When we need to obtain a particular product from a chemical reaction, the situation is often complicated by the presence of other reactions that reduce the yield of the desired product. We then seek ways to bias the thermodynamics of the situation to favor production of the required species. In some cases this can be done by manipulating operating variables, such as temperature, pressure, and the presence of inerts. In other cases we might be able to couple the unfavored reaction to a highly favored one; common examples of coupling are chemical induction and chemical pumping. All these possibilities are described and illustrated in this document.
Security of computers and computer networks, a highly technical domain of knowledge, is enlivened by a colorful and esoteric jargon, including such terms as blackhats, dongles, honey pots, typo pirates, and social engineering. Yet the prevalence of computers throughout modern societies demands that we all have at least some speaking familiarity with the issues encountered in trying to secure digital resources. Those issues extend beyond hardware and software to include such data as social security numbers, credit and bank account numbers, financial reports, and medical records. This small glossary may serve as an aid to help you become conversant with these important problems.
As websites have grown in complexity, we have come to realize that forethought, planning, and explicit design must be invoked if a site is to be valuable to its users and if it's development and maintenance are to be economically viable to its owners. In this document we briefly describe a five-step process for developing a coherent and useable website.