The island of Montserrat is tucked into the northern corner of the Leeward Islands, in the eastern Caribbean.
Montserrat became a British colony in 1632 and is an internally governed overseas territory of the United Kingdom, which retains responsibility for the territory's external relations, defense, internal security, public services, and offshore finance. The island is composed almost exclusively of volcanic rock and is mostly mountainous with a small coastal plain. The Ministry of Health was able to provide basic medical, surgical, and obstetric services to the population of Montserrat in less than optimal physical and environmental conditions, particularly during the height of the volcanic eruptions.
The Government of Montserrat formulated its second sustainable development plan (for 2008–2020), which focuses on five strategic goals: economic management, human development, environmental management and disaster mitigation, governance, and population.
As of March 2006, the workforce consisted of 3,006 persons, with 1,640 men and 1,366 women employed.
In 2010, 100% of the population had access to improved sources of drinking water and sanitation facilities. Solid waste is disposed of safely in the territory; private contractors handle domestic solid–waste collection and disposal.
The environmental effects of the Soufriere Hills Volcano's activity have been routinely monitored since eruptions began in 1995.
The Government of Montserrat is dealing with the potential effects of climate change, including changes in sea temperatures, rainfall patterns, and the intensity of hurricanes.
In 2008, the Government prepared a national food and nutrition policy and plan, and conducted a food consumption survey in 2007, in conjunction with the Caribbean Food and Nutrition Institute. The country has successfully addressed Millennium Development Goal (MDG) 5 (improve maternal health). According to estimates for 2010, children under age 5 accounted for 5.5% of the population. In 2010, children in the 10–14 years age group made up 14.4% of the population and those 15–19 years, 7%. Teenage pregnancies accounted for 35 births-12.5% of all births-during the reporting period.
The Global School–based Student Health Survey (GSHS) was conducted in 2008 among school children aged 13–15 years old (10).
The population aged 20–44 years old represented 42.6% of the population and those aged 45–64 years old, approximately 16% of the population. In 2006–2010 there were 25 diabetes–related hospital admissions among 25–44–year–olds and 91 among 45–64–year–olds.
The population 65 years old and older was estimated to account for 6.8% of the general population.
Between 2006 and 2010 there were 33 deaths due to ischemic heart disease, 7 due to cardiac arrest, 17 to cerebrovascular accident, 11 to congestive heart failure, and 8 due to other diseases of the circulatory system.
There were no cases of malaria during the period 2006–2010, and only two cases of dengue fever were diagnosed. During the reporting period 10 persons (7 male and 3 female) tested positive for HIV, as compared to 16 in the 2001–2005 period. According to the Communicable Disease Surveillance Report (12), there were 43 confirmed cases of sexually–transmitted infections in 2010. One case of tuberculosis was diagnosed in 2007, the sole case during the years under review. During 2006–2010, diabetes was the leading cause of hospitalization-307 diabetes–related admissions (155 female and 152 male).
Between 2009 and 2010, there were 36 anemia–related hospitalizations-21 in 2009 and 15 in 2010-affecting 29 women and 7 men.
A decayed, missing, and filled teeth (DMFT) survey was conducted among 6–year–olds in 2010.
The theme for Montserrat's 2008–2020 Sustainable Development Plan is "A Healthy and Wholesome Montserrat," bringing health to a central position within the territory's development.
Pursuant to the Public Health Act, the Minister of Health shall generally be responsible for promoting and preserving the health of the inhabitants of Montserrat. Patients are referred overseas for access to tertiary care or specialized diagnostic tests.
Montserrat is a participant in the Pharmaceutical Procurement Service (PPS) of the Organization of Eastern Caribbean States.
In Montserrat, there is no formal health research agenda and a variety of factors affect the generation of information in the health sector. In 2007, the Montserrat Community College established a nursing program with initial enrollment of nine students; these students did their clinical practice in Saint Kitts and Nevis. Despite the challenges of living with the volcano, Montserrat continued to make progress in health. 2The basis of poverty line estimation is the specification of the minimum cost for an adult to achieve a diet of 2,400 calories per day taking into account local dietary preferences and the need for a balanced diet. Threats and risks to Canadians and Canada are becoming increasingly complex due to the diversity of natural hazards affecting our country and the growth of transnational threats arising from the consequences of terrorism, globalized disease outbreaks, climate change, critical infrastructure interdependencies and cyber attacks. A key function of the Government of Canada is to protect the safety and security of Canadians. Effective EM results from a coordinated approach and a more uniform structure across federal government institutions. A SEMP establishes a federal government institution's objectives, approach and structure for protecting Canadians and Canada from threats and hazards in their areas of responsibility and sets out how the institution will assist the coordinated federal emergency response. The development and employment of a SEMP is an important complement to such existing plans, because it promotes an integrated and coordinated approach to emergency management planning within federal institutions and across the federal government.
Federal government institutions in the early stages of developing a SEMP may find it useful to read the material in Sections One and Two, while other institutions with more established plans may wish to proceed directly to Section Three. Supporting templates and tools can contribute to effective emergency management planning and are provided with this Guide. The Emergency Management Planning Guide uses a step-by-step approach and provides instructions that are supplemented by the Blueprint and the Strategic Emergency Management Plan (SEMP) template provided in Annexes A and B, respectively. The Emergency Management Planning Unit, Public Safety Canada, is responsible for producing, revising and updating this Guide. The purpose of this Guide is to assist federal officials, managers and coordinators responsible for emergency management (EM) planning. The EM plans of federal government institutions should address the risks to critical infrastructure within or related to the institution's areas of responsibility, as well as the measures for protecting this infrastructure. The SEMP is the overarching plan that provides a comprehensive and coordinated approach to EM activities. Given this variety of EM planning documents, the distinctions between them are summarized in the following table. A SEMP establishes a federal government institution's objectives, approach and structure for protecting Canadians and Canada from threats and hazards in their areas of responsibility, and sets out how the institution will assist the coordinated federal emergency response. It outlines the processes and mechanisms to facilitate an integrated Government of Canada response to an emergency and to eliminate the need for departments to coordinate a wider Government of Canada response. It includes 13 emergency support functions that the federal government can implement in response to an emergency.
Operational plans may be based on all four pillars of EM planning, or focus on the specific activities of a single pillar. The National Strategy and Action Plan for Critical Infrastructure establishes a public-private sector approach to managing risks, responding effectively to disruptions, and recovering swiftly when incidents occur.
Implementation of the Strategy will feature targeted and accurate information products, such as security briefings for each critical infrastructure sector. Emergency management (EM) refers to the management of emergencies concerning all hazards, including all activities and risk management measures related to prevention and mitigation, preparedness, response and recovery.
The Emergency Management Continuum is depicted in a wheel diagram where all four risk-based functions of emergency management are interconnected and interdependent in a system from prevention and mitigation to preparedness, response, and recovery.
In the center of the wheel are the main elements that influence the development of a Strategic Emergency Management Plan (SEMP).
Figure 1 highlights the four interdependent risk-based functions of EM: prevention and mitigation of, preparedness for, response to, and recovery from emergencies. The SEMP should ideally be reviewed on a cyclical basis as part of a federal government institution's planning cycle, as presented in Figure 2 below.
This figure represents the optimal planning cycle federal institutions should consider for undertaking their emergency management planning activities.
May: Senior Institutional Management reviews year-end reports from the previous year's activities.
September: Senior Institutional Management conducts mid-year check on progress of key performance objectives. February: Senior Institutional Management makes decision regarding the institution's strategic priorities for the upcoming fiscal year. This section of the Guide outlines a recommended approach for developing a tailored SEMP and is supported by a blueprint and a SEMP template provided in Annexes A and B, respectively.
Please note that Step 5 is presented under Section Four: Implementing and Maintaining the SEMP. Each step identifies inputs or considerations at the outset and concludes with the associated outputs. This step involves starting the formal planning process in recognition of the responsibility to prepare a SEMP.
Consider having members of the EM planning team designated by your institution's senior management. One of the most crucial steps in the EM planning process is to identify appropriate members for the EM planning team.
Consider including a member of your institution's corporate planning area on the EM planning team in order to help align the EM planning cycle with the institution's overall business planning cycle. Federal government institutions should consider identifying the range of experience and skill sets required in the EM planning team.
The team members should have the skills and training required to adequately carry out their assigned duties. The team members should have the skills and training required to adequately carry out their assigned duties.
The composition of the EM planning team will vary depending on institutional requirements; however, it is important that clear terms of reference (TOR) for the team be established and that individual assignments be clearly defined.
After the EM planning team has clear authority and direction, the next step is to review any relevant existing legislation and policies. Consider giving a team member the responsibility of analyzing the legislative and policy obligations applicable to the development of the SEMP.
As noted in Section Two, the EM planning process should be carried out as part of an institution's overall strategic and business planning processes—this will support their alignment. Developing the SEMP can be supported by a formal work or project plan to ensure that established timelines for plan development are met. As a next step, federal government institutions should consider developing a comprehensive understanding of the planning context. Additional supporting planning tools and templates as well as an EM glossary are provided in Annexes C and D, respectively. An environmental scan involves being aware of the context in which an institution is operating so as to understand how it could be affected. As part of the environmental scan, the institution defines the internal and external parameters to be taken into account when managing the risk and setting the scope and risk criteria for the remaining risk assessment process.
Additionally, federal government institutions are responsible for conducting mandate-specific risk assessments, including risks to critical infrastructure.
The Planning Context is represented in a target diagram that consists of three circles representing the factors federal institutions should consider in order to understand the context in which it operates and how it could potentially be affected. The outer and middle circles represent the external context in which the institution seeks to achieve its objectives. Understanding the internal context is essential to confirm that the risk assessment approach meets the needs of the institution and of its internal stakeholders.
Understanding the external context is important to ensure that external stakeholders, their objectives and concerns are considered. Consider reviewing your federal government institution's most current environmental scan, as well as the most current RCMP Environmental Scan (which can be found on the RCMP Web site), in order to develop a better understanding of pressures and issues facing your institution. Once all documentation is identified, consider conducting a gap analysis to determine whether the institution is currently meeting its obligations as identified in Step 1. During this process, consider conducting a full review and analysis of stakeholder documentation and reports. An inventory of critical assets and services will assist the planning team in identifying the associated threats, hazards, vulnerabilities and risks unique to their institution.
If a business impact analysis (BIA) has already been completed for your federal government institution's BCP, this analysis can greatly inform your criticality assessment. When conducting a criticality assessment, it is important to be objective when prioritizing the importance of institutional assets, as not all assets are critical to an institution's operations. Adopting the current Treasury Board Policy related to material and asset management and coding criteria will help structure an effective approach.
A comprehensive but non-exhaustive list of hazards and threats relevant to the Canadian context can be found in Annex C, Appendix 3. Traditionally, a threat assessment is an analysis of intent and capabilities in the occurrence of a threat.
A vulnerability assessment looks at an inadequacy or gap in the design, implementation or operation of an asset that could enable a threat or hazard to cause injury or disruption. In order to identify vulnerabilities, an institution should first identify and assess existing safeguards associated with critical assets and activities.
Risk assessment is central to any risk management process as well as the EM planning cycle.
The output of the risk assessment process is a clear understanding of risks, their likelihood and potential impact on achieving objectives. The all-hazards risk assessment (AHRA) process should be open and transparent while respecting the federal institution's context. In this section, risks translate into events or circumstances that, if they materialize, could negatively affect the achievement of government objectives. Once the institution's context is clearly understood (refer to the environmental scan in Step 2-1), the next step is to find and recognize hazards, threats and possibly trends and drivers, and to describe them in risk statements. Risks can be identified though several mechanisms: structured interviews, brainstorming, affinity grouping, risk source analysis, checklists and scenario analysis. A risk register or log is used to record information about identified risks and to facilitate the monitoring and management of risks. The objective of risk analysis is to understand the nature and level of each risk in terms of its impact and likelihood. Qualitative analysis is conducted where non-tangible aspects of risk are to be considered, or where there is a lack of adequate information and the numerical data or resources necessary for a statistically significant quantitative approach. Consider consulting your institution's subject matter experts when evaluating quantitative likelihood through historical data, simulation models and other methods. Consequences can be expressed in terms of monetary, technical, operational, social or human impact criteria.
The purpose of risk evaluation is to help make decisions about which risks need treatment and the priority for treatment implementation. Risk criteria are based on internal and external contexts and reflect the institution's values, objectives, resources and risk appetite (over-arching expression of the amount and type of risk an institution is prepared to take). Risks can be prioritized by comparing risks in terms of their individual likelihood and impact estimates. The risk-rating matrix allows for decisions to be made about which risks need treatment and the priority for treatment implementation.
Risk treatment options can be prioritized by considering risk severity, effectiveness of risk controls, cost and benefits, the horizontal nature of the risk, and existing constraints. Consider gathering a list of institutional risks and cross-referencing the existing plans (as identified in Step 2-1c) that address each risk. This step will contribute to the concept that sound EM decision-making can be based on an understanding and evaluation of hazards, vulnerabilities and related risks. This step focuses on developing an informed EM approach for your institution based on the four pillars of EM. Each institution should establish an EM governance structure to oversee the management of emergencies. In identifying members of your institution's EM governance structure, keep in mind the relationship between your institution's mandate and the four pillars of EM. It is important that the planning team confirm the strategic priorities of the institution and of senior management so that they can be reflected in the SEMP. Consider developing an overview of these priorities and identifying potential areas for attention given risk probabilities and vulnerabilities. The planning team should aim to clearly identify the planning constraints and institutional limitations that will influence the SEMP building blocks and the subsequent development of the SEMP. The cross-reference table of existing plans by identified institutional risks provided in Annex C, Appendix 4, can assist in cross-referencing your most prevalent risks and the tools in place to address them (such as existing plans). A SEMP should inform each federal government institution's overall priorities and tie into its business and strategic planning activities. The objective of planning activities associated with prevention and mitigation efforts is to reduce risk.
The objective of planning activities associated with preparedness is to have an effective and coordinated approach to EM and operational readiness.
Federal government institutions should consider personnel surge capacity requirements in their plans to support sustained operations, as well as the ability to react to any additional hazard or event that may occur while the response and recovery operations are taking place. The objective of planning activities associated with institutional responses to changing threats, hazards or specific incidents is to have an effective and integrated response in accordance with established strategic priorities. Think about engaging your communications branch so that they are aware of internal and external communications requirements. The objective of planning activities associated with the recovery component of EM is to provide for the restoration and continuity of critical services and operations. Once the event is over and response operations are completed, federal institutions should participate in any whole-of-government reviews as appropriate. The SEMP establishes a federal government institution's objectives, approach and structure for protecting Canadians and Canada from threats and hazards in their areas of responsibility, and sets out how the institution will assist the coordinated federal emergency response.
This document provides a brief introduction to tools that assist in understanding the cyclical interlinkages between environmental management and disaster risk reduction. While these tools are an adaptation of existing environmental management tools applied to integrating environment and disaster risk reduction, many other tools also exisit, developed by specific organizations and institutions. Creating an environmental profile (EP) of an area or community is a first and critical step in understanding the interactions between the local environment and disaster vulnerabilities it faces. An 'environmental profile' (EP) provides a systematic overview of the development, environment and disaster setting, and institutional arrangements of an urban area, which is designed to highlight the environment-disaster interactions, the critical issues, and the sectors and stakeholders directly concerned with them. In this tool, a brief introduction to the social, economic and physical features of the city is made. Eco and Hazard Mapping (EHM) is a visual tool that creates an inventory of environmental assets of an area or community, and the vulnerabilities and risks it faces. Eco and Hazard Mapping (EHM) is a systematic but simple method of conducting an on-site environmental review by collecting information which shows the current situation using pictures and maps.
EHM has been an effective, systematic means of inventorying environmental practices and problems, communicating environmental issues to urban residents, engaging them in environmental practices, and implementing action at the local level. EHM is a very visual tool that uses plans and maps of buildings and neighbourhoods to identify and mark the environmental aspects of the urban setting, and the potential hazards and risks that they pose. Environmental Risk Assessment is a systematic analysis of the likelihood that the environment will experience a specified level of harm as a result of a natural disaster or a planned human activity.
ERA is a well developed and systematic tool that provides the necessary information to take decisions that will mitigate and reduce the risks faced by vulnerable communities – whether from man-made aspects (such as chemical accidents or development projects) or natural aspects (such as earthquakes and tyhpoons). Environmental Impact Assessment is a formal process used to predict the environmental consequences of a project or an event.
Environmental Impact Assessment (EIA) is a structured procedure designed to help ensure that projects and programmes are environmentally sound and sustainable. It allows informed decision making on the action to be taken, and establishes a monitoring and environmental management regime for implementing mitigation measures, monitoring impacts for compliance and ascertaining if impacts are as predicted. The EIA tool, well known for the assessment of development projects such as a dam or a complex of factory buildings, can also be used for disaster planning and management. Strategic Environmental Assessment (SEA) is a process to ensure that significant environmental effects arising from disasters are identified, assessed, mitigated, communicated to decision-makers, monitored and that public involvement is ensured. Strategic Environmental Assessment is a systematic process for evaluating the environmental consequences of policies, plans, programmes or proposals, to ensure that they are addressed early in the decision making process and on par with economic and social considerations .
Undertaking SEAs can also contribute to sustainable development goals, promote accountability and credibility among the general public and specific stakeholders, and lead to broader policy coherence.
For simplicity, SEA can be broken down into different activities conducted alongside the development of disaster mitigation plans or programmes, and consideration of alternative options.
Stage A: Local authorities needs to consider the availability of background information and propose objectives and indicators for the SEA. Stage B: Local authorities decide the likely scope of the environmental report, and what level of detail to be examined. Stage C: Local authorities assess the likely effects on the environment of the evolving plan, and its alternatives. An Environmental Management Systems (EMS) is a systematic way to ensure environmental issues are managed consistently and systematically.
It sets out environmental policies, objectives and targets for the implementing organization, with pre-determined indicators that provide measurable goals, and a means of determining if the performance level has been reached.
Integrating environment and disaster dimensions in local planning processes is a complex mix of consultation, dialogue and monitoring involving all critical stakeholders, particularly the vulnerable communities. Having stakeholders review their own plans to ensure a coordinated response, and identify lacks and gaps. Identifying resources needed, making necessary changes to improve plans, and integrating them into an overall community plan. Educating and training participating groups about the integrated plan, including emergency responders. Ultimately, a multi-stakeholder knowledge sharing mechanism at the local level goes a long way in ensuring that all aspects of the local environment are considered in disaster mitigation and preparedness plans. Inventorize institutional and individual knowledge gained from responding to the tsunami disaster by developing a database of strategies, policies, programmes and projects being undertaken. Channel scarce funds to appropriate and critical areas that need them, by networking with communities and organizations to enable matching offers and requests. Post-disaster situations are equally important in integrating and interlinking environmental aspects with disaster management.
UNEP, "Environmental Risk Assessment: A Practitioner's Guide" United Nations Environment Programme, 2003. IU will honor the GlobalNOC's past and future at a 15th anniversary celebration Tuesday, Sept.
Indiana University has implemented the Kuali Coeus Institutional Review Board, a comprehensive online system for the submission, review and approval of human subjects research.


The National Center for Genome Analysis and Support (NCGAS) has announced new services to help biological researchers store and share their work, speeding scientific discovery and breakthroughs in many fields of study. Registration is now open for the IEEE Cluster 2013 conference, hosted by IU's Pervasive Technology Institute, September 23-27 at the Hilton Indianapolis. Professors Thomas Sterling and Andrew Lumsdaine will deliver keynotes and lead workshops, tutorials and discussions on a variety of topics at the 2013 International Supercomputing Conference, the world's oldest global conference and exhibition for high performance computing, networking and storage.
The center of the universe will be in Indianapolis June 2 to 6, at least as far as the study of the universe is concerned, as more than 500 scientists, educators and journalists are expected for the 222nd meeting of the American Astronomical Society. IEEE Cluster 2013 conference organizers today announced the featured speakers at this year's event. With privacy concerns addressed, Indiana University has re-released the free app Kinsey Reporter, a global mobile survey platform for collecting and reporting anonymous data about sexual and other intimate behaviors.
NASA's Operation IceBridge mission wraps up its spring flight season this week, gathering radar data about Earth's polar ice sheets to help scientists better understand global climate change.
Indiana University confirmed its leadership in high performance, data-intensive computing by unveiling Big Red II, a powerful new supercomputer with a processing speed of one thousand trillion floating-point operations per second (one petaFLOPS). Indiana University's new supercomputer is expected to further advance international collaborations reliant on big data research at a time when the globalization of education, science and research is omnipresent.
Indiana University and Internet2 announced a $2 million initiative to stimulate collaboration in higher education cybersecurity efforts in response to President Obama's cybersecurity challenge. This week the HathiTrust Research Center (HTRC) announced the availability of data mining and analytics tools for the HathiTrust Digital Library, a collection of digital texts from over 70 research libraries around the world. The TechPoint Mira Awards recognized Indiana University for the deployment of IUanyWare, a cloud-based service that provides IU students, faculty and staff with on-demand access to over 200 software applications. Indiana University has saved nearly $20 million by joining with other universities to reduce administrative costs for essential financial software systems.
IUanyWare, Indiana University's cloud software service, is a 2013 recipient of ACUTA's prestigious Institutional Excellence award. Indiana University shares its expertise in advanced networking with the launch of a new lecture series for state business and industry leaders. Kuali People Management for the Enterprise (KPME) announces the release of version 1.5, designed to meet the human resources needs of higher education.
Indiana University today announces SAGE as the latest publisher to sign on to its eTexts initiative. Indiana University has announced an agreement with Cengage Learning to provide eTexts for students on all IU campuses.
IEEE Cluster 2013 conference organizers are seeking input from the high performance computing community, in an effort to make the "Clusters and Cyberinfrastructure Strategy" event as informative as possible. Nearly 10,000 Indiana University students are using digital textbooks (eTexts) this spring semester as part of IU's pioneering eTexts initiative. Indiana University's Center for Research in Extreme Scale Technologies (CREST) is the recipient of a three-year, $1.1 million grant from the Department of Energy (DOE) to develop software that improves the speed and programmability of supercomputers. The Indiana Center for Network Translational Research and Education (InCNTRE) at Indiana University is hosting its first single-controller vendor Software-Defined Networking (SDN) Lab PlugFest this Feb.
Indiana University and Adobe are partnering to present Adobe Days 2013 on the IUPUI and IU Bloomington campuses. Vital research collaborations involving China, Europe and the United States will be safeguarded through the first major agreement among partners running the two main high-speed research and education (R&E) Internet routes across Asia, Europe and North America.
Thomas Sterling, executive associate director of the Center for Research in Extreme Scale Technologies (CREST) and professor of computer science in the IU School of Informatics and Computing, has been named an HPCwire person to watch in 2013.
The Indiana Center for Network Translational Research and Education (InCNTRE) has announced that Steve Wallace will step into the role of acting executive director.
Indiana University's IT Communications Office recently received several awards from the Chicago chapter of the Society for Technical Communication (STC). Network architects from a range of Fortune 500 companies will converge on the Indiana Center for Network Translational Research and Education (InCNTRE) on Wednesday, January 23, to take part in a new user group promoting OpenFlow and other software-defined networking (SDN) technologies. The National Center for Genome Analysis Support (NCGAS) is expanding its reach by adding tools, services and partners to help biological research communities make important new scientific discoveries. With 6 billion mobile phone subscriptions worldwide -- that's about 87 percent of the world population -- and an even higher percentage of users estimated on campuses, Indiana University has embarked on a mobile security campaign to heighten awareness about the tools available to safeguard users and their products. The organizing committee for the IEEE* Cluster 2013 conference is now accepting proposals for tutorials, technical papers, posters, panels, and visualizations. A recent networking breakthrough from IU researchers, in collaboration with Orange Silicon Valley and DataDirect Networks, showed that data sharing can be faster and more efficient over wide area networks (WAN).
Researchers from Indiana University's Pervasive Technology Institute will serve as collaborating partners on a major grant from the U.S. Indiana University today announced the successor to its internationally recognized Data Capacitor research data storage platform. Indiana University networking experts were recently recognized by Internet2 for their efforts to enhance broadband connectivity and support advanced services and cloud applications across the United States. IU will replace its current Data Capacitor with Data Capacitor II, a high-speed, high-capacity storage facility for very large data sets. Indiana University will display its leadership in high performance computing and networking technologies at the annual International Conference for High Performance Computing, Networking, Storage and Analysis, also known as SC12 (Supercomputing 2012). QuakeSim, an Indiana University-supported collection of online data and tools from NASA's Jet Propulsion Laboratory and multiple university partners, is a recipient of NASA's 2012 Software of the Year Award. Data vital to understanding global climate change will benefit from more efficient and secure processing, thanks to a new tool created by members of Indiana University's Research Technologies Systems.
Recording light from millions of light years away and then sending it to the Indiana University Data Center at the corner of 10th Street and state Rt.
Indiana University announced today (September 14) an agreement with Elsevier's Science & Technology Books division to provide eTexts for students on all IU campuses. A recent National Science Foundation (NSF) grant will further enable Indiana University to help scientists solve their toughest data problems. Indiana University and Ivy Tech Community College have announced a technology support partnership to help college students use technology for increased success.
Indiana University has signed agreements with technology providers CourseNetworking LLC and Instructure Inc. The Apache Software Foundation recently asked Suresh Marru of the Indiana University Pervasive Technology Institute to join its exclusive membership. The announcement July 4 that scientists have observed a new particle that may be the elusive Higgs boson spelled success for Indiana University researchers who worked for years on a massive experiment that detected the particle. Internet2 announced today, July 20, that Indiana University President Michael McRobbie was elected as the sixth chair of the board of trustees and will serve until July 2015.
Key software used to study gene expression now runs four times faster, thanks to performance improvements put in place by a team from the Indiana University Pervasive Technology Institute (PTI), the Broad Institute of MIT and Harvard and Technische Universitat Dresden. Indiana University has received a Campus Technology 2012 Innovators Award for the development of IUanyWARE, a cloud-based service that provides students, faculty and staff with on-demand access to hundreds of software applications.
The announcement last week that scientists have observed a new particle that may be the elusive Higgs boson spelled success for Indiana University researchers who worked for years on a massive experiment that detected the particle. Leaders from the China Education and Research Network (CERNET), IU, Internet2, and the Chinese government met Thursday, June 21, at Tsinghua University in Beijing, China to demonstrate unique applications now possible over a new10Gbps internet link between the education and research networks of the US and China.
Beginning July 1, Indiana University will establish a new Office of Scholarly Publishing, newly appointed IU executive vice president and provost of the Bloomington campus Lauren Robel announced. Indiana University is again leading the way to better health care by enabling scientists to share research more rapidly and securely over the Internet. Indiana University received a $492,588 National Science Foundation grant to help scientists study rising sea levels and the impact of storm surge on coastal communities.
Networking giant Cisco is the latest company to join InCNTRE's Software-Defined Networking Interoperability Lab, the world's only neutral, third-party testing lab for SDN. IDG's CIO magazine has honored Indiana University as a recipient of the 2012 CIO 100 award. The Sakai Foundation recently selected its 2012 Sakai Fellows, and three of the six recipients have direct ties to Indiana University.
Indiana University and Pearson are working together to reduce the costs of digital textbooks for students on all IU campuses. Senior, higher education executives announced today that they will use the nation's fastest, coast-to-coast network to implement new technologies that support scientific "Big Data" and cloud applications to drive innovation in global collaborative research.
Its currency is the Eastern Caribbean dollar (EC$).1 The economy grew between 2006 and 2008, but declined in 2009 and 2010 due to the global economic crisis.
Montserrat's Soufriere Hills Volcano began erupting in 1995, resulting in the destruction of the capital, Plymouth, and the evacuation of the southern and central parts of the island. In 2007, the population fell to just over 4,800, partly owing to the migration of people in and around the unsafe zone. The Expanded Program on Immunization (EPI), for example, is one of the territory's success stories: high immunization coverage rates have resulted in low morbidity and mortality due to vaccine–preventable diseases.
Where slopes have been cleared for cultivation in Montserrat, erosion is also a matter for concern. Air quality monitoring, which is performed by the Montserrat Volcano Observatory, includes measuring the concentration of respirable dust and sulfur dioxide (SO2) levels. Royal Montserrat Police Force data from 2010 indicate that 604 motor–vehicle accidents and one fatality were reported that year. While the major threat is volcanic activity, the territory is also subject to the winds and storm surges associated with hurricanes and to earthquakes. The territory has taken the lead in the establishment of an OECS Climate Change Center, which will collect information and compile a database of climate change factors, features, and events relevant to the Eastern Caribbean region (8). For the years 2006–2010, the three leading causes of death in children under 5 were: acute respiratory infections (601 cases), influenza (132 cases), and gastroenteritis (94 cases). The results showed that approximately one–third had had at least one alcoholic drink on one of more days during the month prior to the survey. There were 32 admissions related to hypertension among 25–44–year–olds and 103 among 45–64–year–olds. During the period 2006–2010, there were 45 admissions for hypertension among those 65–74 years of age and 90 among those 75 years old and older. During the period under review, there were 20 deaths due to hypertension (9 females and 11 males). The leading diagnoses were hepatitis B (16 cases), gonococcal infection (11), and 8 cases each of syphilis and trichomoniasis. The Global School–based Student Health Survey (GSHS) found that approximately one–third of the students claimed to have been physically attacked at least once, and that 28.1% were bullied on one or more days during the 30 days prior to the survey.
Montserrat has a Mental Treatment Act (2006) and draft mental health plan (2002), but no mental health policy. Those who evaluated the Plan became aware that the territory has a very effective primary health care system, but that the secondary and tertiary health care facilities and services are inadequate. The Ministry of Health carries out the steering functions of policy formulation, regulation, standard setting, monitoring and evaluation, as well as health care delivery.
The Social Security Board requires that all employed persons between the ages of 16 and 60 be covered. The Mental Treatment Act consolidates Montserrat's mental health legislation: the Mental Treatment Act and the Mental Treatment Institutions and the Poor and Persons of Unsound Mind Act. Certain categories are exempt from paying fees, including children, pregnant women, students, the indigent, and prisoners. The services offered include maternal and child health, mental health, school health, and home health care services.
The provision of medicine in the public sector is subsidized, and many in the population are exempt from payments. The territory lacks a health information strategic plan for coordinating the production, analysis, dissemination, and use of data. Other health professionals are all trained overseas as there were no other training facilities for health personnel in Montserrat.
The Plan for Sustainable Development and the Business Plan for Fiscal Year 2008 of the Ministry of Health and Community Services identified some of the issues that needed to be addressed.
Strategies are needed to attract funding for the health sector and to improve efficiencies.
Montserrat National Climate Change Issues Paper: Towards the Formulation of a National Climate Change (Adaptation) Policy and Action Plan.
The Minimum Cost Food Basket for an adult aged 15–29 years is equivalent to just over US$ 1,762 per year. Emergencies can quickly escalate in scope and severity, cross jurisdictional lines, take on international dimensions and result in significant human and economic losses. Federal government institutions are increasing their focus on emergency management (EM) activities, given the evolving risk environment in their areas of responsibility. This is why Public Safety Canada has developed this Emergency Management Planning Guide, which is intended to assist all federal government institutions in developing their all-hazards Strategic Emergency Management Plans (SEMPs). Many federal government institutions already have specific planning documents or processes to deal with aspects of emergency management that relate to their particular mandates; many also have a long track record of preparing and refining BCPs. An All-Hazards Risk Assessment Framework and associated tools are also under development and will be included in a subsequent version of the Guide.
As a matter of process, the Emergency Management Planning Guide will be reviewed annually or as the situation dictates, and amendments will be made at that time. The Guide includes a Blueprint (see Annex A), a Strategic Emergency Management Plan (SEMP) template (see Annex B), and supporting step-by-step instructions, tools and tips to develop and maintain a comprehensive SEMP—an overarching plan that establishes a federal government institution's objectives, approach and structure, which generally sets out how the institution will assist with coordinated federal emergency management, including response. As such, federal institutions are to base EM plans on mandate-specific all-hazards risk assessments, as well as put in place institutional structures to provide governance for EM activities and align them with government-wide EM governance structures. It reflects leading practices (such as those provided by the International Organization for Standardization (ISO) and Canadian Standards Association) and procedures within the Government of Canada, and should be read in conjunction with the Federal Emergency Response Plan, the Emergency Management Framework for Canada and the Federal Policy for Emergency Management. It should integrate and coordinate elements identified in operational plans and business continuity plans (BCPs). Each of these functions addresses a need that may arise before or during an emergency. It is intended that governments and industry partners will work together to assess risks to the sector, develop plans to address these risks, and conduct exercises to validate the plans. This work at the sector level will inform, and will be informed by, work at the organizational level such as EM plans and their component parts. Those elements are as follows: Environmental Scan, Leadership Engagement, All-Hazards Risk Assessment, Training, Exercise, Capability Improvement Process, and Performance Assessment. These functions can be undertaken sequentially or concurrently, and they are not independent of each other. In order to effectively depict the cycle, the four seasons are placed in a wheel diagram showing how spring, summer, fall, and winter are interconnected and continuously flow into one circle. The upcoming year's critical objectives are indentified with input from the various Working Groups and the appropriate Business Lines. Emergency Management resource requirements should be identified as early as possible to integrate into plans. Inputs should ideally be assembled, reviewed and well understood prior to engaging in each distinct planning activity as they form an important foundation for the work to be completed. The SEMP should be central to the federal government institution's EM activities and provide clear linkages for integrating and coordinating all other intra-departmental and inter-departmental emergency management plans.
The size and composition of the team may vary between federal government institutions; however, the planning team should ideally have the skill and experience necessary to develop the SEMP.
This team should be established under the authority of the institution's governance framework and have clear directions, including objectives. Training is available to address EM requirements at the Canadian Emergency Management College (CEMC) and the Canada School of Public Service. Training is available to address EM requirements at the Canadian Emergency Management College (CEMC) and the Canada School of Public Service. These TOR can identify the responsibilities assigned to each team member and the requirements to allow that member to carry out the assigned function. This is also an ideal time to involve institutional legal advisors to determine whether legislative requirements are being met. Update the analysis regularly, as legislation and policies can change and have an influence on the scope of your SEMP. After completing the above steps, the planning team should consider developing a detailed work plan that includes a schedule with realistic timelines, milestones that reflect the institutional planning cycle, and a responsibility assignment matrix with assigned tasks and deadlines. It entails a process of gathering and analyzing information and typically considers both internal and external factors (see Figure 3: The Planning Context for additional information on the factors to consider).
It sets the time, scope and scale and contributes to adopting an approach that is appropriate to the situation of the institution and to the risks affecting the achievement of its objectives. The key to any emergency planning is awareness of the potential situations that could impose risks on the organization and on Canadians and to assess those risks in terms of their impact and potential mitigation measures. It is the environment in which the institution operates to achieve its objectives and which can be influenced by the institution to manage risk. If gaps are identified, these should ideally be gathered and presented as part of Step 3 when developing the EM Planning Framework and confirming the institution's strategic EM priorities. Assets can be both tangible and intangible and can be assessed in terms of importance, value and sensitivity.
All available threat assessments should ideally be reviewed by analyzing the assessment's evaluation of hostile capability, intentions and activity, the environment influencing hostile and potentially hostile groups, and environmental considerations, including natural, health and safety hazards. For further information, you may wish to consult the Canadian Disaster Database, which contains detailed disaster information on over 900 natural, technological and conflict events (excluding war) that have directly affected Canadians over the past century. A threat awareness collection process should ideally link to the federal institution's information requirements and available resources. As appropriate, more specific terrorist threat and hazard information can be obtained from ITAC.
With respect to known threats and hazards, a vulnerability exists when there is a situation or circumstance that, if left unchanged, may result in loss of life or may affect the confidentiality, integrity or availability of other mission-critical assets.
It is a formal, systematic process for estimating the level of risk in terms of likelihood and consequences for the purpose of informing decision-making. It provides improved insight into the effectiveness of risk controls already in place and enables the analysis of additional risk mitigation measures. A risk assessment should generate a clear understanding of the risks, including their uncertainties, their likelihood and their potential impact on objectives. It should be tailored to the institution's needs and should identify any limitations such as insufficient information or resource constraints. Risks should be described in a way that conveys their context, point of origin and potential impact. Characterization of risks should use an appropriate breadth and scope; it can be difficult to establish a course of action to treat risks if the scope is too broad, while a scope that is too narrow will create too much information, thereby making it difficult to establish priorities.
A risk register will typically describe each risk, assess the likelihood that it will occur, list possible consequences if it does occur, provide a grading or prioritization for each risk, and identify proposed mitigation strategies.
Probabilistic methods provide more information on the range of risks and can effectively capture uncertainty, but require more data and resources. It is usually used for analyzing threats with less tangible intent (judgements on terrorism, sabotage, etc.). Subject matter experts can also assist in evaluating likelihood from a qualitative perspective, for instance by using a Delphi technique (a group communication process for systematic forecasting). Additional information on analyzing likelihood and impact is provided in the Treasury Board Integrated Risk Management Framework Guidelines. Prioritization can be shown graphically in a logarithmic risk diagram, risk-rating matrix or other forms of visual representations. In order to prioritize risks, comparison is made based on their likelihood and impact estimates. Treatments that deal with negative consequences are also referred to as risk mitigation, risk elimination, risk prevention, risk reduction, risk repression and risk correction. These treatment options, forming recommendations, would be used to develop the risk treatment step in the risk management or emergency management cycle. A sample cross-reference table of existing plans by identified institutional risks is provided in Annex C, Appendix 4. The resulting SEMP building blocks will reflect strategic priorities—the desired balance between developing measures that respond to emergencies versus mitigating the risk. The EM planning governance structure may include representatives of an institution's senior management team, from all functional areas (such as programs) and all corporate areas (including communications, legal services and security).
It is also crucial that roles and responsibilities, lines of accountability and decision-making processes be aligned and well understood by all concerned. For example, an institution can be constrained by the availability of training for EM planning team members and by the number of EM positions they have staffed. A further cross-referencing can then be undertaken with the four pillars of EM to help target specific activities in one or more of the following areas.
The ICS helps to promote clear lines of authority, is scalable to large or small events, and is widely used by first responders such as police or fire departments in various jurisdictions. The cross-reference table provided in Annex C, Appendix 5, as stated above, can serve as a tool to complete this task. It should be strategic and be designed to have safeguards and processes to trigger appropriate actions in response to changing threats and hazards, as well as in response to specific incidents and events. Each of the tools provide different methodologies and results, and enable different decisions to be taken. Examples include UNEP's APELL and UNOCHA's FEAT (See the Tools section for more information). The city's various sectors, their characteristics, use of environmental resources and impact on environmental resources are mentioned under ‘Development Setting’. It covers a range of issues, including information on the current situation, problems areas, water, sewage, soil, air, energy, waste, etc.
Due to the simplicity of this inventory process, multi-stakeholder participation is easily enabled.
Risk is the likelihood that a harmful consequence will occur as a result of an action , including those from natural or man-made disasters. The use of ERA in environmental planning and management is fast becoming a standard practice, either as a stand alone procedure or as a support or complement to an EIA.
It calls for the clear identification and formulation of the problem and characterize the risks posed as a result. Like the ERA tool, it enables informed decision making on the development of a city, but also in preparing for disasters (whether natural or man-made), and in monitoring and evaluation of the action taken.
Applied to disaster management, it also helps in understanding the environmental consequences of pre- and post-disaster activities. Effectively applied, an EMS can help integrate environmental considerations within a larger disaster management plan. Due to its complexity and wide scope, a multi-stakeholder partnership that plans, implements and reviews programmes is absolutely important. 10, in the Informatics & Communications Technology Complex on the Indiana University-Purdue University Indianapolis campus. With seven Institutional Review Boards and more than 4,800 approved active research studies, IU is the largest university to implement this community-developed open source software.
IU earned the distinction for its pioneering eTexts initiative and recent wireless network upgrade to ensure reliable and secure access to digital materials.


The twice-yearly IceBridge missions generate massive amounts of data -- all stored and archived by Indiana University's research cyberinfrastructure. Offering unmatched speed, Big Red II will be the fastest university-owned supercomputer in the nation. ACUTA (the Association for Information Communications Technology Professionals in Higher Education) is an international nonprofit dedicated to serving the needs of higher education, including nearly 2,000 individuals at some 700 institutions. This version includes a new Leave Management module, which lets organizations and their employees accrue, request, report and track benefit time (such as paid time off and sick days) for faculty and staff.
SAGE is now the 11th publisher to partner with the university to provide digital materials to students on all IU campuses. With this addition, IU reaches an important milestone: Faculty and students now have favorable pricing for and access to digital materials from all of IU's largest publishers.
Hosted by Indiana University's Pervasive Technology Institute, Cluster 2013 will take place September 23-27, 2013, at the Hilton Hotel in Indianapolis. Since 2000, the Mira Awards have recognized the movers and shakers of the state's IT industry. The third annual event showcases Adobe tools and resources that help students and instructors of all disciplines connect, discover, create and inspire. The publication's annual list features 12 movers and shakers whose reach extends beyond high performance computing (HPC) to shape future directions of technology, propelling scientific and engineering advancements. The newly formed InCNTRE SDN User Group (ISUG) will bring together business leaders from insurance, finance, travel and healthcare who are investigating SDN technologies and the impact they may have on their networks.
Today (January 14), in conjunction with its participation in the Plant and Animal Genome Conference (PAG XXI), NCGAS announced three initiatives to accelerate US public and private sector research and development in biology and biomedical research. Hosted by IU's Pervasive Technology Institute, Cluster 2013 will take place September 23-27, 2013, at the Hilton Hotel in Indianapolis.
The team performed the world's first demonstration of RDMA (Remote Direct Memory Access) over Converged Ethernet (RoCE) across a wide area network using the Lustre file system.
Department of Homeland Security to address vulnerabilities arising during the process of software development.
The new system, called Data Capacitor II (DCII), is a five petabyte storage resource engineered to provide scientific researchers with high performance access to a robust storage facility.
Their efforts will help provide advanced networking features for more than 200,000 of the country's community anchor institutions, including libraries, hospitals, K-12 schools, community colleges and public safety organizations. With five petabytes of storage, Data Capacitor II will support big data applications used in computational research. The award recognizes innovative software technologies that significantly improve the agency's space exploration and maximize scientific discovery on Earth. The NSF has selected Indiana University as a partner in a grant to create the Science Gateway Institute. The new version brings additional features and improvements to a software system that touches vital university functions every day.
This honor is bestowed on IT developers whose skills have significantly contributed to the foundation's projects.
President McRobbie joined the board in 2009 and succeeds University of Michigan President Mary Sue Coleman, who served as chair for the last year and as a member of the board since 2003.
The Innovators Award recognizes universities that deploy extraordinary technology solutions to meet campus challenges.
The Indiana Clinical and Translational Sciences Institute (CTSI), of which IU is a founding member, recently became the first health care research institute to be named to the InCommon Federation's Research & Scholarship category. Department of Energy have renewed funding for the Open Science Grid project, providing $27 million from 2012 to 2016.
Through this grant, IU will improve the performance of oceanic computer models, which scientists use to protect millions of people living near coasts around the world. The 25th annual award recognizes organizations around the world that exemplify operational and strategic excellence in information technology.
IU's Chris Maurer and Lynn Ward received the honor along with former employee Lance Speelmon. IU's eTexts initiative enables faculty to optionally choose these digital textbooks and online exercises at reduced prices for students. The intent is to strengthen the nation's position as a global leader in research and education for decades to come, and at the same time help control higher education costs. Montserrat is a member of the Caribbean Community (CARICOM) and the Organization of Eastern Caribbean States (OECS).
Despite the volcano, the population has grown by 5.6% since 2002, and in 2010 was estimated to be 5,118. Air quality in the safe, northern portion, of the territory has consistently remained within acceptable limits (2).
There also are environmental health issues related to falling ash; these also are monitored. All pregnant women received prenatal care and were delivered by a trained health professional. Other causes of hospital admission during the reporting period were urinary tract infections, influenza, gastroenteritis, and hypertension (9).
The 25–44–year–old age group accounted for just over 50% of all admissions due to urinary tract infections.
Over the same period, there were 42 diabetes–related hospital admissions among the 65–74–year–old age group and 167 among those age 75 and older. Accordingly, one goal of the Plan is to ensure access to required secondary and tertiary health care at affordable prices by 2020. The 2010 budget (15) assigned to the Ministry of Health-US$ 6,162,333 (or EC$ 16,638,300)-represented 20% of the total allocated to various ministries and departments (US$ 30,130,704, or EC$ 81,352,900. Revenue collected by the Glendon Hospital increased from US$ 65,811 (or EC$ 177,690) in 2006 to US$ 117,253 (or EC$ 316,583) in 2009 (16).
Montserrat's health surveillance system was audited in 2008 by the Caribbean Epidemiology Centre (CAREC) and was updated to provide timely data on diseases under surveillance. The small size of the population makes it difficult to ensure enough work to maintain skills or provide adequate staff to cover for workers when on leave.
Continuing education of health personnel included formal training and in–service training opportunities. This fact has consequences for health care delivery, such as the cost of dealing with chronic diseases and the need for support systems.
These include the use of new technology, improvement of health facilities, and attracting and retaining health professionals.
Of great importance will be a shift of emphasis to health promotion and collaboration with others to bring about improved health for the people of Montserrat. EM can save lives, preserve the environment and protect property by raising the understanding of risks and by contributing to a safer, more prosperous and resilient Canada. It does not lay out the requirements for preparing related EM protocols, processes, and standard operating procedures (SOP) internal to the institution; however, these should be developed in support of the SEMP and related plans. As outlined in the Preface, many federal government institutions already have specific plans or processes to deal with aspects of emergency management; many also have a long track record of preparing and refining BCPs, which endeavour to ensure the continued availability of critical services. Each season has its own wheel quadrant describing the activities usually undertaken in each month of the year. Planning can be triggered by the EM planning cycle or it can be initiated in preparation for, or in response to, an event that is induced either by nature or by human actions. Consideration should be given to having representation from several program and corporate areas, including (if applicable) regional representation. Those federal government institutions that have mandated emergency support functions (ESFs) under the FERP should have these clearly identified. Notwithstanding the blueprint provided, this step is not proposed as a linear process, but rather as a set of related components and activities that can be undertaken in the sequence that best suits the institution.
Scanning can be done on a regularly scheduled basis, such as annually, or on a continuous basis for environmental factors that are dynamic or that are of greatest interest to the institution.
The following diagram illustrates the external and internal environmental factors to consider. This process will add the extra assurance that your institution is linked in with partner agencies and others to assist in developing the broader environmental picture and in identifying EM-related interdependencies. Each institution has its own strategic and operational objectives, with each being exposed to its own unique risks, and each having its own information and resource limitations. An all-hazards approach to risk management does not necessarily mean that all hazards will be assessed, evaluated and treated, but rather that all hazards will be considered.
The aim is to generate a comprehensive list of risks based on those events that might prevent, degrade or delay the achievement of objectives. Risks should be realistic, based on drivers that exist in the institution's operating environment. It can be a useful tool for managing and addressing risks, as well as facilitating risk communication to stakeholders.
Descriptive scales can be formed or adjusted to suit the circumstances, and different descriptions can be used for different risks. Risk evaluation is the process of comparing the results of the risk analysis against risk criteria to determine whether the level of risk is acceptable or intolerable. The one most commonly used is the risk matrix (Figure 4), which normally plots the likelihood and impact on the x- and y-axes (the measured components of risks).
Similarly, certain assumptions will be made that influence the development of the SEMP building blocks. Although planning considerations will vary from institution to institution, the following identifies the most common planning considerations associated with the four pillars of EM planning. Geographical Information Systems (GIS) have not been included here since they are too numerous for the purpose. It also facilitates post-disaster recovery and reconstruction by providing a baseline against which plans can be developed. ERA determines the potential impact of an action on ecosystems, habitats and other ecological resources, and on human health and well being.
It calls for the instituting of a risk management plan that is periodically reviewed, and the results and decision properly consulted and communicated to all key stakeholders.
Monitoring also enables future predictions to be made more accurately and provides baseline information for future plans. Schopf officially joined the Office of the Vice President for Information Technology and CIO on Aug.
Representatives from Courseload and IU accepted the award at the IMS Global Learning Impact 2013 conference. Keyes, professor of applied mathematics and computational science at King Abdullah University of Science and Technology (KAUST) in Saudi Arabia, will be the keynote speaker. The event will let SDN Lab members test the interoperability of their products with Big Switch Networks' commercial controller, the Big Network Controller. The Department of Homeland Security awarded a $23.6 million grant to the Morgridge Institute for Research at the University of Wisconsin-Madison to create the Software Assurance Marketplace, which, over the next five years, will work closely with developers of new software analysis technology and the open source community to advance the security of software. DCII will be used for a range of applications, including management of massive research data sets, high-scale data analysis, genomic sequencing and computational visualization. Named Big Red II, the next-generation Cray XK supercomputer will be capable of one thousand trillion floating-point operations per second, or one petaFLOPS.
The university will carry out the pilot trials during a two-year evaluation period to assess the technologies that can best support the changing needs of students and faculty. Indiana University will receive $3.82 million of the award to continue running OSG's Operations Center, highlighting IU's noted expertise in grid computing and ability to deliver a reliable, secure, easy-to-use environment.
In 2009, the government service sector was the largest contributor to gross domestic product, at 37.1%. The increase was due to an influx of migrants, primarily from the English–speaking CARICOM countries and the Dominican Republic. Skilled health care personnel attended to pregnant women at prenatal clinics and performed deliveries.
While staff numbers were low, efforts continued through formal training opportunities and in–service training to ensure that staff remained versed with current best practices.
Rehousing opportunities were offered to some 25 persons in 2009, but the territory continues to experience inadequate housing. Obstetric cases were the third leading cause of hospital admissions (261) during the reporting period. Two mental health nurses and a visiting consultant psychiatrist formed the core of the mental health service delivery system in Montserrat. Montserrat has reciprocal social security agreements with OECS and CARICOM member countries.
Research activities carried out during the period under review included a Global School–based Student Health Survey (2008), and a survey entitled "Knowledge, Attitude, Beliefs and Practices of the Graduating Class of Montserrat Secondary School regarding HIV" (in 2006 and 2007). The territory has difficulties with respect to hiring and retaining health professionals and also relies on imported labor. In addition, one of the stated goals is to improve access to secondary and specialized health care services. EM planning, in particular, aims to strengthen resiliency by promoting an integrated and comprehensive approach that includes the four pillars of EM: prevention and mitigation, preparedness, response and recovery.
In addition, there are other existing EM planning documents and initiatives that apply to a range of federal government institutions, such as the Federal Emergency Response Plan (FERP) and deliverables under the National Strategy for Critical Infrastructure. This is also an ideal time to develop an initial budget for such items as training, exercises, research, workshops and other expenses that may be necessary during the development and implementation of the SEMP. Stakeholders may include First Nations, emergency first responders, the private sector (both business and industry), and volunteer and non-government organizations. This part of the process consists of three main activities: risk identification, risk analysis and risk evaluation. It involves the identification of risk sources, areas of impact, events and their causes, as well as potential consequences. A risk portfolio or profile can be created from the register, helping to compile common risks in order to assess interdependencies and to prioritize groups of risks.
Existing controls, the cost of further risk treatment and any policy requirement implications are considered when deciding on additional mitigation measures. Based on a risk diagram or rating matrix, a clustering of risks can be shown, leading to decisions on priorities. The aim is to develop a SEMP that integrates and coordinates elements identified in hazard-specific plans and BCPs. For example, an assumption might be made that the resources required to develop the SEMP will be paid out of the current fiscal year's budget. The process is continuous because an EMS is a process of continual improvement where it is constantly reviewed and revised. Thomas Sterling, professor of informatics and computing at Indiana University and executive associate director of IU's Center for Research in Extreme Scale Technologies, will deliver the closing address. Next.IU launched in fall 2012 with exploratory studies of Instructure's Canvas learning management system (LMS) and CourseNetworking's social media-based learning environment. Equipment from SDN switch vendors Dell, Extreme Networks, HP, IBM and NEC as well as SDN testing manufacturers Ixia and Spirent will be tested at the event. The tourism sector experienced growth in 2010 due to an increase in the number of visitor stopovers, cruise ship passengers, and excursionists (1). A report on volcanic activity between 28 February and 31 October 2010 indicated that activity had been low and that "there was no evidence of lava extrusion during this time" (2).
Thanks to collaboration with sectors other than health and with stakeholders, sanitation levels have improved throughout Montserrat. All pregnant women were tested for HIV and other selected sexually transmitted infections (STIs) during 2007–2010, and only one tested positive for HIV. Approximately one–fifth of students had been physically active for at last an hour every day during the week prior to the survey. The leading causes of mortality in 2006–2010 were chronic, noncommunicable diseases: diabetes mellitus (46), ischemic heart disease (33), hypertensive disease (20), and cerebrovascular disease (17). Institutions may choose to assess a portfolio of risks, as opposed to specific individual risks, which enables a holistic review of risk treatment decisions. Information can be gleaned from historical data, theoretical analyses, and informed and expert judgements.
Qualitative analysis is often simpler, but also results in high uncertainty in the results. Such a plot can help establish acceptable or intolerable risk levels, and establish their respective actions.
The continuing threat of the volcano has effectively limited the potential for economic growth, as it is difficult to maintain the population and economy at viable levels. Between 2006 and 2009, 153 deaths were certified by medical certificate and 28 through postmortem examination.
Williams, IU's first director of international networking, who is retiring after a 30-year career at the university. THESE VERY SAME ENFORCEMENT AGENCIES, WHO HAVE SWORN TO PROTECT AND SERVE, OUR COUNTRY, AND CITIZENS ,ARE BUT SOME, OF THE CORRUPT,GREEDY TRAITORS .ENGAGED IN THE TYRANNY AND TORTURE.
The school district has moved to a biometric identification program, saying students will no longer have to use an ID card to buy lunch.A  BIOMETRICS TO TRACK YOUR KIDS!!!!!i»?i»?A TARGETED INDIVIDUALS, THE GREEDY CRIMINALS ARE NOW CONDONING THEIR TECH!
Paul Weindling, history of medicine professor at Oxford Brookes University, describes his search for the lost victims of Nazi experiments.
The chairman of the board at ESL a€” then proprietor of the desert wasteland in Nevada known as a€?Area 51a€? a€” was William Perry, who would be appointed secretary of defense several years later. EUCACH.ORG PanelIn a 2-hour wide-ranging Panel with Alfred Lambremont Webre on the Transhumanist Agenda, Magnus Olsson, Dr. Henning Witte, and Melanie Vritschan, three experts from the European Coalition Against Covert Harassment, revealed recent technological advances in human robotization and nano implant technologies, and an acceleration of what Melanie Vritschan characterized as a a€?global enslavement programa€?.Shift from electromagnetic to scalar wavesThese technologies have now shifted from electromagnetic wave to scalar waves and use super quantum computers in the quantum cloud to control a€?pipesa€? a reference to the brains of humans that have been taken over via DNA, via implants that can be breathed can breach the blood-brain barrier and then controlled via scalar waved on a super-grid. Eventually, such 'subvocal speech' systems could be used in spacesuits, in noisy places like airport towers to capture air-traffic controller commands, or even in traditional voice-recognition programs to increase accuracy, according to NASA scientists."What is analyzed is silent, or sub auditory, speech, such as when a person silently reads or talks to himself," said Chuck Jorgensen, a scientist whose team is developing silent, subvocal speech recognition at NASA Ames Research Center in California's Silicon Valley.
We numbered the columns and rows, and we could identify each letter with a pair of single-digit numbers," Jorgensen said.
People in noisy conditions could use the system when privacy is needed, such as during telephone conversations on buses or trains, according to scientists."An expanded muscle-control system could help injured astronauts control machines.
If an astronaut is suffering from muscle weakness due to a long stint in microgravity, the astronaut could send signals to software that would assist with landings on Mars or the Earth, for example," Jorgensen explained. These are processed to remove noise, and then we process them to see useful parts of the signals to show one word from another," Jorgensen said.After the signals are amplified, computer software 'reads' the signals to recognize each word and sound. Our Research and Development Division has been in contact with the Federal Bureau of Prisons, the California Department of Corrections, the Texas Department of Public Safety, and the Massachusetts Department of Correction to run limited trials of the 2020 neural chip implant. We have established representatives of our interests in both management and institutional level positions within these departments. Federal regulations do not yet permit testing of implants on prisoners, but we have entered nto contractual agreements with privatized health care professionals and specified correctional personnel to do limited testing of our products. We need, however, to expand our testing to research how effective the 2020 neural chip implant performs in those identified as the most aggressive in our society. In California, several prisoners were identified as members of the security threat group, EME, or Mexican Mafia.
They were brought to the health services unit at Pelican Bay and tranquilized with advanced sedatives developed by our Cambridge,Massachussetts laboratories. The results of implants on 8 prisoners yielded the following results: a€?Implants served as surveillance monitoring device for threat group activity. However, during that period substantial data was gathered by our research and development team which suggests that the implants exceed expected results.
One of the major concerns of Security and the R & D team was that the test subject would discover the chemial imbalance during the initial adjustment period and the test would have to be scurbbed. However, due to advanced technological developments in the sedatives administered, the 48 hour adjustment period can be attributed t prescription medication given to the test subjects after the implant procedure. One of the concerns raised by R & D was the cause of the bleeding and how to eliminate that problem. Unexplained bleeding might cause the subject to inquire further about his "routine" visit to the infirmary or health care facility. Security officials now know several strategies employed by the EME that facilitate the transmission of illegal drugs and weapons into their correctional facilities.
One intelligence officier remarked that while they cannot use the informaiton that have in a court of law that they now know who to watch and what outside "connections" they have. The prison at Soledad is now considering transferring three subjects to Vacaville wher we have ongoing implant reserach.
Our technicians have promised that they can do three 2020 neural chip implants in less than an hour. Soledad officials hope to collect information from the trio to bring a 14 month investigation into drug trafficking by correctional officers to a close.
Essentially, the implants make the unsuspecting prisoner a walking-talking recorder of every event he comes into contact with. There are only five intelligence officers and the Commisoner of Corrections who actually know the full scope of the implant testing. In Massachusetts, the Department of Corrections has already entered into high level discussion about releasing certain offenders to the community with the 2020 neural chip implants.
Our people are not altogether against the idea, however, attorneys for Intelli-Connection have advised against implant technology outside strick control settings.
While we have a strong lobby in the Congress and various state legislatures favoring our product, we must proceed with the utmost caution on uncontrolled use of the 2020 neural chip. If the chip were discovered in use not authorized by law and the procedure traced to us we could not endure for long the resulting publicity and liability payments. Massachusetts officials have developed an intelligence branch from their Fugitive Task Force Squad that would do limited test runs under tight controls with the pre-release subjects.
Correctons officials have dubbed these poetnetial test subjects "the insurance group." (the name derives from the concept that the 2020 implant insures compliance with the law and allows officials to detect misconduct or violations without question) A retired police detective from Charlestown, Massachusetts, now with the intelligence unit has asked us to consider using the 2020 neural chip on hard core felons suspected of bank and armored car robbery. He stated, "Charlestown would never be the same, we'd finally know what was happening before they knew what was happening." We will continue to explore community uses of the 2020 chip, but our company rep will be attached to all law enforcement operations with an extraction crrew that can be on-site in 2 hours from anywhere at anytime.
We have an Intelli-Connection discussion group who is meeting with the Director of Security at Florence, Colorado's federal super maximum security unit.
The initial discussions with the Director have been promising and we hope to have an R & D unit at this important facilitly within the next six months. Napolitano insisted that the department was not planning on engaging in any form of ideological profiling. I will tell him face-to-face that we honor veterans at DHS and employ thousands across the department, up to and including the Deputy Secretary," Ms. Steve Buyer of Indiana, the ranking Republican on the House Committee on Veterans' Affairs, called it "inconceivable" that the Obama administration would categorize veterans as a potential threat.



Survival kits melbourne university
First aid kits uk boots pharmacy
National geographic documentaries mermaids

Rubric: Emp Bags



Comments

  1. Leyla_666
    Ovens and wireless neighborhood that friendly forces are in utter chaos now here.
  2. nedved_42
    And Haslett, also and Charles Green offers in their get bites on exposed.
  3. Juli
    Often straightforward to neglect this till facilities.