Maria Theresa

 Articles written by Maria Theresa)


1.     https://www.eindex.org/2022/08/gender-roles.html

2.     https://www.track2training.org/2022/08/need-for-disaster-management.html

3.     https://www.track2training.org/2022/08/everything-everything.html Book Review

4.     https://www.eindex.org/2022/08/british-english-and-american-english.html

5.     https://www.eindex.org/2022/08/reinsurance.html

6.     https://www.track2training.org/2022/08/stock-market-players.html

7.     https://www.eindex.org/2022/08/online-professional-courses.html

8.     https://www.track2training.org/2022/08/adr-and-gdr.html

9.     https://www.track2training.org/2022/08/government-policies-for-education.html

10.  https://www.track2training.org/2022/08/need-for-national-sports-day.html

11.  https://www.track2training.org/2022/08/nobel-prize.html

12.  https://www.track2training.org/2022/08/mutual-fund.html

13.  https://www.track2training.org/2022/08/artificial-intelligence_27.html

14.  https://www.track2training.org/2022/08/commodity-trading.html

15.  https://www.track2training.org/2022/08/currency-trading.html

16.  https://www.track2training.org/2022/08/need-for-sustainable-development-goals.html

17.  https://www.track2training.org/2022/08/communication-in-cyberspace.html

18.  https://www.track2training.org/2022/08/linux-and-open-source.html

19.  https://www.track2training.org/2022/08/tour-to-rajasthan.html

20.  https://www.eindex.org/2022/08/great-wars-of-20th-century.html

21.  https://www.track2training.org/2022/09/right-to-information.html

22.  https://www.track2training.org/2022/09/1st-war-of-independence.html

23.  https://www.track2training.org/2022/09/kyoto-protocol.html

24.  https://www.track2training.org/2022/09/the-united-nations.html

25.  https://www.track2training.org/2022/09/video-jockey.html

26.  https://www.track2training.org/2022/09/argentina.html

27.  https://www.track2training.org/2022/09/genetic-engineering.html

28.  https://www.track2training.org/2022/09/gemmology.html

29.  https://www.track2training.org/2022/09/teachers-day.html

30.  https://www.track2training.org/2022/09/australia-and-canada.html

 

Arpita Agrahari

 Articles written by Arpita Agrahari

Sourabh Jain

 Articles written by – Sourabh Jain

 

http://track2training.com/2022/07/07/end-of-the-revolutionary-morgan-era-and-the-future-of-england-team/

 

http://track2training.com/2022/07/08/decoding-kenyas-police-brutality-and-the-core-reasons-behind-it/

 

http://track2training.com/2022/07/09/evolution-of-indian-cinema/

 

http://track2training.com/2022/07/10/extra-fly/

 

http://track2training.com/2022/07/11/exciting-films-and-shows-to-come-out-this-year/

 

http://track2training.com/2022/07/12/trying-to-make-sense-of-virats-lacklustre-form/

 

http://track2training.com/2022/07/13/psychedelics-substances-and-their-magic/

 

http://track2training.com/2022/07/14/the-night-of-another-show-where-riz-ahmed-shows-his-quality-as-an-actor/

 

http://track2training.com/2022/07/15/importance-of-seeking-a-spiritual-experience/

 

http://track2training.com/2022/07/16/micro-learning/

 

http://track2training.com/2022/07/17/taoism-finding-your-own-way/

 

http://track2training.com/2022/07/19/the-christianmuslim-conundrum/

 

http://track2training.com/2022/07/20/as-frank-as-the-ocean/

 

http://track2training.com/2022/07/21/inculcating-stoicism-in-your-life/

 

http://track2training.com/2022/07/22/the-pre-socratic-era-origins-of-western-philosophy/

 

http://track2training.com/2022/07/23/plato-and-his-allegory-of-the-cave/

 

http://track2training.com/2022/07/24/citizenship-journalism/

 

http://track2training.com/2022/07/26/stating-the-importance-of-fundamental-rights/

 

http://track2training.com/2022/07/27/existentialism-philosophy-of-human-experience/

 

http://track2training.com/2022/07/28/aristotle-the-peripatetic-thought/

 

http://track2training.com/2022/07/30/the-imbalance-in-crickets-ecosystem/

 

http://track2training.com/2022/08/01/ship-of-theseus-what-makes-you/

 

http://track2training.com/2022/08/02/infidelity/

 

http://track2training.com/2022/08/03/how-the-lamestream-media-perceives-gaming/

 

http://track2training.com/2022/08/04/marital-rape/

 

http://track2training.com/2022/08/06/development-of-rural-women-in-vidarbha-region-maharashtra/

 

http://track2training.com/2022/08/06/its-tough-being-a-dalit/

 

http://track2training.com/2022/08/08/air-pollution-a-global-issue/

 

http://track2training.com/2022/08/12/the-cow-in-the-field/

 

http://track2training.com/2022/08/26/property-frauds-and-how-to-stop-them/

 

 

 

Savita

 Articles written by Savita

1.     https://www.eindex.org/2022/08/importance-and-type-of-insurance.html

2.     https://www.eindex.org/2022/08/the-challenges-and-prospects-of-women.html

3.     https://www.eindex.org/2022/08/print-media-as-oldest-mean-of.html

4.     https://www.eindex.org/2022/08/academic-degree-and-its-types.html

5.     https://www.eindex.org/2022/08/adoption-under-hindu-law.html

6.     https://www.eindex.org/2022/08/amritsar-holy-city.html

7.     https://www.eindex.org/2022/08/business-software-and-its-types.html

8.     https://www.eindex.org/2022/08/indias-performance-in-commonwealth-game.html

9.     https://www.eindex.org/2022/08/different-aspects-of-journalism.html

10.  https://www.eindex.org/2022/08/different-ways-to-do-advertisement.html

11.  https://www.eindex.org/2022/08/e-learning-platforms.html

12.  https://www.eindex.org/2022/08/electronic-media-change-tradition-of.html

13.  https://www.eindex.org/2022/08/entrepreneurship.html

14.  https://www.eindex.org/2022/08/glimpse-of-new-education-policy.html

15.  https://www.eindex.org/2022/08/kashmir-heaven-on-earth.html

16.  https://www.eindex.org/2022/08/key-skills-for-professionals.html

17.  https://www.eindex.org/2022/08/and-its-type-loan-is-amount-of-money.html

18.  https://www.eindex.org/2022/08/make-in-india-great-initiative.html

19.  https://www.eindex.org/2022/08/media-as-fourth-pillar-of-democracy.html

20.  https://www.eindex.org/2022/08/online-banking.html

21.  https://www.eindex.org/2022/08/online-courses-by-swayam.html

22.  https://www.eindex.org/2022/08/photography-and-its-types.html

23.  https://www.eindex.org/2022/08/quality-education-part-of-sustainable.html

24.  https://www.eindex.org/2022/08/everything-you-need-to-know-about-real.html

25.  https://www.eindex.org/2022/08/role-of-branding-and-marketing-in.html

26.  https://www.eindex.org/2022/08/role-of-ngos-in-india.html

27.  https://www.eindex.org/2022/08/rural-development-for-better-nation.html

28.  https://www.eindex.org/2022/08/social-media-and-marketing.html

29.  https://www.eindex.org/2022/08/the-real-heroes.html

30.  https://www.eindex.org/2022/08/top-10-engineering-collage-in-india.html

 

Aiswarya B H

 Articles by Aiswarya B H 


1)History of Red Fort

2)HIV : Transmission, Symptoms and Prevention

3)Major crops of India

4)Irrigation and it’s types

5)Nutrition and it’s types

6)Oil spills : Causes and it’s effect

7)Cancer : Causes and Treatment

8)Poverty and Hunger

9)History of Akbar

10)History of Brihadeshwara temple

11)Psychology : Application and it’s Importance

12)Diversity of India

13)Microbiology and it’s branches

14)History of Zeus

15)History of Helen of Troy

16)Aquaculture

17)Disaster and Disaster management

18)Indian Constitution

19)Population and it’s exploitation

20)Economic Development

21)Salient features of Indian society

22)Environmental Pollution

23)Global warming

24) Land Reforms of India

25)History of Taj Mahal

26)Security Breach of NASA

27)Origin and Development of Agriculture

28)Insurance

29)Indian National Movement

30)Marine ecosystem

Ajeetha.R

 Articles by Ajeetha.R

1.Marine Biology  

2.Women organizations and their role in India

3.History of India & Indian National Movement.

4.Genral issues on Environmental ecology

5.Salient features of world’s physical geography

6.Communalism

7.Horticulture

8.Psychology

9. Criminal Justice System in India

10.Pharmacology

11.Anthropology

12.Linkages between development and spread of extremism

13. Poverty in India

14.Disaster Management  

15.Demography

16.Agriculture

17.Nanotechnology

18.Physical Geography

19.Role of civil services in a democracy .

20.India and its neighborhood- relations

21.Indian Army

22.Achievements of India in the field of Science and Technology

23.Government budget

24.National Educational Policy

25.Cyber security

26.Inclusive growth and issues arising from it

27.Central Bureau of Investigation

28.Fracking

29.Bipolar Disorder

 30.Artificial Intelligence

31.Weird laws in North Korea

32.Interesting places to visit in India

Manoswee Parineeta

 Articles are written by Manoswee Parineeta

1. 
https://training4scholars.wordpress.com/2022/07/16/education-system-in-india/

2. 
3. 
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.

Aashi Agrawal

Articles by Aashi Agrawal

1)https://internship.edupub.org/2022/08/land-reforms-in-india.html


What is Vulnerability Analysis for Environment

Vulnerability assessments are used to ascertain the susceptibility of a natural or human system to sustaining damage (or benefiting) from climate change. Vulnerability is a function of exposure, sensitivity, and adaptive capacity. Vulnerability assessments differ from impact assessments in that they more fully consider adaptive management or policy responses that may lessen negative impacts (or enhance positive impacts) of climate change. Where vulnerability assessments are used to guide management or conservation actions, they are often most informative when they are “place-based” and designed to address a particular resource or system of interest. However, in the climate change literature, there are multiple definitions of vulnerability and there is no single universal assessment framework. The assessments included below focus on various exposure units, are applied at different spatial scales, and are relevant to different locations

Planning adaptation at the local level requires an understanding of the current and projected climate hazards as well as an understanding of the vulnerable sectors of the city. These two factors are combined in a risk and vulnerability assessment. There are a multitude of methods that can be applied to conduct risk and vulnerability assessments in urban areas. Knowledge about the different types of methods and their outputs is important for the selection of the most efficient and effective method to be applied in accordance with the capacities of the local authorities.

Climate change risks in a city or town should be characterised from the point of view of several aspects: the climate threat (projected climatic conditions); context of the geographic location (e.g. coastal area, mountain region, etc.); and affected sectors and systems (e.g. human health, infrastructure, transport, ports, energy, water, social well-being, etc.) including the impacts on the most vulnerable groups (e.g. the elderly, he homeless, those at risk of poverty, etc.).
Signatory cities to develop their Risk and Vulnerability Assessment (RVA). Under the Covenant of Mayors reporting framework, the Risk and Vulnerability Assessment incorporates data on climate hazards, vulnerable sectors, adaptive capacity and vulnerable population groups. In terms of climate hazards, signatory cities are requested to define the probability and impact of the most relevant hazards, their expected change in intensity and frequency, as well as timescales. This is done via a defined indication of the level of confidence. For each identified climate hazard, the vulnerable sectors and their vulnerability level is defined. Further, an assessment of the adaptive capacity at the sectoral level is defined, using positive adaptive capacity categories, such as access to services, governmental and institutional capacity, physical and environmental capacity, knowledge and innovation. It is also possible to assign indicators for the identified vulnerable sectors and adaptive capacity. 
Risk assessments focus primarily on the projected changes in climatic conditions, inventory of potentially impacted assets, the likelihood of the impact happening and the resulting consequences. Vulnerability assessments emphasise exposure, sensitivity and adaptive capacity of systems, assets and populations. Integrated risk and vulnerability assessments address both the vulnerability to and the impacts of climatic hazards.
The methods designed for risk and vulnerability assessments can be divided into top-down methods, which are usually based on quantitative data (e.g. census data, downscaled climate models) and use mapping; and bottom-up methods that often employ local knowledge to identify risks and are generally qualitative in nature.
Indicator-based vulnerability assessments use sets of pre-defined indicators that can be both quantitative and qualitative and can be assessed both through modelling or stakeholder consultation.
A quick risk screening method, which is based on existing knowledge, can be employed first-hand to have a clearer understanding of the needs for an in-depth assessment.
Regardless of the method applied, the assessment should, at minimum, take the following elements into consideration:Trends of various climate variables (e.g. average and extreme temperature, number of days with extreme heat, intensive rainfall events, snow cover), ideally based on a range of different climate scenarios;
Expected (direct and indirect) impacts (threats and opportunities) by identifying the most relevant hazards as well as the areas of the city that are at most risk given an overlay of the spatial distribution of the total population, vulnerable populations, economic activities and economic values;
Timescale, such as short, medium (e.g. 2050s) or long-term (e.g. end of century);
An indication on the level of confidence (e.g. high, medium, low) for such impacts, with a view of facilitating the decision-making process given the degree of uncertainty attached to the results.
Climate Change Vulnerability is defined by the IPCC as the susceptibility of a species, system or resource to the negative effects of climate change and other stressors, and includes three components: exposure, sensitivity, and adaptive capacity:Exposure is the amount and rate of change that a species or system experiences from the direct (e.g., temperature, precipitation changes) or indirect (e.g., habitat shifts due to changing vegetation composition) impacts of climate change;
Sensitivity refers to characteristics of a species or system that are dependent on specific environmental conditions, and the degree to which it will likely be affected by climate change (e.g., temperature or hydrological requirements); and
Adaptive capacity is the ability of a species to cope and persist under changing conditions through local or regional acclimation, dispersal or migration, adaptation (e.g., behavioral shifts), and/or evolution.
What are Climate Change Vulnerability Assessments?
Climate Change Vulnerability Assessments (CCVAs) are emerging tools that can be used as an initial step in the adaptation planning process. A CCVA focuses on species, habitats, or systems of interest, and helps identify the greatest risks to them from climate change impacts. A CCVA identifies factors that contribute to vulnerability, which can include both the direct and indirect effects of climate change, as well as non-climate stressors (e.g., land use change, habitat fragmentation, pollution, and invasive species?).
The process of completing a CCVA includes the synthesis of existing information about the target species or system, confidence levels in those data, and identification of knowledge gaps. A CCVA combines this background information with climate projections to identify the specific elements of exposure, sensitivity, and adaptive capacity that contribute to the overall vulnerability of the species or system.
Figure adapted from Glick et al. 2011
There is no standard method or framework to conduct a CCVA, and a variety of methods are being implemented at government, institutional, and organizational levels. Because of this, interpretation of CCVA results should carefully consider whether and how each of the three components of vulnerability (exposure, sensitivity, and adaptive capacity) were evaluated, if non-climate stressors were included in the assessment, how uncertainty is presented, the geographic location covered by the assessment, and whether the entire life cycle of a target species was evaluated, particularly for those that are migratory. Generally, the approach chosen should be based on the goals of practitioners, confidence in existing data and information, and the resources available (e.g., financial, personnel).
Some of the most common frameworks applied regionally are:NatureServe Climate Change Vulnerability Index (CCVI) – A quantitative assessment based on the traits of fish, wildlife, and habitats that might make them more vulnerable to climate change. The CCVI is suitable for assessing large numbers of species and comparing results across taxa. It is based in Microsoft Excel, relatively easy to use, and includes factors related to direct and indirect exposure, species-specific sensitivity, and documented or modeled responses to climate change.
Climate Change Response Framework (CCRF) – A collaborative, cross-boundary approach among scientists, managers, and landowners designed to assess the vulnerability of forested habitats. The assessment incorporates downscaled climate projections into tree species distribution models to determine future habitat suitability. Experts conduct a literature review to summarize the effects of climate change, as well as non-climate stressors, and consider all three components of vulnerability to come to a consensus on a vulnerability ranking and level of confidence.
Northeast Association of Fish and Wildlife Agencies (NEAFWA) Habitat Vulnerability Model – An approach created to consistently evaluate the vulnerability of all non-tidal habitats across thirteen Northeastern US states. This method is based on an expert-panel approach, and is made up of 4 sections, or modules, based in Microsoft Excel. The modules score vulnerability based on climate sensitivity factors (adaptive capacity is also partially addressed) and non-climate stressors to produce vulnerability rankings and confidence scores. Experts use these scores to construct descriptive paragraphs explaining the results for each species or habitat evaluated. These narratives help to ensure transparency, evaluate consistency, and clarify underlying assumptions. The National Park Service, the U.S. Forest Service, and several states have used this model successfully to assess habitat vulnerability.
Expert opinion workshops and surveys – These are often qualitative (or mixed qualitative/quantitative), and have been used by a number of states including a report on habitat vulnerability in Massachusetts. These assessments are usually developed independently, and are typically not based on a standardized framework. This allows greater flexibility for the institution conducting the CCVA; however, it is more difficult to make direct comparisons across assessment results since the specific factors evaluated may vary.
Outputs from the CCVAs outlined above compare the relative vulnerability among species or systems and identify major factors contributing to the vulnerability, confidence in the factors assessed, and remaining knowledge gaps. This information can inform adaptation strategies and actions by identifying the areas where additional monitoring and research is needed, and helping to prioritize management and policy decisions.
How are CCVAs presented in the Massachusetts Wildlife Climate Action Tool?
The CCVAs presented in this tool are drawn from assessments completed throughout the Northeast United States, as well as the Midwest and Mid-Atlantic regions. The NatureServe Climate Change Vulnerability Index was the most common method of assessing species vulnerability, though other methods were also included (see descriptions above). The Massachusetts Climate Action Tool presents a summary of CCVA results for individual species and forest habitats; in cases where more than one CCVA result is offered, studies come from various locations and may have used different assessment methodologies. Users should consult the original source for a complete understanding of how vulnerability was assessed and detailed results.
We present multiple Climate Change Vulnerability Assessment (CCVA) results because not all species were assessed specifically in Massachusetts. For example, an assessment may have included Massachusetts, but been regional in scope. Because species’ ranges and life histories extend beyond state boundaries, assessments conducted in other areas may provide a more comprehensive understanding of their vulnerability. We suggest starting with CCVAs that include Massachusetts (e.g., North Atlantic LCC, North Atlantic coast), and then comparing results from nearby states. We also suggest considering the life history and migration patterns of species to determine what factors might be most influential as the species moves in or out of Massachusetts. In some cases, CCVA rankings may vary for the same species because of unique factors within a given area, or because different methodologies were used in different studies. It is important to read the expert opinions supporting ranking to understand why a ranking differs from one state to another.
In the Massachusetts Climate Action Tool, the following information is presented for each species assessed:
Ranking: The vulnerability ranking categories refer to the predicted extent that the assessed species will be impacted by climate change. Because the ranking category names and definitions vary across reports, similar rankings have been grouped and are presented in a standardized format. See Table 1 (next page) to compare these with the original ranking categories and definitions used by the CCVAs cited in this tool.
Confidence: This category describes how confident the authors are in the vulnerability ranking assigned to each species in the assessment. Confidence scores refer to the amount and quality of the available background information on that species, and do not necessarily include the uncertainty associated with the projected climate data used for rankings.
Emission Scenarios: Emissions scenarios describe future releases of greenhouse gases, aerosols, and other pollutants into the atmosphere, and are based on expected changes in human populations and technology. See climate change page for more information on emission scenarios and climate models.
Time Period: Vulnerability for each species is considered for a specific time period. Many vulnerability assessments consider the current and future impacts that a species may experience through the years 2050, 2080, or 2100.
Location: This field refers to the geographic region considered in the vulnerability assessment. CCVAs can be conducted on local, regional, state, and national levels.
Simplified vulnerability ranking categories as presented in the Massachusetts Wildlife Climate Action Tool, cross-referenced with the original vulnerability ranking categories and definitions used in the assessment reports cited in this tool.
Additional Resources on CCVAs
Climate Registry for the Assessment of Vulnerability (CRAVe): The Climate Registry for the Assessment of Vulnerability (CRAVe) is a searchable, public registry on CCVAs. The purpose of CRAVe is to make information about ongoing and completed vulnerability assessments readily accessible. CRAVe is hosted in two locations: 1) USGS National Climate Change and Wildlife Science Center and 2) the EcoAdapt Climate Adaptation Knowledge Exchange. The assessments in CRAVe include studies on species and ecosystems, built environments and infrastructure, cultural resources, and socioeconomic systems. Users can access CRAVe to conduct searches across all vulnerability assessments to find the information necessary for decision making.
Vulnerability Assessment Trainings: The U.S. Fish and Wildlife Service’s National Conservation Training Center (NCTC) offers training courses to guide conservation and resource management practitioners in the theory, design, interpretation, and implementation of CCVAs. Participants also gain a perspective of how CCVAs fit into the broader context of adaptation planning. Courses follow the guidelines established in Scanning the Conservation Horizon – A Guide to Climate Change Vulnerability Assessment.
References
Adaptation Subcommittee to the Governor’s Steering Committee on Climate Change. 2010. The impacts of climate change on Connecticut agriculture, infrastructure, natural resources, and public health.
Brandt, L., et al. 2014. Central Hardwoods ecosystem vulnerability assessment and synthesis: a report from the Central Hardwoods Climate Change Response Framework project. Gen. Tech. Rep. NRS-124. U.S. Department of Agriculture, Forest Service, Northern Research Station, Newtown Square, PA.
Butler, P., et al. 2015. Central Appalachians forest ecosystem vulnerability assessment and synthesis: a report from the Central Appalachians Climate Change Response Framework. Gen. Tech. Rep. NRS-146. U.S. Department of Agriculture, Forest Service, Northern Research Station, Newtown Square, PA.
Byers, E., and S. Norris. 2011. Climate change vulnerability assessment of species of concern in West Virginia. West Virginia Division of Natural Resources, Elkins, West Virginia.
Cullen, E., E. Yerger, S. Stoleson, and T. Nuttle. 2013. Climate change impacts on Pennsylvania forest songbirds against the backdrop of gas development and historical deer browsing. Pennsylvania Department of Conversation and Natural Resources, Wild Resource Conservation Program (WRCP-010376), Harrisburg, PA.
Dawson, T. P., S. T. Jackson, J. I. House, I. C. Prentice, G. M. Mace. 2011. Beyond predictions: biodiversity conservation in a changing climate. Science 332: 664-664.
Furedi, M., B. Leppo, M. Kowalski, T. Davis, and B. Eichelberger. 2011. Identifying species in Pennsylvania potentially vulnerable to climate change. Pennsylvania Natural Heritage Program, Western Pennsylvania Conservancy, Pittsburgh, PA.
Galbraith H., DesRochers DW, Brown S, Reed JM (2014) Predicting vulnerabilities of North American shorebirds to climate change. PLoS ONE 9(9): e108899.
Glick P., B. A. Stein, and N. Edelson, editors. 2011. Scanning the conservation horizon: a guide to climate change vulnerability assessment. National Wildlife Federation, Washington, DC.
Handler, S., et al. 2014. Michigan forest ecosystem vulnerability assessment and synthesis: a report from the Northwoods Climate Change Response Framework. Gen. Tech. Rep. NRS-129. U.S. Department of Agriculture, Forest Service, Northern Research Station, Newtown Square, PA.
Handler, S., et al. 2014. Minnesota forest ecosystem vulnerability assessment and synthesis: a report from the Northwoods Climate Change Response Framework. Gen. Tech. Rep. NRS-133. U.S. Department of Agriculture, Forest Service, Northern Research Station, Newtown Square, PA.
Hoving, C.L., Y.M. Lee, P.J. Badra, and B.J. Klatt. 2013. Changing climate, changing wildlife: a vulnerability assessment of 400 Species of Greatest Conservation Need and game species in Michigan. Wildlife Division Report No. 3564. Michigan Department of Natural Resources, Lansing, MI.
Intergovernmental Panel on Climate Change (IPCC). 2007. Climate change 2007: impacts, adaptation, and vulnerability. Contribution of Working Group II to the Fourth Assessment Report of the Intergovernmental Panel on Climate Change. M. L. Parry, O. F. Canziani, J. P. Palutikof, P. J. van der Linden, and C. E. Hanson (eds.). Cambridge University Press, Cambridge, UK.
Intergovernmental Panel on Climate Change (IPCC). 2014. Climate change 2014: impacts, adaptation, and vulnerability. Part A: Global and sectoral aspects. Contribution of Working Group II to the Fifth Assessment Report of the Intergovernmental Panel on Climate Change Field, C. B., V. R. Barros, D. J. Dokken, K. J. Mach, M. D. Mastrandrea, T. E. Bilir, M. Chatterjee, K. L. Ebi, Y. O. Estrada, R. C. Genova, B. Girma, E. S. Kissel, A. N. Levy, S. MacCracken, P. R. Mastrandrea, and L. L. White (eds.). Cambridge University Press, Cambridge, UK.
Janowiak, M., et al. In preparation. New England forest ecosystem vulnerability assessment and synthesis: a report from the New England Climate Change Response Framework. U.S. Department of Agriculture, Forest Service, Northern Research Station.
Janowiak, M.K., et al. 2014. Forest ecosystem vulnerability assessment and synthesis for northern Wisconsin and western Upper Michigan: a report from the Northwoods Climate Change Response Framework. Gen. Tech. Rep. NRS-136. U.S. Department of Agriculture, Forest Service, Northern Research Station, Newtown Square, PA.
Manomet Center for Conservation Science (Manomet) and Massachusetts Division of Fisheries and Wildlife (MA DFW). 2010. Climate change and Massachusetts fish and wildlife: Volume 2 habitat and species vulnerability. Massachusetts Division of Fisheries and Wildlife, Westborough, MA.
Manomet Center for Conservation Science (Manomet) and National Wildlife Federation (NWF). 2013. The vulnerabilities of fish and wildlife habitats in the Northeast to climate change. Manomet Center for Conservation Sciences, Plymouth, MA.
Schlesinger, M.D., J.D. Corser, K.A. Perkins, and E.L. White. 2011. Vulnerability of at-risk species to climate change in New York. New York Natural Heritage Program, Albany, NY.
Small-Lorenz, S., L. A. Culp, T. B. Ryder, T. C. Will, and P. P. Marra. 2013. A blind spot in climate change vulnerability assessments. Nature Climate Change 3:91–93.
Sneddon, L. A., and G. Hammerson. 2014. Climate change vulnerability assessments of selected species in the North Atlantic LCC Region. NatureServe, Arlington, VA.
Tetratech, Inc. 2013. Vermont Agency of Natural Resources climate change adaptation framework. Vermont Agency of Natural Resources, Waterbury, VT.
Whitman, A., A. Cutko, P. DeMaynadier, S. Walker, B. Vickery, S. Stockwell, and R. Houston. 2013. Climate change and biodiversity in Maine: vulnerability of habitats and priority species. Report SEI-2013-03. Manomet Center for Conservation Sciences (in collaboration with Maine Beginning with Habitat Climate Change Working Group), Brunswick, ME.
Young, B. E., E. Byers, K. Gravuer, K. Hall, G. Hammerson, A. Redder, J. Cordeiro, and K. Szabo. 2011. Guidelines for using the NatureServe Climate Change Vulnerability Index, version 2.1. NatureServe, Arlington, VA.

Abhilasha Toppo

Articles written by Abhilasha Toppo

 1. https://track2training.org/2022/01/17/online-education-and-work-from-home-have-we-arrived-in-virtual-world/

2. http://track2training.org/2022/01/17/national-educational-policy-2020/

3. http://track2training.org/2022/01/17/student-suicides-what-are-the-deep-rooted-problems/

4. http://track2training.org/2022/01/18/role-of-media-in-protecting-democratic-values-in-india-success-and-failure/

5. http://track2training.org/2022/01/19/aadhar-and-privacy/

6. http://track2training.org/2022/01/20/raising-legal-age-of-marriage-in-india/

7. http://track2training.org/2022/01/22/should-courts-declare-prostitution-legal-in-india/

8. http://track2training.org/2022/01/23/juvenile-justice-system-in-india/

9. http://track2training.org/2022/01/24/death-penalty-in-india/

10. http://track2training.org/2022/01/25/addiction-of-social-media/

11. http://track2training.org/2022/01/27/role-of-students-in-eradication-of-drugs/

12. http://track2training.org/2022/01/31/single-use-plastic-ban/

13. http://track2training.org/2022/01/31/ignorantia-juris-non-excusat/

14. http://track2training.org/2022/02/01/language-is-not-only-a-means-of-communication-but-also-a-tool-by-which-we-think/

15. http://track2training.org/2022/02/02/aatmnirbhar-bharat/

16. http://track2training.org/2022/02/07/kashi-vishwanath-corridor/

17. http://track2training.org/2022/02/08/feminism-and-women-empowerment/

18. http://track2training.org/2022/02/08/child-marriage-a-legal-view/

19. http://track2training.org/2022/02/09/impact-of-feminism-and-women-empowerment-on-indian-society/

20. http://track2training.org/2022/02/09/triple-talaq/

21. http://track2training.org/2022/02/13/impact-of-caste-dynamics-in-contemporary-india/

22. http://track2training.org/2022/02/13/electric-vehicles/

23. http://track2training.org/2022/02/14/pm-ayushman-bharat-health-infrastructure-mission/

24. http://track2training.org/2022/02/16/farm-bill-2020/

25. http://track2training.org/2022/02/16/uniform-civil-code/

26. http://track2training.org/2022/02/17/azadi-ka-amrit-mahotsav/

27. http://track2training.org/2022/02/22/__trashed/

28. http://track2training.org/2022/02/23/__trashed-2/

29. http://track2training.org/2022/02/26/the-indian-constitution-indian-republics-sacred-book/

30. http://track2training.org/2022/02/27/section-377/

 

Internet Protocol

What is an IP address?

An IP address abbreviation of Internet Protocol address, it is an address that is provided by the Internet Service Provider to the user, it is just like a postal address code that is pin code to find the location or place where to send the message.  An IP address is a unique group of number what are separated by the period (.), it varies from 0 to 255, and   every device has a separate and unique IP address that is assigned by the specific Internet Service Provider (ISP) to identify which particular device is communicating with them and accessing the internet from there.

If you want to access internet from you device which may be your Android, I phone, Computer the service provider assigned them a particular, unique  address  that is help them to communicate send, receive information from the right person without any misunderstanding, mistake the message is pass to the authentic person to whom it has to send.  This problem is solved by the IP address, in olden days; we have postal address to send the message/letter to the person, the message that has to be sent with the help of the address which may be his house number, city, town, postal code.  The sender will write the address on the top of the letter envelope so that it will be delivery to the right person.  If the person connected his device to internet provide by the hotel, the hotel‘s Internet Service Provider will assign an IP address to the device.

Types of IP addresses

There are different types of IP based on different categories, types.

Consumer IP addresses

A Consumer IP addresses is the individual IP addresses of a customer who connects his/her  device to a public or private  network.  A consumer connects his device through internet from his Internet Service Provider, or from the Wi-Fi.  In these days the Consumer has many electronic gadgets which he connects to his router that transfer the data from the Internet Service Provider.

Private IP addresses

A  Private IP addresses are a secure one that is connected Private Network and every devices that is connected to this Private Network is assigned a unique IP address that is assigned by the Internet Service Provider.  All Mobile devices, Computer, and Internet of Things that are connected to this private network are assigned a unique string number to the devices.

Public IP addresses

A Public IP addresses is the main address that is related to your network, as stated above that the IP address are assigned by the Internet Service Provider, the Public IP address is also assigned by the Internet Service Provider, The Internet Service Provider has a large amount of IP addresses that are stored and assigned to the customer. The public IP address is the address that  devices that are outside the network use to identify the network.

The Public IP addresses are further classified into two types they are:

  1. Dynamic
  2. Static

Dynamic IP addresses

                The Dynamic  IP address  are the IP address that changes very frequently, so the Internet  Service Providers  purchase a very huge amount of IP addresses , they assign it mechanically to the customer . This frequently changing the IP address helps the customer not to make the security actions. The frequently changing IP address won’t let the hacks to track or pool your data.

 Static IP addresses

The Static IP addresses is the contradictory to the Dynamic IP address, it remain fixed. The IP address remains fixed when it is assigned by the Internet Service Provider.  The mostly many person and business man don’t   choose static because it is risk of getting easily track, but most business which are trying host her own website server choose Static IP address so it will easier  for the customer to find them.

                The IP address can be protect by 2 ways that are using proxy and the other one is use of Virtual Private Network.   A proxy server acts as a intermediary between the internet server and your internet service providers, when you visit any website it will show the proxy IP address not yours. 

Where to find IP address is Device?

                The IP address set up in every device that is connected to the Internet, but the steps or direction is different in different devices. Some of device direction is given below:

In Window or any other Personal Computer

  1. Go to the Start Menu
  2. Type  ‘Run’ in the Search bar
  3. A Run Tab pops up
  4. Type  ‘cmd’
  5. A black screen pops up
  6. Type ‘ipconfig’
  7. Your  IP address is found.

In Android Mobile

  1. Go to the Settings
  2. Tap on Network and Internet
  3. Tap on Wi-Fi, it will show the IP address

International Business in Digital Age of Technology

In this Digital age, the market has became more global than ever it has been, the use of internet has been at peak, than it has never before, the small business that were in the street has started to open a wide market through the use of Internet, the local shop has reached to other parts of the world through the use of internet, websites, social media etc., many big multinational company has been facilitating the tools and facilities for the small business owner to come on the much bigger platform than ever before through the internet. Global integration through this medium that remove the barrier of trade, investment, communication, factor flows, bringing the economics together for the development.

There is a global change in the world, in this pandemic, changes in economies, business, technology, communication, politics and many more. This changes make the require the business to adapt to this changes as quick as possible or else they will get outdated, obsolete and might even wind up the business. There are many uncertainties in the business, so the entrepreneur must adapt to this changes, think about the future of the business. There are many other factors that are forcing the business to make changes, like limited resources, limited market, huge competition, highly skilled labor to change from traditional way to alternative way for getting the business more successful and to get in global market.
Advantages of going international:
It can able to take advantage of market opportunities in abroad countries through internet, trade.
It also defends and grips the position of the business from the competitive position in varying technology, and also from domestic rivalry or government policies.
It also enhances their return from the higher revenue and also lowers their cost of production.
It also reduces it imports and try to increase their exports
It breaks the barriers of places, geographical locations through internet.
It also amplifies their relations with the International Diplomats.
It also takes benefits from the international technology, labor and many opportunities.
To get more access to the global markets and get the resources at low price without compromising its quality.
The Domestic business is a business that buys or sells the goods and services within the national boundaries. It gets its resource within the country boundaries doesn’t have any option to search for the better option and even for the markets, it has limited its boundaries in terms of place, markets, resources unlike International business where goods and services are traded across the boundaries of the country, it can be either the countries or between the multinational companies from the different countries. The Domestic business has some limitation that it operates only within the boundaries, limited to narrow markets, no new customer, no customer visibility and reach, scare resources with high price, not good quality, but whereas International business all this limitations are eradicated with the help of technologies which remove the barrier of place, market, time, and new customer with high quality product with reasonable price, and the owner get the raw material with good quality and with reasonable price. In domestic business, the business get a constant threat of competition, rival companies as they don’t have new markets and large reach for their products, it becomes difficult for the domestic business to survive in the market. Many domestic businesses are going in the way of globalization, market integration with the use of technologies and becoming the international business and removing all the hindrance of the small business problems, competition.

After by Anna Todd

I know I’m late to the After party. But hey, better late than never! I started After by Anna Todd in the evening, then stayed up all night because I had to finish it. And then, I begged my teen sister for the second book. She kindly agreed to give the book to me. I hope she doesn’t change her mind just to torture me. We’ll have to see how this unravels. 

Synopsis:

Tessa is just starting college, and she’s got everything planned. In one year, her boyfriend Noah will join her as well. But then she meets her wild roommate Steph as well as the incredibly rude guy with a British accent, Hardin. And everything changes!

My Thoughts:

Tessa is a good girl and she doesn’t do parties and short dresses. And she goes to a party with Steph and something changes. She can’t look away. Harding is doing something to her and she can barely resist. But she has a boyfriend. And also, everything she has a good moment with Hardin, two bad ones follow. Hardin is toxic, and Tessa hurts him in return as well. Also, their communication has to improve. Not the mention how the whole boyfriend situation was handled. 

Honestly, I thought my opinions would be conflicting. But they’re not. I really enjoyed the book and I’m looking forward to the second one. Also, I know Hardin is based on Harry Styles, but while I was reading the book, he didn’t once cross my mind. I also often have fantasies about celebrities, I just don’t happen to write them. Honestly, it’s not a big deal. 

My only worry was that teens might see Hardin’s toxic side and think that’s how a girl should be treated. But that would mean underestimating the girls out there. Even in the book, Tessa was aware Hardin’s behaviour was not okay, which is why she reacted the way she did. The facts she would return only meant that she had feelings for him. Their relationship has more issues than good parts, but in all honesty, when I think about my high school days, it was that way for me too. I didn’t handle things well. Sometimes I didn’t communicate well. I trusted people I shouldn’t have trusted. And that’s the beauty of this book. 

After by Anna Todd is the perfect teenage book.

It reminded me of my days of high school and uni. Attending parties I shouldn’t have and trusting people that didn’t deserve my trust. Handling relationships badly and having terrible ability to communicate. And this book brought all the excitement back and more. Fond and not so fond memories that reminded me that I have lived at the fullest. 

In the next book, I do hope that their relationship improves. I hope Hardin grows up and Tessa communicates to him, instead of hurting him back. Also, I hope Tessa fixes her relationship with her mother as well, even though her mother needs to work on her own biases as well. I also hope that the dramas continue as well – I really love them. 

Attila : Scourge of God by William Napier

Rome C AD408 is laid out to us as an Empire on the edge of collapse, it’s allies the Huns alongside Roman forces under the command of General Stilicho defeat the barbarian hordes & Rome is saved (for now).

The players are thus introduced, one being a hostage, that of Attila as a boy in Rome alongside other barbarian leaders sons, his grandfather King Uldin (of the Huns) having just fought alongside the Romans. General Stilicho & his wife Serena are a coupla who feature in Attila’s life, somewhat surrogate parents to him in an otherwise hostile environment. The Emperor & Princess Galla are front & centre in Attila’s world too along with various others namely a servant & a soldier, all who have some way influenced a young Attila as we read of his early life at the hands of Rome. Other hostages, namely the Vandal Princes Gesaric & Beric become his protagonists, they appearing in a few scenes.

So what else happens…..?

The sack of Rome by Alaric of the Goths is covered in the period but only through the eyes of a travelling Roman soldier (lieutenant which is a rank I don’t recognise as being Roman tbh) & not really done in any detail… its jus mentioned which is an omission I think.

The character of Attila is well played & I warmed to him instantly, strong, wilful & mindful of his roots whilst in the belly of Rome, certainly not seduced by its trappings as other hostages appear to be. Always distrustful, listening & gathering intelligence all the while, making plans to escape, its all believable as part of the story. Its the only part of the story, at it’s ending, that I truly enjoyed.

Some parts contain mystical nonsense which don’t really fit in with the story but perhaps fit with the superstitious nature of the period, some are a little fantastical though. A Druid, shaman & witch all make appearances & have to say I mostly cringed when I read those excerpts, expecting unicorns or cave trolls to pop outta the mist at any moment…….

The part about the Huns was quite interesting & probably the only part where you felt immersed in the period & the people. The Romans could have been from any era especially the soldiering element.

As you can derive from the last statement I did expect a little more historical detail. As for its substance, in truth I found it a similar read to the Simon Scarrow Macro & Cato series (even the Centurion in it is called Marco!), not great depth or intrigue but good fun nevertheless…… not a read that takes itself to seriously. The author even nicks a coupla immortal lines from the film Zulu during a battle scene!

Quite a contrast throughout the book, sometimes the historical detail is there & the context is sound at others its a boys own adventure whilst in patches it’s puerile crassness. Bit of a mash-up I’m trying to say but for the most part it did hold my attention & i would give it 3.25 stars for an enjoyable enough romp, although not the historical content I had expected or was looking for, rounded down to a 3.

Bhavika

 https://track2training.net/2022/01/17/best-app-for-online-education-zoom/

https://track2training.net/2022/01/17/%e2%9a%ab-topic-top-4-loud-music-player-for-android/

https://track2training.net/2022/01/17/%e2%9a%abrise-of-covid-19-cases-day-by-day/

https://track2training.net/2022/01/18/%e2%ad%95teachers-day%e2%ad%95/

https://track2training.net/2022/01/18/what-is-journalism-and-mass-communication/

https://track2training.net/2022/01/18/apj-abdul-kalam-the-missile-man-of-india/

https://track2training.net/2022/01/18/pandit-jawahar-lal-nehru-the-first-prime-minister-of-india/

https://track2training.net/2022/01/18/indira-gandhi-first-woman-prime-minister-of-india/

https://track2training.net/2022/01/18/personality-development/

https://track2training.net/2022/01/18/%e2%ad%95interpersonal-communication-%e2%ad%95/

https://track2training.net/2022/01/18/beti-bachao-beti-padhao/

https://track2training.net/2022/01/19/%e2%ad%95clean-india-%e2%ad%95/

https://track2training.net/2022/01/19/%e2%9a%abrepublic-day%e2%9a%ab/

https://track2training.net/2022/01/19/%f0%9f%94%98sports-can-boost-learning-effectiveness-%f0%9f%94%98/

https://track2training.net/2022/01/19/doing-your-best-is-better-than-being-the-best/

https://track2training.net/2022/01/19/health-is-wealth/

https://track2training.net/2022/01/20/entrepreneurship/

https://track2training.net/2022/01/20/what-is-controllingimportance-of-controlling-in-management/

https://track2training.net/2022/01/20/what-is-the-role-of-youth-in-present-india/

https://track2training.net/2022/01/20/why-is-self-care-important/

https://track2training.net/2022/01/20/unemployment/

https://track2training.net/2022/01/20/career-planning/

https://track2training.net/2022/01/20/%f0%9f%94%98depression-%f0%9f%94%98/

https://track2training.net/2022/01/20/drug-addiction/

https://track2training.net/2022/01/21/woman-enpowerment/

https://track2training.net/2022/01/21/child-marriage/

https://track2training.net/2022/01/21/women-molestation-and-sexual-assault/

https://track2training.net/2022/01/21/tryst-with-destiny/

https://track2training.net/2022/01/21/family%e2%9d%a4/

https://track2training.net/2022/01/21/women-should-also-be-financially-independent/