Tags » TLS

Review of The Sancy Blood Diamond: Power, Greed and the Cursed History of One of the World’s Most Coveted Gems. Susan Ronald. TLS May 5 2005

This is a pretty good example of the capsule reviews I started out contributing to the TLS.

Capsule reviews impose a certain discipline on the reviewer – longer word counts allow more opinionating and grandstanding. 411 more words

Capsule Review

Geography hosts teacher CPD fieldwork course...

Julian Leyland and Pete Langdon once again hosted 20 secondary school teachers for a free CPD course sponsored by Ordnance Survey and Geography and Environment. Now in it’s fourth year, the course sees teachers from across the UK visit the University for four days for an all expenses paid residential course which aims to show them the cutting edge advances in physical geography, with a specific emphasis on fieldwork. 432 more words


Big blue-chip bounces... how does 9% in two-and-a-half days sound?

As the ASX starts to look a bit more stable following an insane start to the week, investors can’t be blamed for looking longingly at some of the prices seen on blue-chip stocks over the last few days. 115 more words


Wesfarmers, CSL and Telstra may be the safest bet during the ASX bloodbath

“It’s amazing, absolutely amazing,” said a very busy Evan Lucas – Market Strategist at IG this afternoon. 

“This is like 2011 and 2008 – I haven’t seen this for a long time.” 102 more words


Book Review: Tony Angell, The House of Owls

For a quarter of a century Tony Angell observed the different pairs of western screech owls that nested in a box he’d nailed to a tree outside his bedroom window, but… 302 more words

Book Review

my TLS kitchen: saladana wrap

The “saladana” lettuce reminds me the good old days in Japan, when my roommate at that time loved this lettuce so much and she taught me to make sausages or crab sticks wrap with that. 152 more words


TLS handshake


The SSL protocol was originally developed at Netscape to enable ecommerce transaction security on the Web, which required encryption to protect customers’ personal data, as well as authentication and integrity guarantees to ensure a safe transaction. 10,628 more words