Sentences with phrase «identify threats to other»

The ability to quickly find injured or deceased island foxes helps biologists identify threats to other island foxes and allows everyone to act quickly to protect entire island fox populations.

Not exact matches

For the 2015 growing season, FarmLogs introduced a free crop - health monitoring tool that uses satellite images to identify flooding, pest problems and other threats.
By July 2006, experts had identified nearly 185,000 different viruses and other threats, according to malware expert Graham Cluely, senior technology consultant for Sophos plc, a U.K. - based British antivirus firm.
Identifying with Radha's pounding breasts as she steals out at night to meet Krishna, other poets graphically describe her fear while merely hinting at the suppressed thrill of her sortie, the arousal sharpened by the threat of discovery.
Online, there is less danger of actual violence (though threats of violence are depressingly common), but the mentality is the same: an enemy or victim has been identified and we egg each other on to more intense, more creative, more extreme expressions of communal anger and hate.
He identified other negative effects of corruption as, posing a real threat to national security; eroding the development of a universal culture of good governance, democratic values, gender equality, human rights, justice and the rule of law.
Researchers have identified gamba grass and other invasive weeds as a potential threat to landholder involvement in environmental offset programs such as the Carbon Farming Initiative.
The study used rigorous statistical methods to identify changes in fish populations attributable to the MPA and not due to other pre-existing factors, such as preferentially locating MPAs where threats are low.
The study identifies new components of consumer ethnocentrism, establishing, in consultation with other research on the topic, five distinct dimensions in the process: prosociality, in which the interest of one's country is more important than one's own; cognition, or interpreting the world from the point of view of one's own ethnic group; insecurity, or regarding foreign products as a threat to the domestic economy; reflexiveness, meaning that one's ethnocentrism is automatically activated; and habituation, in which ethnocentrism becomes a habit.
In other words, the threat of being identified as low - performing caused schools to change their practices in ways that improved long - term student outcomes.
Animals deemed as dangerous would be required to wear large red tags on their collars identifying them as a potential threat to others.
One kennel worker at Puppy Haven, who didn't want to be identified because of safety concerns, said she'd received threats that her house would be burned down, that she or others who worked there could have their arms or legs broken.
The art design — on the other hand — is superb; every sprite is beautifully and effectively animated, which helps to identify imminent threats in attack sequences, particularly when things get hectic.
Seen as a «significant threat» to art buyers, the recent Pollock fakes join the many others identified by IFAR.
Joronen and Oksanen (2012) more constructively identified three key features: in emergency: «climate change is an immediate or impending threat», that extends to «life and health of humans and many other life forms» and is highly likely to result in «social disorder, for example economic turmoil and mass migration of climate refugees», in the absence of immediate action.
The SOUTHAMPTON CHAMBER OF COMMERCE — REPORT OF THE Economic Crisis Committee 1933 accurately identified the fundamental flaws in our banking and monetary system but like all other threats to the monopoly of banking interests, was buried.
After these threats are identified for each resource, then the relative risk from natural - and human - caused climate change (estimated from the global climate model projections, but also the historical, paleo - record and worst case sequences of events) can be compared with other risks in order to adopt the optimal mitigation / adaptation strategy.
After these threats are identified for each resource, then the relative risks can be compared with other risks in order to adopt optimal preferred mitigation / adaptation strategies.
These include possession of a firearm by a felon, possession of burglary tools or drug paraphernalia, driving with an open container of alcohol, violation of a restraining order, possession of explosives without a license, buying scrap metal or pawn items (or selling Sudafed) without recording the other party's identifying information, providing material assistance to terrorism, selling firearms to someone in violation of regulations, and making various kinds of credible threats (although these are usually pertaining to someone specified crimes).
However, a teacher told The Miami Herald that Cruz may have been identified as a potential threat to other students.
• Arbitrate software application installation and upgrading processes, system inspection and troubleshooting procedures • Execute network channeling, wireless configuration and connectivity set up • Evaluate existing routing, LAN / WAN, network type and security status and take measures to enhance the same • Collaborate with telecommunications department to ensure delivery of highest quality network services to customers • Coordinate with IP service providers for inter and intranet provision and maintenance • Identify hardware and software threats proactively, initiate maximum protection SOPs for the same and recover systems in case of infection • Facilitate users in creating and maintaining new accounts • Conduct regular analysis and maintenance of voice, video and data communication networks • Carryout problem identification, resolution and general troubleshooting of network related issues • Generate and handle email, data distribution and communication systems • Provide help desk support and perform hardware and software installation and network configuration • Take periodic backup of systems and provide the users with same in case of system collapse • Repair and replace faulty or damaged network cabling as and when required • Facilitate the team in development of new network designs and architecture • Connect user servers with other servers at various workstations using localized internet services • Initiate, develop, implement and enhance network security policies • Track and resolve fault tickets using latest TCP based troubleshoot strategies in minimal time • Determine all aging servers and systems and upgrade the same to latest Operating System versions • Maintain productive business relations and effective communication channels with department coordinator and broadband vendors
Professional Experience St. Tammany Parish Sheriff Office 2010 — Present Corrections Deputy • Oversaw prison facilities and inmates ensuring orderly and efficient operations • Responded to emergent situations including fires, assaults, and other security threats • Received, searched, processed, and monitored inmates • Analyzed surveillance of prison and identified facility and staff vulnerabilities • Proposed procedural changes to remedy system shortcomings • Controlled public access to prison facilities • Performed administrative functions in support of jail operations as needed
At the end of these classes students will be able to identify and describe the various threats that can be present during a showing, describe safety strategies that can be used to protect a real estate agent, a property, and other people in most situations, explain what precautions a real estate agent can take before a showing or open house to protect himself or herself, to protect the property being shown, and to protect people touring the property, describe the actions a real estate agent can take during a showing to protect himself or herself, to protect the property being shown, and to protect the people touring the property, describe some of the duties a real estate agent needs to complete after a showing to protect the property and the residents and / or owners of the property, and explain what liability is and describe the various forms of liability.
a b c d e f g h i j k l m n o p q r s t u v w x y z