Blog

  • More lessons from Wales for moving beyond coal

    by Jonathan Hiskes

    Guardian columnist
    George Monbiot reported
    recently
    on the unlikely groundswell of environmental progress in Wales, the
    Appalachia of the U.K.
    Its national Plaid Cymru party is more progressive and
    more ambitious than Britain’s three leading parties when it comes to building a
    low-carbon economy.

    Monbiot argues that it’s
    the unusually flexible and open political climate that enable Wales’ success: “The
    English like to think of themselves as a modern and sophisticated nation, and
    sometimes ignorantly view the Welsh as backward and uncouth. But as far as
    democracy is concerned, the English are light years behind.”

    I tried to make a
    similar case last month. After visiting Welsh cleantech businesses and research
    hubs for a week, I suggested it’s the political culture plus a national existential crisis brought on by the
    collapse of the coal-mining industry that are driving Wales’ ambitious effort to become a cleantech leader. Because West Virginia
    and other coal-dependent regions of the U.S. are following the same coal-driven
    trajectory, just a few decades behind, Wales has a lot to teach them.

    If you want the audio
    version, I spoke
    with Marc Steiner of WEAA Baltimore
    about Wales’ lessons for Appalachia. Or
    you can skip right over me and listen to Marc talk to West Virginia mountain-defender
    Maria Gunnoe, who knows
    her stuff
    .

    Related Links:

    Hey, look: Denver has a bike-sharing program

    Massey denies time off for workers to attend funerals of mine victims

    Burning oil rig sinks into Gulf of Mexico






  • Cubigel Compressors launches the green cooling ranges

    Cubigel Compressors launches the green cooling ranges

    Cubigel Compressors introduces the new green cooling ranges in accordance to market trends and being in the vanguard of energy saving technology.

    The advanced design of Cubigel Compressors’ Green Cooling ranges allows a remarkable efficiency improvement by becoming the most suitable component for a sustainable refrigeration application.

    The green cooling ranges comprises the High Efficiency Range, Natural Refrigerants Compressors and the Variable Speed Compressors:

    – The High Efficiency ranges have the most extended series working with R134a, R404A and natural refrigerants R290 and R600a for both, HMBP and LBP applications. These ranges get to improve the compressor COP between 20% and 30%.

    – The use of Natural Refrigerants as R290 and R600a – with no direct effect on global warming – increases the compressor’s performance, and reduces the applications’ energy consumption.

    – The Variable Speed Compressors offer the lowest energy consumption by adopting electronically controlled running modes.

    You will have the following benefits and advantages by using the green cooling ranges:

    – Energy savings, therefore a reduction of operative costs for your final clients
    – Reduction of CO2 emissions to the atmosphere
    – Enhanced efficient application
    – Sustainability
    – No specific adaptation on refrigeration systems
    – Extended range of efficient compressors and Natural Refrigerants for any type of applications

    You can easily identify Cubigel Compressors’ green cooling products in our catalogues, as they are marked with a green leaf.

    With the introduction of the best and most complete Green Cooling Range for more sustainable applications, Cubigel Compressors takes care of the environment and contributes to the reduction of the CO2 emissions to the atmosphere.

  • Nearly 100% Out-of-Africa in the past 100,000 years | Gene Expression

    Since I’ve been talking about the possibility of admixture with “archaics” (I’m starting to think the term is a bit too H. sapiens sapiens-centric, is the Neandertal genome turning out to have more ancestral alleles?) I thought I’d point to a paper out in PLoS ONE which reiterates the basic fact that the overwhelming genetic evidence today suggests a massive demographic expansion from an African population within the last 100,000 years. Study after study has supported this contention since the mid-1980s. The question is whether this is the exclusive component of modern human genetic ancestry, which is a somewhat more extreme scenario. In any case, the paper is Formulating a Historical and Demographic Model of Recent Human Evolution Based on Resequencing Data from Noncoding Regions:

    Our results support a model in which modern humans left Africa through a single major dispersal event occurring ~60,000 years ago, corresponding to a drastic reduction of ~5 times the effective population size of the ancestral African population of ~13,800 individuals. Subsequently, the ancestors of modern Europeans and East Asians diverged much later, ~22,500 years ago, from the population of ancestral migrants. This late diversification of Eurasians after the African exodus points to the occurrence of a long maturation phase in which the ancestral Eurasian population was not yet diversified.

    They took 213 individuals, a little over half from diverse African groups, and the other half split evenly between Europeans and East Asians, and sequenced 20 distinct noncoding autosomal regions of the genome. ~27 kilobases per person. The noncoding part is important because they are trying to look at neutral regions of the genome, not subject to natural selection (this is obviously an approximation, as there is some evidence that even noncoding regions may have some selective value). The variation is what you’d expect, Africans more varied than non-Africans, and the two Eurasian populations are distinct from each other, but less so than either is from the Africans. Lots of statistics ensue, and an “Approximate Bayesian Computation (ABC) analysis.” I’ll cut to the chase, the highest probability model is illustrated in panel A of figure 4. Expansion out of Africa ~60,000 years ago, major bottleneck, a ~40,000 year interregnum where there was a relatively unified Eurasian population genetically, and then a separation between East and West Eurasians ~20,000 years ago.

    journal.pone.0010284.g004

    I’ll stipulate that I haven’t dug deep into the statistics, nor would I really comprehend all the details if I did spend a weekend on it. But I’m rather skeptical of the 40,000 year period of a common Eurasian population. Reading the text where they discuss this finding it seems clear that it was surprising to the authors, and I’m not sure how convinced they are about it either. It is interesting that the second most probable scenario, B, is a simultaneous expansion out of Africa by two different groups which lead to East and West Eurasians. That makes me a little less confident about the details on Eurasian demographic history overall than I’d already been. They do note that some Y chromosomal data imply that all Eurasian populations may have derived from a Central Asian group, and the settlement of Europe ~35,000 years ago may actually indicate population replacement (though it’s pretty clear that many Central Asian groups have been recently heavily admixed with the incursion of Turks from Mongolia in historical time overlain upon a Iranian substrate, and some sequencing of ancient Cro-Magnon mtDNA shows that their haplgroup is still found in many Eurasian, and even New World, populations). Perhaps there is a more complicated story to be told about the replacement of early modern H. sapiens sapiens by later H. sapiens sapiens. I wouldn’t discount it, but one analysis does not push me to consider this at all likely. Additionally, they obviously couldn’t test the “two wave” model Out-of-Africa whereby there was a southern migration which skirted the Indian ocean along with a north wave which pushed into Central Asia; they didn’t have any “southern” Eurasian samples. Also, I do want to make a note of the fact that they had a lot more parameters in their model than I’m mentioning, including migration between the two Eurasian groups.

    But let’s jump to the conclusion and highlight a portion which is relevant to what I’ve been discussing on this weblog over the past few days. As I observe above they constructed scenarios with different parameters to see which fit the data best, and one of those parameters was interbreeding with older hominin groups in Eurasia. Here’s what they say in the discussion:

    For those historical and demographic parameters that have been previously studied, our co-estimations are in agreement with previous reports, highlighting the general accuracy of our estimates. For example, our estimation of the replacement rate of archaic hominids by modern humans, although indicating that the introgression of archaic material into the gene pool of modern humans has been minimal, did not rule out the presence of minor archaic admixture of other hominids in modern humans in agreement with previous observations…However, it is important to emphasize that our inferences are based on non-coding neutral regions of the genome and that adaptive introgression from archaic to modern humans may have occurred to a greater extent…Indeed, in contrast to neutral alleles, adaptive variants may attain high frequencies by natural selection after minimal genetic introgression. Future studies comparing coding-sequence variation in modern humans and extinct hominids (e.g. Neanderthals) should help to answer this question.

    Their models don’t offer any plausible scenarios where more than 1% of the sequence which they analyzed was derived from populations which were not from the recent Out-of-Africa movement. But, they do specifically say that they lose power to ascertain whether there was admixture at levels below 1%. At some point in the medium term future when we have a fair amount of ancient DNA from Neandertals sequenced, as well as a lot of genomes of modern human beings, if we still don’t find any evidence for alleles which have introgressed from other lineages which had long been separated, the time for hedging may be over. But at this point there’s still some wiggle room. What I’m wondering though is how the University of New Mexico group found lots of evidence of introgressed lineages when other groups have not. Granted, they had 10 times as many individuals and more diverse populations, but presumably far less of the genome. If there was admixture which we could detect, in light of the nearly two decades of this sort of stuff, I assumed it would be cases of adaptive introgression. Here a very low level of admixture could still lead to the increase in frequency of a haplotype which bears the hallmarks of having been in a distinct population from H. sapiens sapiens for long periods of time (like haplogroup D for the microcephalin gene). In other words, I assumed that evidence of introgression would be a story of genetics & natural selection and not genomics & admixture. For instance, particular metabolism genes and the like which new Africa populations might have picked up just like they’d eventually develop their own adaptations from mutation or extant variation if they didn’t admix. I guess 614 microsatellites may not count as genomics, but if adaptive introgression on a few select genes was how we’d detect interbreeding between native Eurasian groups and the Africans this not a way I’d assume you could find any evidence of that.

    Citation:Laval G, Patin E, Barreiro LB, Quintana-Murci (201). Formulating a Historical and Demographic Model of Recent Human Evolution Based on Resequencing Data from Noncoding Regions PLoS One : 10.1371/journal.pone.0010284

  • Augmented Reality Flashmob Kicking Off Tomorrow In Amsterdam [Augmented Reality]

    Armed with either an iPhone or Android, hundreds of Amsterdam residents are expected to converge on Dam Square tomorrow at 2pm for the first ever augmented reality flashmob. Darth Vader, Superman and various other characters will be making super-special appearances. More »







  • Palm buyout rumor du jour: HTC out, Lenovo back in?

     

    Despite what many had hoped, the latest rumor right now is that HTC has stepped away from talks to buy Palm out. This according to a Reuters report, which further suggests that Lenovo might be back in the game. As for HTC bowing out, the ever-popular ‘source with direct knowledge of the matter’ said ‘There just weren’t enough synergies to take the deal forward.’

    I’ve thrown it out there before that I think Lenovo would be a great candidate to buy Palm – but that’s me. What do you think? Does the fact that Lenovo successfully purchased and transitioned ThinkPad convince you that they could do the same with webOS?

  • What Are Some Of The Most Famous Confidence Tricks?

    Whether you call them  con artists, grifters, flim flam men, thieves or scammers, these charismatic crooks have been working their games since man invented currency. They are part actor, part cheater, and the schemes they run are all designed to part their victims from their hard earned cash.

    There are dozens of tricks and schemes that confidence artists use, and they all have a great many variations, but these are some of the most common, and most effective.

    The Money Box Scheme


    This is one of several “get rich quick” schemes that work only if the victims or marks are both gullible and greedy.

    The thief convinces his victims that he has obtained the engraving plates that enable him to print legal $100 bills. He shows them the “money printing machine” he has set up, and explains that it is a very slow process but that it works; giving them several real $100 bills to examine while claiming they were printed by the money machine. Once the victims are convinced the machine works, the con artist just waits for greed to do his work for him. Eventually the victim “convinces” the thief that he must have that machine, and pays an exorbitant amount of money for it.

    Once it’s in the possession of the victims, the machine will produce two more bills over a twelve hour period, but after that the machine only spits out blank paper. When examined closely, the machine has no printing plates, and the money it printed out will prove to be real, their only purpose to distract the mark while the thief makes a run for it.

    The Fake Mugger


    Two con artists spot their victim and set up the scene.  One will then steal the purse and take off running, while his accomplice yells “Stop thief” loudly and makes a show of chasing after the “thief”. While the witness watches, the accomplice wrestles the purse away from their partner, regaining the purse but somehow always managing to let the “thief” escape. Any reward given to the brave citizen for their assistance is then split between the two crooks.

    The Glim Dropper


    This scam requires several accomplices and was originally done with a glass eye, although the modern version often uses the story of a custom made contact lens instead. One of the con men goes into a store and will pretend he has lost a glass eye. He involves staff and customers in a search, but the eye remains missing. Feigning great concern, the thief will declare that it’s very valuable and he will pay a large reward to the finder. He leaves his contact information (which is as fake as the rest of his story) and leaves.

    The next day a second con man enters the store and pretends to find the glass eye. For the scam to work, the store manager needs to be greedy enough to act selfishly and try to keep most of the reward money for themselves. Usually they will offer to take the eye and return it to the owner themselves.  The con man who “found” the eye will argue, asking for the owners contact information and expressing a desire to return it himself.  

    Eventually the thief will manipulate the manager into offering a small reward, bargaining with them until the finder is offered a decent amount of cash, though nothing compared to what the owner thinks he will be given for the return of the missing glass eye.

    Of course once the thief has the money, he vanishes and the one eyed man cannot be contacted and never returns, leaving the manager out the money he paid the finder.

    The Human ATM


    Despite the simplicity of this scam, it works with alarming regularity.  

    The first step is to place an Out of Order sign on the screen of the bank’s Automated Teller Machine. The thief will be wearing a security guard uniform and will play the part to the hilt, standing to attention and greeting each customer as they approach. As customers come by to try and make their usual cash deposits, the “guard” will explain that he works for the bank and has been assigned to take in all deposits by hand, since the ATM is malfunctioning.  He will go so far as to write out a receipt for the cash received, while asking for their account number and PIN so the transaction can be finalized later.

    The thief will take off with both the cash and the banking information of every victim he scammed, using that information for further financial gain.

    The Fiddle Game


    Two thieves work together for this scam. One will be dressed in well worn clothing and carrying a violin case. He’ll enter a restaurant and order a meal. When the bill comes he will claim to have left his wallet at his home, just a few blocks away. As collateral he offers to leave his violin, explaining that he is a musician and this violin is his most treasured possession and his source of income.

    The second thief will have already been in position, and after the first man leaves he will hurry over and offer an outrageous amount of money for the violin, claiming it’s a rare instrument and nearly priceless.  He claims to have to leave for an appointment, but leaves his card and insists that he will pay the vast sum if he can only get the violin.

    If the mark has been well chosen, their greed will cloud their judgement and when the “musician” returns to pay for the meal they will offer to buy the violin, offering to pay a small percentage of what the second thief offered to buy it for.  The first thief will bargain, and then finally agree to sell his cherished violin. He then departs with the cash, and the victim is left with a cheap instrument and no recourse.

    Beijing Tea Scam


    This scam is common in Beijing, China and focuses on tourists unfamiliar with the country and its customs. The con artists work in pairs and try to befriend tourists. They will chat and act friendly, often explaining they are just looking to practice their English.  After a time they will suggest a trip to see a tea ceremony, assuring their mark that it is well worth the money and a wonderful experience.

    The victim is never shown a menu, and the thieves ensure that that their mark is distracted and never inquires too closely as to the price. After the ceremony, the bill is presented and the total usually comes to over $100 per person. The thieves will appear to pay their bill, leaving the victim to follow suit.  Once the victim departs the profits are split and the scene is set to repeat itself with a new victim.

    The Spanish Prisoner Trick


    This scheme started in the 1800’s, though these days it is most often seen in its online incarnation as the Nigerian Money Scam; proving that even 200 years later flattery still works and greed can still overcome common sense.

    The thief has to convince the mark that he is in contact with a wealthy person who has been wrongfully imprisoned under a false identity. The unfortunate individual cannot reveal his identity, and thus he is relying on friends to raise the money to secure his release. Once the prisoner has been freed, the con man assures his mark that anyone who helps will be richly rewarded financially, and in many variations there was a promise of marriage to the rich man’s lovely daughter.

    The mark is repeated told that they are being entrusted to a great secret, and have been selected to help because they are known to be honest, upright individuals. If the mark falls for this combination of flattery and flim-flamming, he will find that there are always more problems to be over come, and the demand for more money will continue until either the victim realizes the scam or he runs out of money.

    Mine Salting


    This confidence scam requires planning and an investment in time and materials, but has the potential for the richest rewards. The Bre-X scam of 1995 cost its investor’s millions and millions of dollars and was the most elaborate fraud in the history of the mining industry.

    The con artist plants gold ore or gems into an area where they claim a mine is being developed, encouraging their marks to invest in a worthless or even non existent mining company. The name comes from the gold rush, where the flim flam men would load shotguns with gold dust and shot it into the sides of empty mines, making them appear to be rich with ore. Once the marks have invested all they have, the thieves vanish with their money, leaving the victims with worthless stakes in a mine that never existed.

    The Melon Drop


    One of the simplest of scams, this one got its name from the days when a watermelon was a rare commodity in Japan, worth over $100.  

    The con artist would target a Japanese tourist and intentionally bump into them, all while making it appear to be an accident.  The watermelon he was carrying would drop and be destroyed, all while blaming the mark for the accident and demanding they pay for the lost watermelon. The mark, would then be convinced to pay $50-$100 for the fruit, when in actual fact they cost only a few dollars outside of Japan.

    A more general version of this scam is to have a pretty young woman carry a well wrapped gift box full of broken glass. When she bumps into the mark, she will claim it was an expensive glass vase, newly purchased as a gift and act distraught until the victim (usually a man) offers to pay for the broken “vase.”

    Real Estate Swindles


    There are a number of ways this scheme is run. One of the most common involves the con artist claiming to be a landlord and taking multiple deposits on a home that the he himself has no claim to. The thief absconds with the deposits, leaving the victims without their money or a place to live. In every case, the key is that the grifter has no claim to the real estate he is attempting to sell, making him untraceable.

    The most audacious scams have involved landmarks like the Brooklyn Bridge in New York and the Eiffel Tower in Paris. Victor Lustig sold the Eiffel Tower twice,  each time managing to convince his victim he was a government official attempting to sell the Eiffel tower for scrap metal because it was too expensive for the government to maintain.

    George C. Parker sold the Brooklyn Bridge a number of times using his charm and well forged ownership papers to convince people that he was legitimate.  He would draw them in with their avarice, telling them they could make a fortune by converting the bridge to a toll bridge. In several instances his victims were so convinced they owned the bridge they had to be stopped by police while they were attempting to put up toll barriers.  It was from these exploits that we have the popular culture expression “”and if you believe that, I have a bridge to sell you.”

  • Stunning first images from NASA’s Solar Dynamics Observatory

    A full-disk multiwavelength extreme ultraviolet image of the sun taken by SDO with false c...

    Although we do know some things about the Sun – it’s big and hot for example – in many ways it remains a great mystery to scientists. In a bid to shed some more light on our closest star, NASA launched its most advanced spacecraft ever designed to study the Sun in February this year. The goal of the the Solar Dynamics Observatory (SDO) is to help us understand where the Sun’s energy comes from, explore its inner workings, and learn more about how energy is stored and released in the Sun’s atmosphere. A nice side benefit will also be the capture of stunning images – the first of which have just been released…
    Continue Reading Stunning first images from NASA’s Solar Dynamics Observatory

    Tags: ,
    ,
    ,
    ,

    Related Articles:


  • Google Invites ISPs to Use Its Super-Fast Fibre Network

    Google’s plans to offer fiber-to-home Internet connections to as much as 500,000 people probably has ISPs in the US on edge, but the company is trying to show them that it is not the enemy. In fact, it’s welcoming anyone to use the infrastructure once it is deployed and offer Internet services on Google’s fiber.
    read more)

  • World’s smallest, lightest telemedicine microscope

    The prototype for the compact, lightweight lensless microscope developed at UCLA (Image: O...

    Making use of novel lensless imaging technology, a UCLA engineer has invented the world’s smallest, lightest telemedicine microscope. The self-contained device could radically transform global health care – particularly in Third World countries – with its ability to image blood samples or other fluids. It can even be used to test water quality in the field following a disaster like a hurricane or earthquake…
    Continue Reading World’s smallest, lightest telemedicine microscope

    Tags: ,
    ,
    ,

    Related Articles:


  • Get BlackBerry 6.0 Now…Kind Of [BlackBerry]

    Ok, it’s not BlackBerry’s next OS, 6.0, but it looks like it, non? The 6.0-inspired theme comes just days after leaked screenshots appeared, and includes fully-customizable icons, animated icons and a few other next-gen-like features. [Mobihand via KnowYourCell] More »







  • Kia Cerato ganha prêmio ‘Top Safety Pick’ do IIHS, nos EUA

    Kia Cerato
    Seguindo os passos do crossover urbano Kia Soul, o sedã Kia Cerato (conhecido como ‘Forte’ em alguns mercados) foi reconhecido pelo Instituto de Segurança para Proteção nas Estradas (IIHS, sigla em inglês), dos Estados Unidos, e recebeu o prêmio ‘Top Safety Pick’ 2010 na categoria Carro Pequeno. O novo Cerato, que substituiu o modelo Kia Sephia no segmento de sedãs compactos, recebeu a honra máxima da organização ao ganhar a nota ‘Bom’ – a mais alta de todas – em crash test de segurança frontal, lateral, traseiro e capotamento.

    “A marca Kia tem crescido rapidamente nos Estados Unidos graças a novos veículos, como o Cerato, que incorporam nossas filosofias fundamentais de qualidade, valor, estilo e segurança”, disse Michael Sprague, vice-presidente de Marketing da Kia Motors América. “O Cerato é um veículo de estilo jovem e dinâmico, com uma variedade impressionante de itens de segurança de série. Ser honrado com um prêmio ‘Top Safety Pick’ o promove a candidato top em seu segmento e a um veículo que oferece aos consumidores um pacote completo”.

    As notas do Instituto são baseadas em resultados de crash test frontal, lateral e traseiro. Pela primeira vez, uma boa performance em teste de força do teto para medir a proteção em um capotamento foi exigida para ganhar. A avaliação geral de cada veículo foi baseada em várias medidas específicas para cada ângulo de batida e para o impacto geral nos bonecos de teste dentro do veículo no momento da colisão.

    Fonte: Kia


  • A bit more KIN specs leaked

    kin14 kin24

    We now know nearly everything about the KIN One and Two devices, but a little bit more info was released recently, courtesy of John Starkweather’s GTGT profile, where both KIN One and KIN Two devices showed up.

    The new info consists of the processor speed, which is listed at 600 Mhz.  Still not confirmed is whether the phones are powered by NVidia Tegra or not, but this is still believed to be the case.  The other is finally the depth of both devices, which is listed as 0.75 inches (19 mm) which would make them pretty chunky indeed.

    See the full profiles here and here.

    Via Engadget.com


  • Green design gets a second skin

    StudioDosi's design is wraped in a  layer of climbing vegetation

    This beautiful architectural proposal from Italian firm StudioDosi is as green as it looks. Submitted in a competition to design a new headquarters for the Province of Parma in Italy’s north, the public office space features a double glazed inner skin wrapped in an exoskeleton of “climbing vegetable stripes” which allows natural light to enter the building and boosts ventilation. ..
    Continue Reading Green design gets a second skin

    Tags: ,

    Related Articles:


  • YouTube Opens Up Video-Rental Store

    YouTube is plowing ahead with video rentals, despite initial results being less than encouraging. The Google-owned video site has now opened up a rental store to house all of the available material. The range of videos offered has grown considerably since the January tests, but it’s not exactly exhaustive. Videos rent for $0.99 to $3.99 and range from f… (read more)

  • Detroit: America’s Laboratory for Innovation

    World Wide Wade
    Wade Roush wrote:

    What the heck is Xconomy doing opening a bureau in Detroit?

    The same thing we’ve been doing all along: seeking out technology innovators in key cities and chronicling the work they’re doing to turn their ideas into businesses that will drive the economy forward, both regionally and nationally.

    There’s no question that Detroit falls short on many of the ingredients that propel tech-company growth in Xconomy’s other home cities of Boston, San Diego, and Seattle—things like an existing network of experienced serial entrepreneurs, a deep-rooted ecosystem of venture and angel investors, a menagerie of big high-tech anchor companies, and multiple top-level universities and research institutions churning out highly trained graduates and new technology concepts.

    But in Detroit, the need for innovation is far more urgent than in any of those other places. So it’s going to have to make do with, and build upon, the resources it does have. And there’s nothing about the character of Detroiters or the automotive industry’s current woes to convince me that the city can’t bounce back.

    For one thing, there’s no choice. The stakes are too high. If a way can’t be found to restart entrepreneurship and risk-taking in the region’s manufacturing, services, and technology industries, the city’s population, tax base, and infrastructure will continue to erode.

    But more importantly, Detroit is a city of big ideas and big accomplishments. It’s the home of world-changing inventions such as the refrigerated railroad car, the automatic traffic light (the first one was installed at the corner of Woodward and Michigan in downtown Detroit in 1920), the mechanical clamping mop, and, of course, the assembly line—which became the key not just to unprecedented middle-class prosperity, but to the Allies’ victory in World War II. And that’s not even counting Vernors ginger ale (which was always in abundant supply around my grandparents’ house in Charlotte, MI), guerilla marketing, techno and rap music, and the Last Word (a cocktail combining gin, maraschino liqueur, lime and green Chartreuse).

    And let’s not forget that Detroit is also home to two of the country’s largest corporations. Ford is currently America’s eighth largest company, and GM is No. 15, according to Fortune magazine. None of Xconomy’s other home cities can claim even a single company in the top 30, as measured by revenues. (Seattle-born Boeing is No. 28 but is now headquartered in Chicago, and Microsoft is No. 36.)

    With such a powerful history of innovation behind it—much of it showcased at Dearborn’s Henry Ford Museum, whose collection of technological artifacts is rivaled only by the Smithsonian’s—Detroit is a city that no one should write off. Time Inc. certainly isn’t: last fall, the media giant bought a house in Detroit and is spending a year …Next Page »

    UNDERWRITERS AND PARTNERS



























  • COPS 010 – New compact dewatering unit

    The smallest amounts of free water can cause acidification in oils and corrose component surfaces. An increase in water content can dramatically alter the characteristics of the oil. The consequences include reduced load capacity, lower temperature resistance and, ultimately, rapid oil oxidation (aging), which all result in economic damage.
    Free water can be detected by the milky clouding of the oil irrespective of the oil’s color.

    Some of the causes of water in hydraulic and lubricating oil:
    ambient moisture splash water cooler breakage

    With the new COPS mobile dewatering unit large quantities of free water can be removed economically.
    The oil is heated and channeled into a vacuum chamber. The water is removed quickly, long before the saturation limit is reached, thanks to the reduced steam pressure.

    A fine filter is installed downstream from the drying process to ensure that the oil is dry and filtered when it flows back into the machine or tank.

    Water content is constantly monitored with the ARGO-HYTOS “LubCos H2O+” oil condition sensor. A digital display reading relative humidity and indicator lights showing the current state of the dewatering process.

    Thanks to its compact design, low weight, high efficiency, and ease of use, COPS can operate in places where space is limited.

  • FM and CSA Certify Ultrasonic Gas Leak Detector

    General Monitors is pleased to announce that the Gassonic Observer is now FM and CSA certified.

    FM and CSA certification assures customers that the Gassonic Observer has been evaluated through independent scientific testing and found safe and reliable. FM Approvals and CSA International are leading providers of product testing and certification that test products for compliance with hazardous locations and product performance standards.

    Ultrasonic gas leak detection adds an important layer of protection to General Monitors’ gas and flame detectors. The detection technology enhances gas detection efficiency by producing sensors that quickly respond to the ultrasonic noise generated by escaping gas. Ultrasonic gas leak detectors can detect gas leaks regardless of ventilation rate, gas dilution, or the direction of the leak — and without the gas having to make physical contact with a sensor element. The instruments are the ideal choice for rapid detection of pressurized gas leaks in open and ventilated areas.

    The Gassonic Observer features a robust microphone and a detection radius of up to 20 meters at a leak rate of 0.1 kg/s. In addition, the detector offers the Senssonic™ integrated acoustic self-test, which periodically verifies the integrity of the electronic circuitry and the operation of the acoustic sensor. The detector is FM certified to IEC 61508 as SIL 2 suitable and is also approved under ATEX, C-UL and IECEx norms.

  • DRTB Series thermocouple terminal blocks

    Omega Engineering introduces the New DRTB Series thermocouple terminal blocks. They are designed and manufactured by Omega using thermocouple alloys to guarantee accurate readings. The terminal block has a built-in female socket to accept a miniature thermocouple connector. This novel feature enables the user to insert a plug for easy connection to a handheld device allowing installation testing, quality assurance compliance, troubleshooting or repairs without interrupting the signal or circuit.

    The terminal blocks are fully enclosed and require no end plates. The screws and clamps are zinc plated and together they provide an excellent vibration, maintenance free and corrosion resistant connection.

    DRTB terminal blocks mount on standard 35 mm DIN rails or 32 mm G-type rails and are identified with calibration type and positive (+) and negative (-) connections. Wire entry is funnelled to allow quick wire insertion even with stranded wire.

  • CMF Color Analyzer PW0049

    The module PW0049 is a stand-alone measuring device which is conceived for the absolute measurement of self-illuminating objects.

    Its function is to reproduce the CIE 1931 2° CMF’s as precisely as possible. The resulting Tristimulus measuring values X, Y, Z form the basis of most of the common color spaces used today.

    By means of the integrated three-sector color sensor and additional procedures, the visional sensation of the human eye is imitated with an accuracy that can be compared to decidedly more elaborate spectrometric procedures.

    The scope of delivery contains a comfortable and intuitive software tool for setup, parameterization and output of color values in different modes.

    Special optimizations for the following light sources are contained in the scope of delivery:

    CCFL LED white LED colored Rot optimized LED´s
    RGB Backlight White LED Backlight RGB light source RGB and white

  • Tanis Custom Abrasive Nylon Brushes

    Custom engineered abrasive nylon brushes are designed to optimize your productivity. Tanis Incorporated technical sales and engineering staff will help design and manufacture the abrasive nylon product best suited to meet your objective. Abrasive nylon products manufactured by Tanis Incorporated will exceed your expectations to enhance production by reducing cycle times and eliminating secondary labor operations.

    Tanis Abrasive Brush Benefits & Uses
    Abrasive nylon brushes for cleaning, deburring and polishing
    Silicon carbide, aluminum oxide and alumina silicate impregnated nylon brushes
    Twisted-in-wire miniature and internal tube brushes
    Disc brushes for deburring, finishing and polishing
    Ferrule End brushes for deburring and finishing.

    Wheel and stem-mounted brushes for industrial deburring and finishing applications Cylinder and metal back coils custom manufactured for internal and external applications Engineered products custom designed