1,370 search results

Molecular Science: Spectrometry
Science, Maths & Technology

Molecular Science: Spectrometry

...and mass spectrometry. This material is taken from The Open University course S205 The molecular world... Molecular Science: Spectrometry A short introduction to this album. Infra-red Spectrometry Preparing samples for infra-red spectroscopy Nuclear Magnetic Resonance Preparing samples for 1H and 13C nmr spectroscopy Mass Spectrometry Analysis by mass spectrometry...
Why was the Systems Thinking in Practice hub created?
Society, Politics & Law

Why was the Systems Thinking in Practice hub created?

...Analysis for Addressing Global Policy Challenges in the 21st Century, while the UK’s Institute for Apprenticeships has approved a standard for a Systems Thinking Practitioner who ‘supports decision-makers in strategic and leadership roles to understand and address complex and sometimes even ‘wicked’ problems through provision of expert systemic analysis, advice...
Flowery meadows and high tech surveying equipment
Nature & Environment

Flowery meadows and high tech surveying equipment

...analysis of soil and hay, well you will have to wait until at least the autumn for all the data to be typed in and analysed. Just by eye some of the sites looked rather different to normal but this may have been more to do with the lack of a hay cut rather than the water from summer flood itself. [Botanical surveyors [image by Mike Dodd © copyright Mike Dodd]] Botanical...
Software and the law
Science, Maths & Technology

Software and the law

...data are extremely easy to copy and distribute – which is sometimes beneficial, since this enlarges the community of practice for that software or information, and the community within which data can be exchanged. One way to ensure excludability is to use technical measures, like encryption and licence codes, along with the internet to check that people are properly...
Level 3: Advanced 8 hrs
Spectre and Meltdown: What do you need to know about the chip security flaws?
Digital & Computing

Spectre and Meltdown: What do you need to know about the chip security flaws?

...data including passwords stolen. The cloud servers that store websites and other internet data are also at risk. This is one of the biggest cyber security vulnerabilities we’re ever seen in terms of the potential impact to personal, business and infrastructure computer systems. What’s more, because the flaw is located in such a fundamental part of the computer,...
Customer Service: Expert's Corner with Professor Sally Dibb
Money & Business

Customer Service: Expert's Corner with Professor Sally Dibb

...data about these customers and managing relationships with them. The aim of CRM is to maintain the ongoing interest and support of the most worthwhile and valuable customers in the target segments that the organisation is prioritising. CRM databases build up knowledge of individual customers’ characteristics and buying behaviour, using these insights to tailor the...
Information security
Science, Maths & Technology

Information security

...data. The value of information springs from the ways it is interpreted and applied to make products – like Coca-Cola – and to provide services – like Facebook does for its advertisers. As we have seen, and supported by academic writers such as Itami and Roehl (1987), the true value of an organisation is in the information it uses and creates. Activity 3: You and...
Level 3: Advanced 10 hrs
Learning from major cyber security incidents
Digital & Computing

Learning from major cyber security incidents

...analysis carried out by Colin Tankard, managing director of a data security company, here is a summary of what went wrong and how the attack could have been prevented (Tankard, 2015): The three web pages that were vulnerable to SQLi were inherited from Tiscali when TalkTalk took over its UK business in 2009 (ICO, 2016). According to the ICO’s investigation, TalkTalk did...