
PH
|
said studies bacterial metabolism dr. clarks attention directed effect acid growth bacteria.found intensity acid terms hydrogenion concentration affects growth.existing methods measuring acidity determined quantity intensity acid.next collaborators dr. clark developed accurate methods measuring hydrogenion concentration.methods replaced inaccurate titration method determining acid content use biologic laboratories throughout world.
|
PH
|
also found applicable many industrial processes came wide usage.first electronic method measuring ph invented arnold orville beckman professor california institute technology .response local citrus grower sunkist wanted better method quickly testing ph lemons picking nearby orchards.definition measurement ph ph defined decimal logarithm reciprocal hydrogen ion activity ah solution.ph − log h log h displaystyle ce phlog ace hlog leftfrac ace hright example solution hydrogen ion activity ×− level essentially number moles hydrogen ions per litre solution argument logarithm ×− × thus solution ph log× .. consider following example quantity moles pure ph water metric tonnes × g contains close g dissociated hydrogen ions.note ph depends temperature.
|
PH
|
instance °c ph pure water .. °c .°c ..this definition adopted ionselective electrodes used measure ph respond activity.ideally electrode potential e follows nernst equation hydrogen ion written e e r f ln h e − .r f ph displaystyle eefrac rtflnace hefrac .rtfce ph e measured potential e standard electrode potential r gas constant temperature kelvins f faraday constant.h number electrons transferred one.
|
PH
|
follows electrode potential proportional ph ph defined terms activity.precise measurement ph presented international standard iso follows galvanic cell set measure electromotive force e.m.f.reference electrode electrode sensitive hydrogen ion activity immersed aqueous solution.reference electrode may silver chloride electrode calomel electrode.hydrogenion selective electrode standard hydrogen electrode.reference electrode concentrated solution kcl test solution h ptfirstly cell filled solution known hydrogen ion activity emf es measured.
|
PH
|
emf ex cell containing solution unknown ph measured.ph x ph e − e x z displaystyle ce phxce phsfrac ece sece xz difference two measured emf values proportional ph.method calibration avoids need know standard electrode potential.proportionality constant z ideally equal .r f displaystyle frac .rtf nernstian slope.to apply process practice glass electrode used rather cumbersome hydrogen electrode.
|
PH
|
combined glass electrode inbuilt reference electrode.calibrated buffer solutions known hydrogen ion activity.iupac international union pure applied chemistry proposed use set buffer solutions known h activity.two buffer solutions used order accommodate fact slope may differ slightly ideal.implement approach calibration electrode first immersed standard solution reading ph meter adjusted equal standard buffers value.
|
PH
|
reading second standard buffer solution adjusted using slope control equal ph solution.details given iupac recommendations.two buffer solutions used electrode calibrated fitting observed ph values straight line respect standard buffer values.commercial standard buffer solutions usually come information value °c correction factor applied temperatures.the ph scale logarithmic therefore ph dimensionless quantity.ph original definition sørensen superseded favor ph .
|
PH
|
h concentration hydrogen ions denoted h modern chemistry appears units concentration.correctly thermodynamic activity h dilute solution replaced hc standard state concentration c moll.ratio pure number whose logarithm defined.however possible measure concentration hydrogen ions directly electrode calibrated terms hydrogen ion concentrations.one way used extensively titrate solution known concentration strong acid solution known concentration strong alkaline presence relatively high concentration background electrolyte.
|
PH
|
since concentrations acid alkaline known easy calculate concentration hydrogen ions measured potential correlated concentrations.calibration usually carried using gran plot.thus effect using procedure make activity equal numerical value concentration.the glass electrode ion selective electrodes calibrated medium similar one investigated.instance one wishes measure ph seawater sample electrode calibrated solution resembling seawater chemical composition detailed below.the difference ph ph quite small.stated ph ph .. common practice use term ph types measurement.
|
PH
|
ph indicators indicators may used measure ph making use fact color changes ph.visual comparison color test solution standard color chart provides means measure ph accurate nearest whole number.precise measurements possible color measured spectrophotometrically using colorimeter spectrophotometer.universal indicator consists mixture indicators continuous color change ph ph .universal indicator paper made absorbent paper impregnated universal indicator.another method measuring ph using electronic ph meter.
|
PH
|
poh poh sometimes used measure concentration hydroxide ions oh−.poh values derived ph measurements.concentration hydroxide ions water related concentration hydrogen ions oh − k w h displaystyle ce ohfrac kce wce h kw selfionization constant water.taking logarithms poh p k w − ph displaystyle ce pohce pkce wce ph room temperature poh ≈ − ph.however relationship strictly valid circumstances measurements soil alkalinity.
|
PH
|
extremes ph measurement ph .ca..mol dm− acid .ca.
|
PH
|
.mol dm− alkaline requires special procedures using glass electrode nernst law breaks conditions.various factors contribute this.cannot assumed liquid junction potentials independent ph.also extreme ph implies solution concentrated electrode potentials affected ionic strength variation.
|
PH
|
high ph glass electrode may affected alkaline error electrode becomes sensitive concentration cations na k solution.specially constructed electrodes available partly overcome problems.runoff mines mine tailings produce low ph values.nonaqueous solutions hydrogen ion concentrations activities measured nonaqueous solvents.ph values based measurements belong different scale aqueous ph values activities relate different standard states.hydrogen ion activity ah defined h exp μ h − μ h ⊖ r displaystyle ace hexp leftfrac mu ce hmu ce hominus rtright μh chemical potential hydrogen ion μ h ⊖ displaystyle mu ce hominus chemical potential chosen standard state r gas constant thermodynamic temperature.
|
PH
|
therefore ph values different scales cannot compared directly due different solvated proton ions lyonium ions requiring intersolvent scale involves transfer activity coefficient hydroniumlyonium ion.ph example acidity function.acidity functions defined.example hammett acidity function h developed connection superacids.unified absolute ph scale new unified absolute ph scale proposed would allow various ph ranges across different solutions use common proton reference standard.developed basis absolute chemical potential proton.
|
PH
|
model uses lewis acid–base definition.scale applies liquids gases even solids.applications pure water neutral.acid dissolved water ph less °c.base alkali dissolved water ph greater .
|
PH
|
solution strong acid hydrochloric acid concentration mol dm− ph .solution strong alkali sodium hydroxide concentration mol dm− ph .thus measured ph values lie mostly range though negative ph values values entirely possible.since ph logarithmic scale difference one ph unit equivalent tenfold difference hydrogen ion concentration.the ph neutrality exactly °c although good approximation cases.neutrality defined condition h oh− activities equal.
|
PH
|
since selfionization water holds product concentration hm×oh−m kw seen neutrality hm oh−m √kw ph pkw.pkw approximately depends ionic strength temperature ph neutrality also.pure water solution nacl pure water neutral since dissociation water produces equal numbers ions.however ph neutral nacl solution slightly different neutral pure water hydrogen hydroxide ions activity dependent ionic strength kw varies ionic strength.if pure water exposed air becomes mildly acidic.water absorbs carbon dioxide air slowly converted bicarbonate hydrogen ions essentially creating carbonic acid.co ho ⇌ hco− h ph soil classification soil ph ranges united states department agriculture natural resources conservation service formerly soil conservation service classifies soil ph ranges followsin europe topsoil ph influenced soil parent material erosional effects climate vegetation.
|
PH
|
recent map topsoil ph europe shows alkaline soils mediterranean hungary east romania north france.scandinavian countries portugal poland north germany acid soils.measuring soil ph soil field heterogeneous colloidal system comprises sand silt clays microorganisms plant roots myriad living cells decaying organic material.soil ph master variable affects myriad processes properties interest soil environmental scientists farmers engineers.quantify concentration h complex system soil samples given soil horizon brought laboratory homogenized sieved sometimes dried prior analysis.
|
PH
|
mass soil e.g.g fieldmoist best represent field conditions mixed slurry distilled water .cacl e.g.ml.mixing well suspension stirred vigorously allowed stand – minutes time sand silt particles settle clays colloids remain suspended overlying water known aqueous phase.
|
PH
|
ph electrode connected ph meter calibrated buffered solutions known ph e.g.ph inserting upper portion aqueous phase ph measured.combination ph electrode incorporates h sensing electrode glass electrode reference electrode provides phinsensitive reference voltage salt bridge hydrogen electrode.configurations glass reference electrodes separate attach ph meter two ports.ph meter measures potential voltage difference two electrodes converts ph.
|
PH
|
separate reference electrode usually calomel electrode silversilver chloride electrode used combination electrode.there numerous uncertainties operationally defining soil ph way.since electrical potential difference glass reference electrodes measured activity h really quantified rather concentration.h activity sometimes called effective h concentration directly related chemical potential proton ability chemical electrical work soil solution equilibrium solid phases.clay organic matter particles carry negative charge surfaces h ions attracted equilibrium h ions soil solution.measured ph quantified aqueous phase definition value obtained affected presence nature soil colloids ionic strength aqueous phase.
|
PH
|
changing watertosoil ratio slurry change ph disturbing watercolloid equilibrium particularly ionic strength.use .cacl instead water obviates effect watertosoil ratio gives consistent approximation soil ph relates plant root growth rhizosphere microbial activity drainage water acidity chemical processes soil.using .cacl brings soluble ions aqueous phase closer colloidal surfaces allows h activity measured closer them.
|
PH
|
using .cacl solution thereby allows consistent quantitative estimation h activity especially diverse soil samples compared space time.ph nature phdependent plant pigments used ph indicators occur many plants including hibiscus red cabbage anthocyanin grapes red wine.juice citrus fruits acidic mainly contains citric acid.carboxylic acids occur many living systems.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.