Join our network of non-profits, companies and individuals who believe social change can happen through design.

Become A Member
avatar

xever eneas

Spain

encoder

Member since April 10, 2013


  • http://crowncapitalmngt.com/

    To die for scenic reefs in Red or the South China Sea is dying; pretty fishes and panoramic colors of soft and hard corals are now down to a complex ecology similar to tropical forest ecosystems. Compare to the microorganisms that makes the whole thing more tremendous in doing all the destruction, the predators and consumers, the producer algae and the tiny invertebrates mean nothing. Catalina Reyes of CoECRS. (Centre of Excellence for Coral Reef Studies) and the University of Queensland has published her work alongside 4 colleagues, on the bacteria, fungi and algae that live in this most complex marine ecosystem. The change in this ecosystem recently is because of our overproduction. Oceans now are Cola like, the CO2 we made over the last century or two has made the sea water to feel like one. As to Catalina’s research, the acid has effects and that are clearly identifies in the micro-world of corals. She links it all up and explained, “So fish, turtles, sharks, lobsters and other reef organisms may lose their homes, threatening coral reef biodiversity and the livelihoods of tens of millions of people.” All reefs, molluscs and others are basically made up of Calcium carbonate, accepted as true to hard corals as well. Due to different reasons erosion of the reef is just a normal phenomenon but at present the erosion has become excessive that it destroys the reefs worldwide at a really disturbing rate. The well equilibrium of attrition, storm dama...

  • http://www.thecrownmanagement.com/

    By Alexei Alexis

    With sophisticated cyber attacks on the rise, firms are increasingly having to decide whether to take aggressive self-defense measures in a legal environment that is both complex and uncertain, attorneys and consultants told BNA.

    At issue are “active defense” tactics that may involve such steps as “hacking back” to locate stolen computer files and, in extreme cases, attempting to take down the network of an identified attacker.

    “Until recently, there has not been much discussion about self-defense in cyber space,” Peter McLaughlin, Of Counsel at Morrison & Foerster LLP and co-chair of the American Bar Association's Information Security Committee, said in a BNA interview. “It's a very gray area in which companies must tread very carefully.”

    The issue has become a hot topic within legal and computer security circles, McLaughlin said, adding that the ABA is very interested in providing “thought leadership” in this area.

    “This is basically the wild, wild West of the cyber frontier.” David Bodenheimer, partner, Crowell & Moring LLP The federal Computer Fraud and Abuse Act (CFAA), which prohibits unauthorized access to a computer system, is seen as the primary U.S. statute governing how far companies may go in defending their computer networks. A violator could potentially face federal prosecution or litigation from an aggrieved party. Experts say this can apply both to attackers and to victims ...