News Article | April 24, 2017
Twenty-two artists from Cubberley Artist Studio Program (CASP) working in diverse media, including photography, painting, sculpture, fiber arts, printmaking and mixed media will display their work in consecutive shows RETROFIT 1.0 and RETROFIT 2.0
News Article | October 28, 2016
More than 1MM IT Security positions are now available worldwide. CED Solutions is now providing training on these new IT Certifications in the classroom, virtual online, and IT Self Study. With successful hacking attacks on many corporate and government systems and networks, Security training moves to the front in 2016. With over 1MM IT Security jobs available now as a result, and IT Security salaries rising fast, IT Security is here to stay at the front of IT work. 1. Certified Ethical Hacking/Computer Forensics/Security Analyst/Licensed Penetration Tester. There are two kinds of organizations today, those that know they have been hacked, and those that don’t know they have been hacked. From the highest levels of Government agencies, to the smaller commercial businesses, hackers are stealing secrets every day. Huge numbers of State-sponsored hackers are working tirelessly to obtain your information and turn it over to their own government and businesses to compete in the world stage. China became the #1 GDP country in the world a few months ago, largely from stealing the information on how to make products from organizations around the world and use it for their own use. There are a 1,000 ways to penetrate an organization’s networks, systems, and applications. The new Version 9 of Certified Ethical Hacking provides the information on how hackers work to enter your systems and what tools they use. This knowledge can be used to build your defenses against these attempts. Computer Forensics deals with what hackers found, copied, deleted, moved, etc of your information. This allows you to respond accordingly and better protect your networks with this information. This course and knowledge is needed by Police agencies all over the country to review what hackers have stolen. The new Version 9 of Security Analyst and Licensed Penetration Tester requires rigorous work, knowledge and reporting to learn how to do Vulnerability Assessments and Penetration Testing of networks, hardware, application, and programming. These courses together make up the knowledge base the proficient IT Security Professionals should have. 2. CISSP and CASP Security is one of the major concerns of any organization. With hundreds of thousands of other country state-employed hackers working to obtain your sensitive information, security today is at a high level. Businesses make substantial investments in information assets, including technology, architecture, and processes. These assets are protected on the strengths of the professionals in charge. Industry standards, ethics and certification of IS professionals becomes critical to ensuring that higher standards for security are achieved. Training for the CISSP exam covers all ten domains of the Common Body of Knowledge. This course should be attended by network and firewall administrators, information security officers, and anyone interested in understanding the principles, best practices, and core concepts of information systems security. CompTIA CASP The CompTIA Advanced Security Practitioner (CASP) Certification is a vendor-neutral credential. The CASP exam is an internationally targeted validation of advanced-level security skills and knowledge. While there is no required prerequisite, the CASP certification is intended to follow CompTIA Security+ or equivalent experience and has a technical, “hands-on” focus at the enterprise level. While the CISSP is primarily theory, the CASP is a hands-on approach. 3. Windows 10 Desktop Security starts with the correct installation, management, and maintenance of the Desktop Operating System. The correct use, oversight, remote management of this Operating System is the first place to begin Security policy. Incorrect installation could leave security holes that can be easily penetrated. These courses are intended for IT professionals who administer and support Windows 10 desktops, devices, users, and associated network and security resources. Students who seek certification in the 70-697 Windows 10 Configuring exam will also benefit from this course. This course is also intended to provide skills for Enterprise Desktop/Device Support Technicians (EDSTs) who provide Tier 2 support to users who run Windows 10 desktops and devices within a Windows domain environment in medium to large enterprise organizations. 4. CCNA, CCNA: Security, CCNP: Security Certifications The access to networks and systems is through routers and switches and Cisco provides the majority of that access. Your networks and systems need to be protected with the latest equipment and techniques. The CCNA course provides the introduction to Routers and Switches and is required for all higher level courses that follow. For the Security Professionals, the Cisco CCNA: Security is the next step. CCNA Security Certification meets the needs of IT professionals who are responsible for network security. It confirms an individual’s skills for job roles such as Network Security Specialists, Security Administrators, and Network Security Support Engineers. This certification validates skills including installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices and develops competency in the technologies that Cisco uses in its security structure. Cisco CCNP Security is one of the keys to the IT Security Professional’s career. CCNP: Security knowledge is the way to ensure Network Security Engineers have the practical skills needed to deploy, service, maintain, and support Cisco network security solutions. CCNP Security delivers the practical skills needed to enforce cybersecurity performance, gain high quality security service levels, and meet compliance mandates. 5. MCSA/MCSE: Windows 2012 Server Security is one of the major concerns of any organization. With hundreds of thousands of other country state-employed hackers working to obtain your sensitive information, security today is at a high level. Businesses make substantial investments in information assets, including technology, architecture, and processes. These assets are protected on the strengths of the professionals in charge. Industry standards, ethics and certification of IS professionals becomes critical to ensuring that higher standards for security are achieved. Training for the CISSP exam covers all ten domains of the Common Body of Knowledge. This course should be attended by network and firewall administrators, information security officers, and anyone interested in understanding the principles, best practices, and core concepts of information systems security. CompTIA CASP The CompTIA Advanced Security Practitioner (CASP) Certification is a vendor-neutral credential. The CASP exam is an internationally targeted validation of advanced-level security skills and knowledge. While there is no required prerequisite, the CASP certification is intended to follow CompTIA Security+ or equivalent experience and has a technical, “hands-on” focus at the enterprise level. While the CISSP is primarily theory, the CASP has a more hands-on approach. 6. MCSA: SQL Server 2014 Most of the important data of organizations is contained in databases. Whether this data is maintained in the Cloud, on premise, or both, how is this data properly installed, managed, and maintained including all of the related Security aspects of the information. If the data is in the Cloud, can it be downloaded, by whom, and under what circumstances? As the business conducted on the internet continues to grow at a faster pace than brick-and-mortar retail locations, the potential to do this business lies in the ability to implement, manage and maintain large databases. Millions of websites provide the opportunity to find products through proper usage and installation of this database, a powerful scalable reliable engine for business success. 7. VMware VMware vSphere: Install, Configure, Manage features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere® 6, which includes VMware ESXi™ 6 and VMware vCenter Server™ 6. This course prepares you to administer a vSphere infrastructure for an organization of any size and forms the foundation for most other VMware technologies in the software-defined data center. 8. CompTIA A+, Network+, Security+ As an example of the importance of these courses, they are required by the Department of Defense in Directive 8570 for all IT employees and contractors. These foundation level courses provide the hard facts on how systems work in a network, and how to be aware of Security implications with port access, routers, cards, etc. Without this knowledge, you may be guessing as to how DNS, subnetting and other aspects of the LAN/WAN work properly. CompTIA A+ certification is the one you need to take if your job responsibilities include entry-level computer service technician support duties and the support of computers running the Windows desktop operating systems. Network+ covers exactly how Networks work including DNS & Subnetting. Security+ provides the signficant information on how to be aware of and set proper security settings on your systems. CED Solutions is a Cisco Learning Partner, Microsoft Gold Learning Partner and the #1 location for Microsoft Certifications in North America for the last 6 years combined. CED Solutions is a CompTIA Partner, EC Council Partner, and many others and is one of the largest providers of training in North America. The Atlanta facility provides IT training for up to 300 students per day, with separate buildings dedicated to training. CED Solutions provides training for up to 10,000 students per year and students take up to 800 certification exams every two weeks.
Le Heron D.P.,Royal Holloway, University of London |
Armstrong H.A.,Durham University |
Wilson C.,Durham University |
Howard J.P.,CASP |
Gindre L.,ASA Research
Sedimentary Geology | Year: 2010
Detailed outcrop studies at the flanks of Al Kufrah Basin, Libya, reveal the nature of glacially-related sedimentation and post-depositional deformation styles produced in association with the Late Ordovician glaciation, during which ice sheets expanded northward over North Africa to deposit the Mamuniyat Formation. At the SE basin flank (Jabal Azbah), the Mamuniyat Formation is sand-dominated, and incises interfingering braidplain and shallow marine deposits of the Hawaz Formation. The glacially-related sediments include intercalations of mud-chip bearing tabular sandstones and intraformational conglomerates, which are interpreted as turbidite and debrite facies respectively. These record aggradation of an extensive sediment wedge in front of a stable former ice margin. An increase in mudstone content northward is accompanied by the occurrence of more evolved turbidites. A widespread surface, bearing streamlined NW-SE striking ridges and grooves, punctuates this succession. The structures on the surface are interpreted to have formed during a regional north-westward ice advance. Above, siltstones bearing Arthrophycus burrows, and Orthocone-bearing sandstones beneath tidal bars testify to glaciomarine conditions for deposition of the underflow deposits beneath. By contrast, the northern basin margin (Jabal az-Zalmah) is appreciably different in recording shallower water/paralic sedimentation styles and major glaciotectonic deformation features, although facies analysis also reveals northward deepening. Here, a siltstone wedging from 8 to 50m toward the north was deposited (lower delta plain), succeeded by climbing ripple cross-laminated sandstones up to 60m in thickness (distal through proximal delta mouth bar deposits) with occasional diamictite interbeds. These rocks are deformed by thrusts and >50m amplitude fault-propagation folds, the deformation locally sealed by a diamictite then overlain by conglomeratic lag during ultimate deglaciation. Integrating observations from both basin margins, a model of fluvial-dominated delta systems feeding a pulsed debrite and turbidite fan system in a shallow proglacial shelf is proposed. © 2009 Elsevier B.V.
Schneider S.,CASP |
Skupien P.,VSB - Technical University of Ostrava
Bulletin of Geosciences | Year: 2015
The early rudist bivalve Valletia antiqua Favre in Joukowsky & Favre, 1913 is recorded for the first time from the Tithonian to Berriasian Štramberk Limestone (northeastern Czech Republic) and Ernstbrunn Limestone (Lower Austria). The species is re-described and its spatial distribution and stratigraphical range are outlined. Furthermore, the palaeoecology of Valletia antiqua is discussed in the light of novel data on palaeocommunities and microfacies, habitat selection and intraspecific competition for settling space among juveniles. The study is supplemented with a commented list of all nominal species that have been assigned to Valletia, including data on type localities, type strata, and distribution. © 2015, Czech Geological Survey. All rights reserved.
Benson R.B.J.,University of Cambridge |
Ketchum H.F.,University of Cambridge |
Noe L.F.,Thinktank Birmingham Science Museum |
Noe L.F.,University of Birmingham |
Palaeontology | Year: 2011
Abstract: An almost complete, three-dimensionally preserved plesiosaurian from the Hildoceras bifrons Zone of the Alum Shale Member (Whitby Limestone Formation; Lower Toarcian) of Yorkshire, UK, is described in detail. This represents a new species of Hauffiosaurus, H. tomistomimus, distinguished from H. zanoni (Harpoceras serpentinum Zone, Lower Toarcian, Germany) by the proportionally shorter neck and strongly concave preaxial margin of the tibia. It differs from H. longirostris (previously 'Macroplata'longirostris; Har. serpentinum Zone, Yorkshire) by the absence of prominent midline ridges on the dorsal surface of the premaxillae and ventral surface of the mandibular symphysis, and the absence of midline pterygoid contact ventral to the basioccipital. Several synapomorphies support a monophyletic Hauffiosaurus: broad longitudinal troughs occupy the dorsolateral surface of the maxilla and the posterior half of the lateral surface of the dentary; basicranial fontanelle bounded laterally by posterolaterally elongate projections of an undetermined ossification; and the neural arch contacts the rib facet in all postaxial cervical vertebrae. However, the systematic position of Hauffiosaurus, as a pliosauroid or basal plesiosauroid, remains uncertain. There is little evidence for geographic differentiation of Lower Toarcian plesiosaurian faunas in the United Kingdom and Germany as minor differences between abundant taxa may arise from temporal offset of fossils from these regions, and marked taxonomic differences are confined to rare taxa whose absence in one or other area may be attributable to incomplete sampling. Lack of consensus on the relationships of Lower Jurassic plesiosaurians requires further detailed description of Lower Jurassic taxa. © The Palaeontological Association.
Carriol R.-P.,French Natural History Museum |
Annales de Paleontologie | Year: 2016
Two new species of cirripedes are described from mid Burdigalian (Ottnangian) deposits in Lower Bavaria (Germany) and Upper Austria. A third species, "Arcoscalpellumg" sp., is left in open nomenclature. Scillaelepas danningeri sp. nov. is the seventh extinct species belonging to the genus Scillaelepas. It is characterized by: A tergum with the occludent margin much longer than the upper carinal margin and internally with the apical part raised and marked by growth-lines cut by fine radial striae; a scutum externally with the tergal surface marked by a groove, with or without ridges, radiating from the apex. Conopea bacata sp. nov. is the sixth fossil species belonging to the genus Conopea and one of the oldest. This species is characterized by its shell with growth ridges beaded. In addition, Paractinobalanus moronii Carriol, 2008 is assigned to Conopea Say. © 2016 Elsevier Masson SAS.
Le Heron D.P.,Royal Holloway, University of London |
Sedimentary Geology | Year: 2012
Field studies in the Jabel az-Zalmah region, at the northern flank of Al Kufrah Basin provide new insights into the stratigraphy and evolving depositional environments of Cambro-Ordovician through Devonian sediments. At the base of the succession, the Hawaz Formation is about 300. m thick and is characterised by frequently Skolithos-burrowed, fine to medium grained sandstones with occasional silty intervals and rare conglomerates deposited in a generally high-energy tidal shelf setting. Bioturbation is pervasive, and includes spectacular Cruziana traces produced by Early to Mid Ordovician trilobites at the bottom and the top of the Hawaz Formation respectively. These strata were incised during the late Ordovician (Hirnantian) glaciation. Ice sheets flowing over Jabel az-Zalmah cut a palaeo-topography of up to 100. m relief. This relief is overlain by a coarsening upward succession of clastic sedimentary rocks, recording re-advance of an ice sheet, which overrode the uppermost sandstones. Ice sheet retreat was accompanied by marine transgression and erosion, which left a thin transgressive lag-conglomerate, capped sharply by siltstones of the Tannezuft Formation. Progradation resumed after post-glacial maximum flooding, depositing tide, storm, and river-influenced parasequences of a major delta complex (200. m thick Acacus Formation). Fluvial incision, and the development of a disconformity, preceded the deposition of the Tadrart Formation (50. m thick), a succession of trough-cross bedded braided river deposits. Transgression, and the re-establishment of shallow or marginal marine systems, is represented by the extensively bioturbated Binem Formation in which Zoophycos burrows offer a tentative Middle Devonian stratigraphic fix. An understanding of the lithological character of the Lower Palaeozoic strata in Jabel az-Zalmah, together with the character of unconformities that punctuate the succession, will be vital for successful hydrocarbon exploration in this frontier basin which has, until now, been unsuccessful. © 2011 Elsevier B.V.
Le Heron D.P.,Royal Holloway, University of London |
Journal of African Earth Sciences | Year: 2010
Fieldwork at the flanks of Al Kufrah Basin, Libya, reveals that Late Ordovician ice sheets were present in the eastern Sahara and that they extended northeastward toward Egypt. Evidence for grounded ice sheets is preserved at the both the southeastern (Jabal Azbah) and northern (Jabal az-Zalmah) basin margins. Characteristic soft-sediment deformation structures, including soft-sediment folds, small-scale faults and striated pavements indicate subglacial shearing and the formation of glacial erosion surfaces. These findings support the presence of a Late Ordovician ice margin in the eastern Sahara and add vital new constraints to reconstructions of the morphology of North African grounded ice sheets. Prior to our study, there existed two plausible models on ice sheet geometry. The first was that separate ice sheets - namely a north and west African ice sheet and an Arabian ice sheet - extended over this part of western North Gondwana. The second was that ice cover was continuous. The presence of a suite of subglacially-generated deformation structures adds considerable credence to the latter interpretation. © 2010 Elsevier Ltd.
Neues Jahrbuch fur Geologie und Palaontologie - Abhandlungen | Year: 2015
The Late Jurassic (Late Oxfordian) Diceratidae and Epidiceratidae (Bivalvia: Hippuritida) from the Korallenoolith Formation at Salzhemmendorf south of Hanover (northern Germany) are revised. Due to poor preservation of the material, the species names Diceras koeneni Dubbers, 1888 and Diceras gracile Dubbers, 1888, established on the re-studied material, are regarded as nomina dubia. The specimens are assigned to the genera Diceras, Epidiceras and Plesiodiceras. For all three genera the occurrence at Salzhemmendorf constitutes their northernmost record. The rudist faunal community suggests a largely tropical to subtropical environment. Palaeoclimate and facies are thought to have restricted further expansion of the Diceratidae and Epidiceratidae towards the north. © 2015 E. Schweizerbart'sche Verlagsbuchhandlung, Stuttgart, Germany.
News Article | October 12, 2016
"We are developing solar concentrators that will harvest sunlight from building windows and turn it into electricity, using quantum-dot based luminescent solar concentrators," said lead scientist Victor Klimov. Klimov leads the Los Alamos Center for Advanced Solar Photophysics (CASP). Luminescent solar concentrators (LSCs) are light-management devices that can serve as large-area sunlight collectors for photovoltaic cells. An LSC consists of a slab of transparent glass or plastic impregnated or coated with highly emissive fluorophores. After absorbing solar light shining onto a larger-area face of the slab, LSC fluorophores re-emit photons at a lower energy and these photons are guided by total internal reflection to the device edges where they are collected by photovoltaic cells. At Los Alamos, researchers expand the options for energy production while minimizing the impact on the environment, supporting the Laboratory mission to strengthen energy security for the nation. In the Nature Energy paper, the team reports on large LSC windows created using the "doctor-blade" technique for depositing thin layers of a dot/polymer composite on top of commercial large-area glass slabs. The "doctor-blade" technique comes from the world of printing and uses a blade to wipe excess liquid material such as ink from a surface, leaving a thin, highly uniform film behind. "The quantum dots used in LSC devices have been specially designed for the optimal performance as LSC fluorophores and to exhibit good compatibility with the polymer material that holds them on the surface of the window," Klimov noted. LSCs use colloidal quantum dots to collect light because they have properties such as widely tunable absorption and emission spectra, nearly 100 percent emission efficiencies, and high photostability (they don't break down in sunlight). If the cost of an LSC is much lower than that of a photovoltaic cell of comparable surface area and the LSC efficiency is sufficiently high, then it is possible to considerably reduce the cost of producing solar electricity, Klimov said. "Semitransparent LSCs can also enable new types of devices such as solar or photovoltaic windows that could turn presently passive building facades into power generation units." The quantum dots used in this study are semiconductor spheres with a core of one material and a shell of another. Their absorption and emission spectra can be tuned almost independently by varying the size and/or composition of the core and the shell. This allows the emission spectrum to be tuned by the parameters of the dot's core to below the onset of strong optical absorption, which is itself tuned by the parameters of the dot's shell. As a result, loss of light due to self-absorption is greatly reduced. "This tunability is the key property of these specially designed quantum dots that allows for record-size, high-performance LSC devices," Klimov said. The paper is "Doctor-blade deposition of quantum dots onto standard window glass for low-loss large-area luminescent solar concentrators," publishing this week in Nature Energy. The "LSC quantum dots" were synthesized by Jaehoon Lim (a postdoctoral research associate). Hongbo Li (postdoctoral research associate), and Kaifeng Wu (postdoctoral Director's Fellow) developed the procedures for encapsulating quantum dots into polymer matrices and their deposition onto glass slabs by doctor-blading. Hyung-Jun Song (postdoctoral research associate) fabricated prototypes of complete LSC-solar-cell devices and characterized them. More information: Hongbo Li et al. Doctor-blade deposition of quantum dots onto standard window glass for low-loss large-area luminescent solar concentrators, Nature Energy (2016). DOI: 10.1038/nenergy.2016.157