1,381 search results

What is ‘woman’s work’?
Money & Business

What is ‘woman’s work’?

...analysis will focus on understanding whether the perceptions of work–family interface are constructed as conflicts and/or whether they are also viewed as opportunities for professional and personal enrichment. In exploring these experiences of work–family interface the chapter will also discuss the specific factors that affect the balance between work and life. Read...
Could you be a code breaker?
Science, Maths & Technology

Could you be a code breaker?

...analysis). Earn stars for each challenge, and learn about code-breaking through the ages by playing our interactive ‘Could you be a code breaker?’ [Front image capture for the game 'CODE BREAK'] Click on the image above to start playing CODE BREAK. Instructions For best results, use a modern web browser. Upgrade to the latest version of Internet Explorer or try a free...
Molecular Science: Spectrometry
Science, Maths & Technology

Molecular Science: Spectrometry

...and mass spectrometry. This material is taken from The Open University course S205 The molecular world... Molecular Science: Spectrometry A short introduction to this album. Infra-red Spectrometry Preparing samples for infra-red spectroscopy Nuclear Magnetic Resonance Preparing samples for 1H and 13C nmr spectroscopy Mass Spectrometry Analysis by mass spectrometry...
Flowery meadows and high tech surveying equipment
Nature & Environment

Flowery meadows and high tech surveying equipment

...analysis of soil and hay, well you will have to wait until at least the autumn for all the data to be typed in and analysed. Just by eye some of the sites looked rather different to normal but this may have been more to do with the lack of a hay cut rather than the water from summer flood itself. [Botanical surveyors [image by Mike Dodd © copyright Mike Dodd]] Botanical...
Software and the law
Science, Maths & Technology

Software and the law

...data are extremely easy to copy and distribute – which is sometimes beneficial, since this enlarges the community of practice for that software or information, and the community within which data can be exchanged. One way to ensure excludability is to use technical measures, like encryption and licence codes, along with the internet to check that people are properly...
Level 3: Advanced 8 hrs
Spectre and Meltdown: What do you need to know about the chip security flaws?
Digital & Computing

Spectre and Meltdown: What do you need to know about the chip security flaws?

...data including passwords stolen. The cloud servers that store websites and other internet data are also at risk. This is one of the biggest cyber security vulnerabilities we’re ever seen in terms of the potential impact to personal, business and infrastructure computer systems. What’s more, because the flaw is located in such a fundamental part of the computer,...
Information security
Science, Maths & Technology

Information security

...data. The value of information springs from the ways it is interpreted and applied to make products – like Coca-Cola – and to provide services – like Facebook does for its advertisers. As we have seen, and supported by academic writers such as Itami and Roehl (1987), the true value of an organisation is in the information it uses and creates. Activity 3: You and...
Level 3: Advanced 10 hrs
Three weeks in June and one night in November
Society, Politics & Law

Three weeks in June and one night in November

...data and controlled by investment management corporations. Politics moved away from the idea of making society better, and instead became about the prediction and management of risk. Transcript The political narrative, hollowed out by simplification and often intentionally contradiction, took on a surreal aspect. As Curtis is fond of saying, ‘nothing quite made sense...