Friday, December 27, 2019

Comparing Ursula K. Le Guin s The Ones Who Walk Away

In comparing Ursula K. Le Guin s The ones who walk away from Omelas and Kurt Vonnegut Jr. s Harrison Bergeron, the authors describe utopias wherein each society relies on another s misfortune. In Harrison Bergeron, George and Hazel watch their son s execution when he publically rejects the laws of society. In The ones who walk away from Omelas, the narractor describes a city of wonder built upon the pain and suffering of a single child. Through these stories, the authors attempt to convey the following points: everyone desires happiness, not everyone will achieve happiness, and the happiness of some may depend on the unhappiness of others. People wish for a world free from famine, destitution, war, and oppression; A world†¦show more content†¦Watching her husband struggle, Hazel suggests he remove the birdshot, at which he declines. He insists if [he] tried to get away with it, then other people d get away with it - and pretty soon [they d] be right back to the dark ages of competing for a better quality of life and happiness. Hazel decides she hates the very idea of returning to a world where she could hardly compete in anything concerning intelligence and physical labor. Unlike her husband, Hazel wears no handicaps which makes her mediocrity evident. She is wholly content and happy with her current circumstance. George, being severely handicapped, is seemingly happy as well. There are times when the suffering of some can bring greater happiness for others. A small example, would be when one individual loses a job, another can gain a job. However, this is demonstrated unfairly in the city of Omelas. Locked in a damp, dark basement exists a child bereft of all love, care, and opportunity. It has become imbecile through fear, malnutrition, and neglect (260). Its gender is left unidentified to emphasize its destitute and feeble state. The child embodies all the hallmarks of extreme poverty, including the lack of proper nutrition, health, education, as well as poor economic and social standing. The others never come close, but peer in at it with frightened, disgusted eyes (261). They all know [the child] is there, all the peopleShow MoreRelatedBusiness and Management2600 Words   |  11 Pagesyou attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Barnet, S., Cain, W.E., Burto, W. (2011). Literature for composition: Essays, stories, poems, and plays (9th ed.). New York, NY: Longman. All electronic materials are available on the student website. |Week One: Elements of Literature—Stories

Thursday, December 19, 2019

Essay about Stem Cell Research - 808 Words

Stem Cell Research Works Cited Not Included Stem cell research is an ongoing controversial issue. What exactly is stem cell research? How would this type of research affect peoples lives? What are stem cells? Where do they come from and what are their uses in the human body? What diseases and medical conditions could be helped if not eventually cured completely? Scientists are very optimistic regarding stem cell research. Whether or not that research will be allowed to continue, in an unobstructed, way is still to be decided. How much do you know about stem cell research? Most people have heard that it may be the new miracle cure of the century. However, many of these same people dont know†¦show more content†¦Stem cells can eventually be used to help people with spinal chord injuries, liver cells to repair a damaged organ, diabetes and neurological diseases such as Parkinsons and Lou Gehrigs disease. In addition, many types of cancer and birth defects, which scientists believe are abnormal cells that are out of control, may be slowed or stopped all together (Stem Cell Research Foundation). Replacing these with healthy stem cells could have amazing results. The potential benefits are astounding. Stem cells come from a number of places in the body. The type of cell that has the best potential to develop into other tissues, are the stem cells from early embryos. These are usually left over from infertility treatments, or are created just for research. Other locations of stem cells are in blood cells from the umbilical chord removed after birth. Still others come from germ cells or organs of an aborted fetus. Some adult tissues such as bone marrow seem to be limited in their ability to develop into other types of tissue(Sir Liam Donaldson, Dept of Health, part 4). So why is there a problem with stem cell research? Many people are opposed mainly because of the fact that the stem cells with the most potential come from human embryos. There is a moral issue that says an embryo is a human being and that doing any type of research on an embryo is unethical and as such anShow MoreRelatedStem Cell Research : Stem Cells1338 Words   |  6 Pages Stem Cells Stem cells are cells that are found throughout the human body. They reproduce over a long period of time without changing. Stem cells can produce specialized cells, such as brain, muscle or lung cells. Stem cells in the last few years have recently made a big debut because medical professionals have discovered so many unique qualities to stem cells. They are on the cutting edge of medicine because of all their uses and the qualities that make them so unique from any other cell in theRead MoreStem Cell Research : Stem Cells941 Words   |  4 PagesStem cells have the extraordinary power to develop into several body cell types during early growth and development. (Stem Cell Basics). Stem cells are either embryonic: from a human fetus, or somatic: from an adult (Stem Cell Basics).These cells can be used to rebuild body tissue, treat diseases, and even cure others. They can be more effective in treatment of illness than the common treatment, such as therapy or medication. Stem cells a re potentially more medically effective than traditional treatmentsRead MoreStem Cell Research : Stem Cells1416 Words   |  6 PagesSTEM CELLS In this report, I mainly focused on Stem-Cells. You will read about Stem-Cells and its history from the moment this term was known. Also, you will know the Sources, properties, and the types of Stem-Cells. In addition, you will know some of the pros and cons researches about Stem-Cells. Stem-Cells are cells that have the ability to divide and multiply and renew itself. †¢ Sources of Stem-Cells: 1- The first source is Bone Marrow. 2- The second source isRead MoreStem Cells And Stem Cell Research1310 Words   |  6 Pagesnonspecialized cells which have the potential to create other types of specific cells in order to survive? Those cells are called Stem Cells and they are very crucial to develop organisms. Stem cell research is a subject that most people in the world have a different viewpoint on. Some view the issue of stem cell research and stem cell therapy as morally wrong and a crime against humanity, others view the study of stem cells as the next step in modern science (Reeve.) I think in some twisted way, stem cellRead MoreStem Cell Research : Stem Cells1261 Words   |  6 Pagescure diseases. Now we have stem cell therapy. Stem cells promise future cures for many currently considered to be â€Å"incurable† diseases, but with more research, we can overcome the controversy surrounding this this topic and help people live longer, improve their quality of life, and save many many lives. To understand the big hype about stem cells, one must know what a stem cell is. Stem cells have specialized functions that have the potential to become any type of cell in the body. According toRead MoreStem Cell Research : Stem Cells1416 Words   |  6 PagesDana Moua English IV 25 April 2016 Stem Cell Research What are stem cells? Stem cells are undifferentiated cells that are found in multicellular organisms. The reason for scientist’s interest in stem cells is because of the possible applications of using them. These stem cells can be used to regrow organs/tissues. By using stem cells, scientists may be able to find cures for different cancers, certain genetic diseases, and different physical trauma damages. They can be used to treat a varietyRead MoreStem Cell Research : Stem Cells999 Words   |  4 PagesSTEM CELLS WORKING TO SPECIALIZE INTO CARDIAC CELLS Once the stem cells are delivered near the damaged areas of the heart, the regeneration of cardiac (heart) cells is possible. There is a lack of understanding on how or why specifically the stem cells turn into heart cells. â€Å"Recent studies indicated that the benefits associated with adult stem cell injection might come from paracrine effects, the effect of a nearby cell sending chemical and electrical signals to the stem cell, and not from myocardialRead MoreStem Research On Stem Cell Research1747 Words   |  7 PagesEnglish 111-36 25 November 2014 Stem Cell Research Stem cell research has cultivated a new, miraculous study in the health field. The study has led to an increase in curing diseases over the past couple of decades. Before stem cell research, diseases were destroying and devastating lives continuously on end. With the use of stem cells in modern time, diseases are no longer taking control of lives. The innovation in biomedical technology, such as stem cell research, has greatly impacted the understandingRead MoreStem Cell Research : Stem Cells1999 Words   |  8 Pagesregenerative medicine, commonly known as stem cell research. Stem cells are undifferentiated cells within the body that have the capability to specialize into any tissue. They are most commonly found in cord blood, bone marrow, organ donations, placenta, and embryos . Stem cells are seen by some as a new miracle treatment, encouraging many countries to invest in their research. The transfer of information, often shared through scientific reports and research, puts this topic in a highly internationalRead MoreStem Research On Stem Cell Research1271 Words   |  6 Pages! ! ! Stem Cells Research ! ! ! ! ! ! ! Jabaree Shipp English III NCVPS Mrs.Gallos 8, December 2014 ! ! ! ! ! ! Throughout most of our lifetime on Earth many have pondered the thought of how they and the things around them have been created. They wondered what makes grass grow to what makes themselves grow mentally and physically. Through extensive research and major advancements in technology over these years, decades, and centuries we still have no answer to our own questions. But, we do however

Tuesday, December 10, 2019

Computer Crime (1635 words) Essay Example For Students

Computer Crime (1635 words) Essay Computer CrimeComputer Crime Its the weekend, you have nothing to do so you decide to play around on your computer. You turn it on and then start up, you start calling people with your modem, connecting to another world, with people just like you at a button press away. This is all fine but what happens when you start getting into other peoples computer files. Then it becomes a crime, but what is a computer crime really, obviously it involves the use of a computer but what are these crimes. Well they are: Hacking, Phreaking, ; Software Piracy. To begin I will start with Hacking, what is hacking. Hacking is basically using your computer to Hack your way into another. They use programs called scanners which randomly dials numbers any generating tones or carriers are recorded. These numbers are looked at by hackers and then used again, when the hacker calls up the number and gets on hes presented with a logon prompt, this is where the hacking really begins, the hacker tries to bypass this anyway he knows how to and tries to gain access to the system. Why do they do it, well lets go to a book and see Avid young computer hackers in their preteens and teens are frequently involved in computer crimes that take the form of trespassing, invasion of privacy, or vandalism. Quite often they are mearly out for a fun and games evening, and they get entangled in the illegal use of their machines without realizing the full import of what they are doing , I have a hard time believing that so lets see what a hacker has to say about what he does Just as they were enthraled with their pursuit of information, so are we. The thrill of the hack is not in breaking the law, its in the pursuit and capture of knowledge. , as you can see the hacker doesnt go out to do destroy things although some do. Its in the pursuit of knowledge. Of course this is still against the law. But where did all of this start, MIT is where hacking started the people there would learn and explore computer systems all around the world. In the views of professional hacking is like drugs or any other addictive substance, its an addiction for the mind and once started its difficult to stop. This could be true, as hackers know what they are doing is wrong and they know odds are they will be caught. But as I mentioned some hackers are just above average criminals, using there skills to break in banks and other places where they can get money, or where they can destroy information. What a hacker does at a bank is take a few cents or even a few fractions of a cents from many different accounts this may seem like nothing but when all compiled can be alot. A stick up robber averages about $8,000 each job, and he has to put his life and personal freedom on the line to do it while the computer hacker in the comfort of his own living room averages $500,000 a job. As for people destroying information, this is for taking some one down, destruction of data could end a business which for some is very attractive. It can cost a company thousands of dollars to restore the damage done. Now that you have an understanding of what a hacker is, it time to move on to someone closely associates with a hacker. This is a Phreak, but what is that. For the answer we turn to the what is known as the Official Phreakers Manual Phreak 1. The action of using mischievous and mostly illegal ways inorder to not pay for some sort of telecommunications bill,order, transfer, or other service. It often involves usage ofhighly illegal boxes and machines in order to defeat thesecurity that is set up to avoid this sort of happening. .uf9925e5ab02a26d94c5a899b4b7a016f , .uf9925e5ab02a26d94c5a899b4b7a016f .postImageUrl , .uf9925e5ab02a26d94c5a899b4b7a016f .centered-text-area { min-height: 80px; position: relative; } .uf9925e5ab02a26d94c5a899b4b7a016f , .uf9925e5ab02a26d94c5a899b4b7a016f:hover , .uf9925e5ab02a26d94c5a899b4b7a016f:visited , .uf9925e5ab02a26d94c5a899b4b7a016f:active { border:0!important; } .uf9925e5ab02a26d94c5a899b4b7a016f .clearfix:after { content: ""; display: table; clear: both; } .uf9925e5ab02a26d94c5a899b4b7a016f { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .uf9925e5ab02a26d94c5a899b4b7a016f:active , .uf9925e5ab02a26d94c5a899b4b7a016f:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .uf9925e5ab02a26d94c5a899b4b7a016f .centered-text-area { width: 100%; position: relative ; } .uf9925e5ab02a26d94c5a899b4b7a016f .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .uf9925e5ab02a26d94c5a899b4b7a016f .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .uf9925e5ab02a26d94c5a899b4b7a016f .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .uf9925e5ab02a26d94c5a899b4b7a016f:hover .ctaButton { background-color: #34495E!important; } .uf9925e5ab02a26d94c5a899b4b7a016f .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .uf9925e5ab02a26d94c5a899b4b7a016f .uf9925e5ab02a26d94c5a899b4b7a016f-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .uf9925e5ab02a26d94c5a899b4b7a016f:after { content: ""; display: block; clear: both; } READ: Volleyball Essayv. 2. A person who uses the above methods of destruction andchaos in order to make a better life for all. A true phreakerwill not go against his fellows or narc on people who haveragged on him or do anything termed to be dishonourable tophreaks. n. 3. A certain code or dialup useful in the action of being a phreak. (Example: I hacked a new metro phreak last night.) The latter 2 ideas of what a phreak is, is rather weird. A Phreak like the hacker likes to explore and experiment, however his choice of exploring is not other computer but the phone system as a whole. Phreaks explore the phone system finding many different ways to do things, most often make free calls. Why do they do this, A hacker and phreaker will have need to use telephone systems much more than an average individual, therefore, methods which can be used to avoid toll charges are in order. . A phreak has two basicways of making free calls, he can call up codes or PBXs on his phone and then enter a code and make his call or he can use Electronic Toll Fraud Devices. Codes are rather easy to get the phreak will scan for them, but unlike a hacker will only save the tone(s) number instead of the carrier(s). Then he will attempt to hack the code to use it, these c odes range from numbers 0 9 and can be any length, although most are not more than 10. Electronic Toll Fraud Devices are known as Boxes in the underground. Most are the size of a pack of smokes, or than can be smaller or bigger. I will not go too deep. They are electronic devices than do various things, such as make outgoing calls free, make incoming calls free, simulate coins dropping in a phone, etc. People who Phreak are caught alot these days thanks to the new technology. Software Piracy is the most common computer crime, it is the illegal coping of software. People wouldnt think of shoplifting software from a retail store, but dont think twice about going home and making several illegal copies of the same software. and this is true because I myself am guilty of this. The major problem is not people going out and buying the software then making copies for everyone, its the Bulletin Boards that cater to pirating software, that really cause the problem. On anyone one of these boards one can find an upwards of 300 1000+ of pirated software open for anyone to take. This is a problem and nothing can really be done about it. Few arrests are made in this area of computer crime. I will now devote a brief section to the above mentioned BBS , most are legal and do nothing wrong. However there are many more that do accept pirated software, pornographic pictures, animations , and texts. As well as a trading area for phone codes, other BBS, Credit Card numbers, etc. This is where a majority of Hackers and Phreaks come, as well as those who continue to pirate software come to meet and share stories. In this is a new world, where you can do anything, there are groups that get, crack, and courier software all over the world some of them are called:INC: International Network Of Crackers, THG: The Humble Guys, TDT: The Dream Team. As well a number of other groups have followed suit such as Phalcon/SKISM (Smart Kids Into Sick Methods), NuKE, and YAM (Youngsters Against McAfee) these are virus groups who write and courier their work anywhere they can, they just send it somewhere, where anyone can take it and use it in any manner they wish, such as getting even with some one. All of these activities are illegal but nothing can be done, the people running these boards know what they are doing. As it stands right now, the BBS world is in two parts Pirating and the Underground, which consists of Hackers/Phreaks/Anarchists/Carders(Credit Card Fraud)/Virus programmers. All have different boards and offer a variety of information on virtually any subject. .ub704222657c6af4b3cd391677c535ef6 , .ub704222657c6af4b3cd391677c535ef6 .postImageUrl , .ub704222657c6af4b3cd391677c535ef6 .centered-text-area { min-height: 80px; position: relative; } .ub704222657c6af4b3cd391677c535ef6 , .ub704222657c6af4b3cd391677c535ef6:hover , .ub704222657c6af4b3cd391677c535ef6:visited , .ub704222657c6af4b3cd391677c535ef6:active { border:0!important; } .ub704222657c6af4b3cd391677c535ef6 .clearfix:after { content: ""; display: table; clear: both; } .ub704222657c6af4b3cd391677c535ef6 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .ub704222657c6af4b3cd391677c535ef6:active , .ub704222657c6af4b3cd391677c535ef6:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .ub704222657c6af4b3cd391677c535ef6 .centered-text-area { width: 100%; position: relative ; } .ub704222657c6af4b3cd391677c535ef6 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .ub704222657c6af4b3cd391677c535ef6 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .ub704222657c6af4b3cd391677c535ef6 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .ub704222657c6af4b3cd391677c535ef6:hover .ctaButton { background-color: #34495E!important; } .ub704222657c6af4b3cd391677c535ef6 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .ub704222657c6af4b3cd391677c535ef6 .ub704222657c6af4b3cd391677c535ef6-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .ub704222657c6af4b3cd391677c535ef6:after { content: ""; display: block; clear: both; } READ: What Is Orientalism? EssayWell from all of this reading you just did you should have a fairly good idea of what computer crime is. I didnt mention it in the sections but the police, phone companies are arresting and stopping alot of things every day. With the new technology today it is easier to catch these criminals then it was before. With the exception of the BBS the police have made some major blows busting a few BBS, arresting hackers and phreaks. All of which were very looked up to for knowledge in their areas of specialty. If I had more time I could go into these arrests but I must finish by saying that these are real crimes and the sentences are getting harsher, wi th alot of the older people getting out the newer people are getting arrested and being made examples of. This will deter alot of would-be computer criminal away.

Tuesday, December 3, 2019

Radioactive Wastes, Must For The Protection Of Mankind Be Stored Or Di

Radioactive wastes, must for the protection of mankind be stored or disposed in such a manner that isolation from the biosphere is assured until they have decayed to innocuous levels. If this is not done, the world could face severe physical problems to living species living on this planet. Some atoms can disintegrate spontaneously. As they do, they emit ionizing radiation. Atoms having this property are called radioactive. By far the greatest number of uses for radioactivity in Canada relate not to the fission, but to the decay of radioactive materials - radioisotopes. These are unstable atoms that emit energy for a period of time that varies with the isotope. During this active period, while the atoms are 'decaying' to a stable state their energies can be used according to the kind of energy they emit. Since the mid 1900's radioactive wastes have been stored in different manners, but since several years new ways of disposing and storing these wastes have been developed so they may no longer be harmful. A very advantageous way of storing radioactive wastes is by a process called 'vitrification'. Vitrification is a semi-continuous process that enables the following operations to be carried out with the same equipment: evaporation of the waste solution mixed with the ------------------------------------------------------------1) borosilicate: any of several salts derived from both boric acid and silicic acid and found in certain minerals such as tourmaline. additives necesary for the production of borosilicate glass, calcination and elaboration of the glass. These operations are carried out in a metallic pot that is heated in an induction furnace. The vitrification of one load of wastes comprises of the following stages. The first step is 'Feeding'. In this step the vitrification receives a constant flow of mixture of wastes and of additives until it is 80% full of calcine. The feeding rate and heating power are adjusted so that an aqueous phase of several litre s is permanently maintained at the surface of the pot. The second step is the 'Calcination and glass evaporation'. In this step when the pot is practically full of calcine, the temperature is progressively increased up to 1100 to 1500 C and then is maintained for several hours so to allow the glass to elaborate. The third step is 'Glass casting'. The glass is cast in a special container. The heating of the output of the vitrification pot causes the glass plug to melt, thus allowing the glass to flow into containers which are then transferred into the storage. Although part of the waste is transformed into a solid product there is still treatment of gaseous and liquid wastes. The gases that escape from the pot during feeding and calcination are collected and sent to ruthenium filters, condensers and scrubbing columns. The ruthenium filters consist of a bed of ------------------------------------------------------------ 2) condensacate: product of condensation. glass pellets coated w ith ferrous oxide and maintained at a temperature of 500 C. In the treatment of liquid wastes, the condensates collected contain about 15% ruthenium. This is then concentrated in an evaporator where nitric acid is destroyed by formaldehyde so as to maintain low acidity. The concentration is then neutralized and enters the vitrification pot. Once the vitrification process is finished, the containers are stored in a storage pit. This pit has been designed so that the number of containers that may be stored is equivalent to nine years of production. Powerful ventilators provide air circulation to cool down glass. The glass produced has the advantage of being stored as solid rather than liquid. The advantages of the solids are that they have almost complete insolubility, chemical inertias, absence of volatile products and good radiation resistance. The ruthenium that escapes is absorbed by a filter. The amount of ruthenium likely to be released into the environment is minimal. Another method that is being used today to get rid of radioactive waste is the 'placement and self processing radioactive wastes in deep underground cavities'. This is the disposing of toxic wastes by incorporating them into molten silicate rock, with low permeability. By this method, liquid wastes are injected into a deep underground cavity with mineral treatment and allowed to self-boil. The resulting steam is processed at ground level Radioactive Wastes, Must For The Protection Of Mankind Be Stored Or Di Radioactive wastes, must for the protection of mankind be stored or disposed in such a manner that isolation from the biosphere is assured until they have decayed to innocuous levels. If this is not done, the world could face severe physical problems to living species living on this planet. Some atoms can disintegrate spontaneously. As they do, they emit ionizing radiation. Atoms having this property are called radioactive. By far the greatest number of uses for radioactivity in Canada relate not to the fission, but to the decay of radioactive materials - radioisotopes. These are unstable atoms that emit energy for a period of time that varies with the isotope. During this active period, while the atoms are 'decaying' to a stable state their energies can be used according to the kind of energy they emit. Since the mid 1900's radioactive wastes have been stored in different manners, but since several years new ways of disposing and storing these wastes have been developed so they may no longer be harmful. A very advantageous way of storing radioactive wastes is by a process called 'vitrification'. Vitrification is a semi-continuous process that enables the following operations to be carried out with the same equipment: evaporation of the waste solution mixed with the ------------------------------------------------------------1) borosilicate: any of several salts derived from both boric acid and silicic acid and found in certain minerals such as tourmaline. additives necesary for the production of borosilicate glass, calcination and elaboration of the glass. These operations are carried out in a metallic pot that is heated in an induction furnace. The vitrification of one load of wastes comprises of the following stages. The first step is 'Feeding'. In this step the vitrification receives a constant flow of mixture of wastes and of additives until it is 80% full of calcine. The feeding rate and heating power are adjusted so that an aqueous phase of several litre s is permanently maintained at the surface of the pot. The second step is the 'Calcination and glass evaporation'. In this step when the pot is practically full of calcine, the temperature is progressively increased up to 1100 to 1500 C and then is maintained for several hours so to allow the glass to elaborate. The third step is 'Glass casting'. The glass is cast in a special container. The heating of the output of the vitrification pot causes the glass plug to melt, thus allowing the glass to flow into containers which are then transferred into the storage. Although part of the waste is transformed into a solid product there is still treatment of gaseous and liquid wastes. The gases that escape from the pot during feeding and calcination are collected and sent to ruthenium filters, condensers and scrubbing columns. The ruthenium filters consist of a bed of ------------------------------------------------------------ 2) condensacate: product of condensation. glass pellets coated w ith ferrous oxide and maintained at a temperature of 500 C. In the treatment of liquid wastes, the condensates collected contain about 15% ruthenium. This is then concentrated in an evaporator where nitric acid is destroyed by formaldehyde so as to maintain low acidity. The concentration is then neutralized and enters the vitrification pot. Once the vitrification process is finished, the containers are stored in a storage pit. This pit has been designed so that the number of containers that may be stored is equivalent to nine years of production. Powerful ventilators provide air circulation to cool down glass. The glass produced has the advantage of being stored as solid rather than liquid. The advantages of the solids are that they have almost complete insolubility, chemical inertias, absence of volatile products and good radiation resistance. The ruthenium that escapes is absorbed by a filter. The amount of ruthenium likely to be released into the environment is minimal. Another method that is being used today to get rid of radioactive waste is the 'placement and self processing radioactive wastes in deep underground cavities'. This is the disposing of toxic wastes by incorporating them into molten silicate rock, with low permeability. By this method, liquid wastes are injected into a deep underground cavity with mineral treatment and allowed to self-boil. The resulting steam is processed at ground level