AKP in Turkey

The recent decision of the Supreme Court of the Republic of Turkey to admit pending a lawsuit against the Party of Justice and Development Party (AKP) has generated discomfort and uncertainty in pro-European circles in Brussels. The Court accuses the AKP of raping the Constitution, violating the principle of secularism, imposed in the twenties of the last century by Mustafa Kemal Ataturk, founder of the modern State. The Eurocrats did not hesitate to predict the onset of a period of serious political instability for the Ottoman country because, according to them, a systemic error. His criticisms were directed against the legal mechanisms devised by the Kemalist establishment to defend the State against the threats of radical groupings. A few mechanisms that served to outlaw the Communist Party, condemn the militants of the Kurdish nationalist movement and containing the first offensive of the radical Islamists, accused of bring the country down the path of dangerous third world adventures. But, what the? accusations against the party led by Prime Minister Erdogan? According to Prosecutor Abdurrahman Yalcinkaya, promoter of the grievance, the staff of the AKP, to which also belongs the current Turkish President Abdulah Gul, is carried out a secret plan to Islamicize the country and turn it into a State governed by Sharia law. The members of the political grouping headed by Erdogan Gul tandem reject accusations of Prosecutor, recalling that the AKP has drafted a package of measures aimed at reconciling the Turkish legislation with the existing legal regulations in the countries of the European Union. Who is right? Who is wrong? It should be noted that the lay sectors of the Ottoman country recently mobilized against the decision to authorize the use of the Islamic headscarf in universities, considering it was a first step towards the introduction of the traditional Muslim attire in government agencies. Fictional or real, the dispute brought out other strangers episodes, carefully muted by the Western press, as the proliferation of alcohol-free zones, the harassment to butcher shops that sell meat products not halal (not compliant with Muslim standards of slaughter of cattle) and, finally, the rumors about the existence and action of a mysterious network extremist accused of carrying out the recent attacks against politicians and liberal intellectuals.

Posted in News | Comments closed

QA Manager Organization

The implementation of systems of quality management under the standards ISO 9000 series is has been spreading exponentially the last two decades in Latin America. It is increasingly common to find organizations with certified quality management systems. The senior management of each organization, promotes their implementation under the hope to have medium-term with more competitive processes, they can generate more revenue, and more satisfied customers. Organizations usually designate a responsible for implantation, usually a professional with expertise in organization and methods and reference standards domain. This person usually prepare a project planning, including the development of procedures, training programs and internal audits prior to the certification.

Started the process, the responsible officer, that from here we’ll call quality Manager, becomes a policeman who tends to be on the staff controlling the preparation and compliance with procedures, reviewing records and its correct application. After a couple of months of hard work, where all the staff feels overwhelmed by demand and permanent control of the QA Manager, the company manages the expected certification of its quality management system. Senior management celebrated intensely and makes all its officials participate. The recognition is extended to individuals who, having not been involved, also receive the benefits of being identified with the organization. The organization generally gives wide publicity to the achievement and creates an environment of constant and unceasing celebration. But after a few days, when it is decreasing the fervor of the celebration, and all the intense work of long ago begins to fall into oblivion, becomes at the same rate before the start of the project. Senior management is frustrated by the results, which are not more than the improvement of the corporate image; and their executives are going to swell the large list of those who think that the management systems are nothing more than marketing for the organization. Why is this happening?, really quality management systems do not bring the benefits that say they bring?, would not be ready really for this type of management? and there are even those who come to think that they chose a very benevolent certifying company.

Electrical Systems

The electrical supply system includes useful elements for the generation, transport and distribution of electric power and the media. This set consists at once of mechanisms of control, safety and protection. It is a system of integrated type as well as having distributed control systems, is regulated by a system of centralized control that enables a rational use of the resources of generation and a quality of service according to users demand, compensating for possible incidents and faults produced. The system requires a centralized economic organization to plan the production and remuneration of the different agents in the market if, as it is currently happening in many cases, there are various companies participating in the activities of generation, distribution and commercialization. Energy is defined as an abstract physical magnitude, linked to the dynamic state of a closed system, and that remains unchanged in time. very low frequency can also be define the power of open systems, which are systems not isolated parts of one larger closed system. Energy is not a real physical state, but a number scale that it is given to the State of the physical system, i.e., the energy is a mathematical abstraction of a property of physical systems.

The use of the magnitude energy in practical terms is justified from that is much easier to work with magnitudes scalar, such as energy, with magnitudes vector, as the speed and position. In this way, the dynamics of a system based on the kinetic, potential energies and other types of components can be fully described. In isolated systems, in addition, the total energy has the property retained, to be invariant over time. Original author and source of the article

Posted in News | Tagged | Comments closed

Access Control

Access control systems are used in companies, government agencies, military establishments and other institutions to safeguard the security of the facilities of the possible attack or violation of privacy by vandals or trespassers. Card access systems are used to prevent admission to areas such as condominiums, offices, depots and other facilities. They also eliminate the common problems of misuse of passwords if lost or stolen. Each access card has a unique number that can be erased from the system if it is lost or is hurtada. Formerly, systems of this type were only present in secret military installations, but currently are often used in airports, buildings, homes and small businesses.

When access is allowed, the person carrying the card is identified in the system and register a series of details that will be saved in a database for three years. These records allow you to know who or who went through the doors. Proximity readers and keychains they are mainly used for access control. The cards can be programmed according to the particular needs of each case. Some limited access to the main entrance during working hours; others protect the security of the server room. They may also appear in elevators, to prevent access to certain floors; in this way, employees are only enabled to enter the floor where they work. Access control systems can be programmed according to ranges of time, giving the user to certain days and times to enter the facilities. The user information is not stored on the card or key fob.

All personal data such as name, address, telephone number and photo are stored in a database. This happens even if you try to use the same card in another building with the same security system. The only one who has the power to handle this kind of data is the database administrator. Only he can decide who allow or prevent access to any particular area. In addition to the card, also there are of keyboard. Users enter a code on a keypad to gain access to a building or a particular area. Electronic keyboards are difficult to tamper with and your access code can be changed. To log entries you can give is to each user a different access code. Another type of cards that are used for access control is the proximity reader. Here, the information is not stored in a magnetic stripe, but in a microchip. This ensures greater safety and less likely to harm than to common access cards. Both types of cards, however, have the advantage of being able to show a photo and other credentials, the guards to facilitate the task of verifying the identity of persons entering the establishment.

Posted in News | Comments closed

Systematic Approach

Happiness and the Rainbow never look at home, only at House of others. Proverb companies increasingly more must prepare to face the changes and the challenges that presents the current trade scenarios, where the management responsible for its operation, requires acting with an objective view within its own organizational culture and according to the characteristics of the current scenarios, making use of the best organizational, financial, technical, human and intangible resources. You can reach it if it serves the advantages of the techniques of formal analysis of decisions, the information that makes available the computer, and therefore, interpretation and management of a comprehensive heuristic system. Consider signs provided by Theodore Levitt, that: must learn from the past apara achieve some progress: while one learns and progresses from the past, there is a risk of employing dogmas that are obsolete for modern times. The point is not if knowledge is transferable, but if they are applicable.

This means that now, much more than in the past, the essential administrative ability is not a good memory to remember principles as it is the usual case in law and medicine, but the ability to determine what is actually the problem and to do that which distinguishes the high Executive. Understanding is much more important to believe in dogmas. Here then, that every candidate to be Manager, or already is in the exercise, consider that an operational definition of management that relates to the concept of administration with a number of observable criteria involves organized activity, objectives, relationships between resources, works through others, decisions, system analysis and evaluation. Consequently, as Alberto Leon says it: Manager works by objectives, by intermediates of others, in an organized environment, estaqblecie4ndo relationships between resources, evaluating and making decisions. It should not be neglected, that achieve good administration has been in all significant time for organizations; However, at present, it is more important than ever, due to the size and the complexity of modern society, to their increasing change and high competitiveness.

Tracking Systems

Tagging and Tracking (finding and tracking) systems are used in many applications in modern life.The most recognizable for the common people are those related with motorways under concession, in which by passing through a portico, the Asset Tag of the vehicle reacts to the RF signal sending information to the portico. These applications implicitly are capable of measuring the speed and location of the mobile phone that carries the tag.However in more rough environment as mining facilities, the incorporation of a Tagging and Tracking application can mean the survival of who carries the Tag.There are two types of Tagging and Tracking applications: the first normal accuracy, which, before the proximity of tag allows you to: identify locate control open doors give notice and protect to prevent involuntary collision in the second application of High Precision large-tonnage machines, enables, combined with appropriate software, deploy in 2D or 3D information in real time the position of subject bearer of the Tag (vehicle or person) with very high accuracy ranges that configure proximity warning systems. It also allows managing the traffic inside an underground mine. If you want to know more detail about this topic visit specialized Sigma Telecom.

Development Tendency

Vibrating feeder (Vibratory feeder) is also named vibrate feeding machine. Vibrating feeder is a kind of feeding equipment with linear direction and is installed in front of the primary crusher. It is used to transfer the large size pipes and granular materials from hopper no desea Recibir device uniformly, periodically and continuously in the production flow and to feed materials into the crusher continuously and uniformly also to screen the materials in the sandstone production line. Vibrating feeder is made of vibrating frame, spring, vibrator, motor vibrating device and motor. The vibrator consists of two fixed eccentric shafts whose gears are jogged. When installation, the two gears must be jogged according to the sign. By drive of the motor, the two eccentric shafts start rotating to generate a linear huge power which forces the feeder to vibrate back and forth.

Through the vibration, the pipes will slip and sling on the funnel, moving forward, when the materials pass the screening part, smaller material will fall down, avoiding the further crushing, so screening purpose is reached. Features and Benefits of vibrating feeder: Smooth vibration, reliable operation and longer service life; Special fence can prevent the block of raw material; Simple structure, reliable work, convenient installation and adjustment, light weight, small volume and easy maintenance; Frequency conversion motor can be equipped to facilitate feeding control, thus frequent startup of motor can be avoided; Lower noise, less power consumption and excellent regulating performance. Vibrating feeder maintenance knowledge: When installation, the two gears must be jogged according to the sign. Anchin Block is open to suggestions. Through drive of the motor, the two eccentric shafts start rotating to produces a linear huge power which forces the feeder to vibrate. Through the vibration, the pipes will slip and sling on the funnel, moving forward, when the materials pass the screening part, smaller parts will fall down, and avoiding the further crushing. The Vibrating Feeder with the advantages of simple structure, convenient operation, no lubricating and low consumption of electricity.

Biometric Clocks

Biometric clocks are used very often in offices, terminals aerial and in many other institutions, due to its efficiency to take care of the security, its precision and its speed. These devices make use of biometrics, which is the new paradigm in the identification process. Biometrics is the science that deals with analyzing and establish the qualities that make different to all human beings. In this way, biometrics has been able to work on factors such as fingerprints, iris or retina patterns, hand geometry and patterns of veins. This type of qualities are called physical, but there are other qualities that are order behavioral such as how to walk, how to write and the manner of speaking. All these qualities are intrinsic to every human being and it is therefore that they can be used in many applications such as security and control. In this way, it is that it has been possible to create a number of developments, including biometric clocks shine with their own light.

To use a biometric clock, the organisation and its staff must go through a workout. This training includes terminology and the study of the basic components of the system. In the course principles, processes, equipment and an introduction are also indicators biometric such as fingers, face, voice, hand and retina. Companies who design and install these technologies, can send personnel to train their clients, even though it also has interactive courses online. Whether with staff or by Internet, the purpose of these trainings is to help incorporate and maintain biometric verification systems. One of the things that most attract attention of people or organizations that adopt these technologies is that biometric clocks can be attached to other systems. Thus, these devices can be connected by Internet or intranet with other systems, to establish very complete control and security systems. Biometric clocks can be connected to the mechanism of a door and as soon as that is the access door is closed automatically.

Most of these devices also have voice commands, telling the user if you can login to a particular site, or if there have been problems with the analysis of your biometric sample. Fingerprint readers are an example of the benefits offered by the biometric systems. With those readers it is possible to set access controls, which are better than conventional ones.

Posted in News | Comments closed

Windows Live Office

As a novelty of the social network more important today Facebook, announced a redesign integral on your tool to create groups (or network marketing.) If this is the case. But the modifications are not only aesthetic, but also represent a change when it comes to sharing content with others. A product built from scratch, coexists with the service as always but has a section to generate the groups himself. In the future, the idea is to migrate the old platform so that everyone can enjoy new features. Its main objective is to recreate the same groups we have in real life, such as co-workers, relatives, classmates, or childhood friends. It’s something that as we did with buddy lists, but the interactions and elements that we published, they were lost among the rest of our activities.

In this case, any group begins to remain private, although there is the possibility of doing so completely secret or public. Although there is an administrator, all members participate in moderation and have the right to invite to other members that join. Functions are similar to its predecessor, which retains the concept of the wall. The interesting thing is that group conversations via chat, as well as the creation of documents (with very basic format), modifiable in a collaborative way, best style Google Docs or Windows Live Office are now supported. Although we lose all possibility of filtering the publications (e.g., pictures, videos and links) and forums, groups receive a more prominent spot on the left menu, which is adjusted according to the most widely used. In addition, it is possible to generate an email address to send updates, as well as receive news in our personal mail box.

Surely, the new approach remind them Windows Live Groups, that incorporated in the latest wave compatibility with Messenger and Office Web Apps. In General, it is a very complete and customizable proposal, but it is not among the most popular features of Windows Live. Do you looking for Facebook with? This launch? The main goal is that we take these spaces to share specific activities only with the people we want, leaving the more General for the classic profile. But, at the same time, aims to eradicate one of their typical uses: join a group because its name is funny for us or because we agree with the cause that it proposes, but then don’t we accede to him anymore. Will it work?

Posted in News | Comments closed

Tourists in Egypt

In 2010, before the end of the season, Egypt expects to take at least 2.7 million Russian tourists. About this at the "Rest" during a press conference jointly organized by the tour operators "Natalie Tours, told reporters Ms. Nahid Nazmi Ayad Hanna (Nadin Nazmy Ayad Hanna), head of the Egyptian turofisa in Moscow. Such an optimistic outlook is based on the dynamics, which shows the recent Russian tourist flow to this country. "Despite the fact that Russian tourist market in the crisis year of 2009 as a whole dipped 15%, the Egyptian direction it showed growth in 11%.

Moreover, in the last winter season the number of Russian tourists in the resorts of Egypt grew by 39%, and this summer – By another 53%, "- explained Mr. EA Nahid Hannah. "From January to August this year, Egypt was visited by 1.73 million Russian tourists. On this basis for the year, we forecast a figure of 2.7 million tourists. And maybe even be able to work together to to reach the milestone of 3 million ", – added Ismail Abdul Hameed, Amir (Ismail Abdul Hamid Amer), tourism attache in Egypt, Russia. Thus in 2011 the Egyptian tourist authorities predict a rise in Russian tourist arrivals by 30% (!!!) This Egypt Russia plans to promote in the resorts still have unknown or not popular. First of all, we are talking about the northern coast of Egypt on the Mediterranean, as well as Luxor and Aswan, Nahid explained Hanna. For this Tourist Office collects feedback from tourists on hotels in Hurghada, as well as reviews on hotels Makadi.

Against the background of such optimistic forecasts, the tour operator "Natalie Tours" for the next year it decided to bet on Egypt. "Egypt will our priority for next year. The plans we have for the year to serve 100 thousand tourists, "- told reporters Natalia Vorobiev, CEO," Natalie Tours ". For this the company has substantially increased the size of kommitmentov hotels in Hurghada and Sharm El-Sheikh. "Only hotel chain Azur we have to guarantee 500 rooms each week, and from November to the popular hotel Club Azur , we will have an exclusive contract," – said Olga Vishinsky, Director product "Natalie Tours". To achieve the specified numbers of tourists, the operator also significantly expand the geography of their direct flights from the regions of Russia. So, this fall, "Natalie" will offer travel packages to Egypt with a direct flight from Moscow, St. Petersburg, Yekaterinburg, Perm, Nizhny Novgorod, Chelyabinsk, as well as from Minsk.