...INTERNATIONAL JOURNAL Of ACADEMIC RESEARCH LCC: T10.5-11.9 Vol. 2. No. 1. January 2010 E-CYLING E-WASTE: THE WAY FORWARD FOR NIGERIA IT AND ELECTRO-MECHANICAL INDUSTRY Prof. Dr. Oliver E. Osuagwu *, Charles Ikerionwu a a b b Coordinator of PG Programs, IP Vice-President, CPN Department of Information Management Technology, Federal University of Technology, Owerri (NIGERIA) * E-mail: drosuagwu@yahoo.com ABSTRACT An average of 500,000 tons of obsolete Waste Electrical and Electronic Equipments (WEEE) are dumped into Nigeria monthly with its associated health and environmental hazards. E-waste includes computers, entertainment electronics, mobile phones and other items that have been discarded by their original users. While there is no generally accepted definition of e-waste, in most cases e-waste consists of expensive and more or less durable products used for data processing, telecommunications or entertainment in private households and businesses. Dumping of e-waste in Nigeria has negative health consequences such as leaching toxins into the soil, air and groundwater which later enter into crops, animals and human body systems causing contamination and pollution. Medical experts have warned that exposure to these substances can cause damage to blood and nervous systems, DNA, immune systems, kidneys and can lead o respiratory and skin disorders and lung cancer and can interfere with regulatory hormones and brain development. This is bad news for Nigeria and Africa...
Words: 5651 - Pages: 23
...Wearable Computers EEE 439 What is a Wearable Computer? As we continue to integrate computers into our everyday lives at an ever faster rate, the idea that a static desktop, or even a portable laptop can fulfill all of our computing needs is becoming increasingly more ridiculous. The integration of technology constantly creates situations in which we pause and think, “If only I had a computer,” The wearable computer does this. It goes where you go, it does what you do. Its there when you want to use it, unobtrusive when you don’t. So what is a wearable computer? Why don’t we just put our laptops on a sling? In 1998, Steve Mann gave a keynote address at the International Conference on Wearable Computing in which he explained the operational modes of wearable computers and six defining traits of a true wearable computer. According to Mr. Mann, the wearable computer creates three new modes of interaction between human and computer which have not existed before. These three new modes of operation are Constancy, Augmentation, and Mediation (Mann, 1998). Constancy means that the computer is always on and available for use by the user; traditional devices are turned off and closed when not in use. Augmentation is the idea that wearable computers will augment the user’s abilities instead of merely providing computing power on demand. Mann splits Mediation into two different areas; Solitude – the ability to cut oneself off from material, and Privacy – the ability to block or modify...
Words: 6966 - Pages: 28
...hnotesScan to E-mail White Paper Ricoh Americas Corporation May 2007 Copyright 2007 – Ricoh Americas Corporation Scan to E-mail White Paper TABLE OF CONTENTS 1 1.2 2 3 4 4.1 4.2 4.3 4.4 4.5 4.6 4.7 5 5.1 5.2 6 6.1 6.2 6.3 7 7.1 7.2 8 8.1 INTRODUCTION....................................................................................................................4 Target Audience ..................................................................................................................4 MODEL CROSS REFERENCE .............................................................................................5 SETTING/SPECS ..................................................................................................................7 SETTING UP SCAN TO E-MAIL VIA WEB IMAGE MONITOR ............................................7 Web Image Monitor Administrator Login Process...............................................................7 Network Settings via WIM...................................................................................................9 SMTP Authentication via WIM ..........................................................................................10 POP before SMTP Configuration via WIM........................................................................ 11 LDAP Settings in WIM ...................................................................................................... 11 Address Book Settings in WIM .......................
Words: 5530 - Pages: 23