|Area||Expected rainfall amount in rainy season 2018 (mm)|
|Sothern (Thai Gulf)||224||262||278||303||330||255|
|Flood news during the past weeks: May 16th 2018: Heavy rainfall in Bueng Sub-District of Sriracha District, Chonburi Province caused 50 cm high flood as an influence from the tropical storm. The area has never been flooded before. May 20th 2018: Windstorms hit several provinces causing falling trees and electric posts such as in Chaiyaphum, Phrae and Uttaradit. May 22nd 2018: The water from stream overflowed to the villages in Lampang Province after 5 hours of rainfall. May 24th 2018: Heavy rainfall in the night caused water logged in the village in Muang District of Chiang Mai Province. May 26th 2018: All-night rain in Pang Nga caused flood on Takua Pa-Phuket road which paralyzed the traffic. May 27th 2018: After 2 hours of raining, the flash flood from mountain attacked villages in Phayao Province. June 4th 2018: 30 cm high flood due to heavy rainfall in Khon Kaen and Udonthani Provinces. June 5th 2018: One-hour heavy rainfall in Phuket caused floods on many road surfaces and flowed to the residence areas. It also caused landslides in some areas. June 5th 2018: Heavy rain in Korat caused flood and flashflood to destroy road. This caused paralyzed traffic and car accident. June 9th 2018: Chao Phraya dam increased the drainage rate from 250 m3/s to 350 m3/s to due to the increasing amount of water from the northern region.|
Have you ever wondered how our confidential or personal information leaks from us? Or how they fall into the wrong hands? The answers differs from a simple methods to advanced ones, so firstly for someone who may not be involved in cyber security to understand overall pictures is to know what is data breach? And where do data flow? Data breach is an incident where information is stolen or taken from a system without the knowledge or authorization of the system’s owner which can cause a small company or a large organization to suffer great loss. Stolen data may involve sensitive, proprietary, or confidential information, such as credit card numbers, customer data or trade secrets. There are so many ways data can easily leak out of an organization. There are three buckets or containers where information “lives and flows”; in digital form, in hard copy (paper) and in the conversation. Information is constantly flowing between these containers, usually resting in more than one of them at any given moment without some type of map or landscape that lays them all out. Data leak is divided into 2 classes which are internal data leakage and leakage from external threats. In total, there are shown 19 ways below.
2017: High amount of Rainfall According to TMD the amount of rainfall in 2017 is more than average at 1,700 mm where the average country is 1572 mm. according to the reference the amount of yearly rainwater in 2011 is at 1,781mm The water is under irrigation department management which is diverted to canals and water retention areas (monkey cheek). In this regards, if the water management fails, the flood similar to 2011 could occurs due to the amount of rainfall. It is important to inspect and ensure that the flood protection and management is reliable and fully functional. The Upper Chao Phraya River Flow The amount of water from Upper Chaophraya has increased and spread to wider area but still under its capacity in most area. The critical area is in Phichit area where Yom and Nan river adjoins. In addition to Chainat area. However, the situation is same as last month. The amount of water increased largely came from Ping and Wang river. The amount of water at Chao Phraya river dam has increased from 2,600 m3/s to 2,700 m3/s. Premises near Chaophraya River should be aware of the situation. The Lower Chao Phraya River Flow The amount of water from Upper Chaophraya has contiously increased. Many area has been flooded in Singburi and Chaophraya. Water in many area is also at critical level. In case of heavy rainfall, the drainage from land to the major river could be reduced and resulted in inland flood. It is necessary to check the drainage capacity and the ability to drain water to major rivers.
The malicious code refers to a broad category of programs that can cause damage or undesirable effects to computers or networks. Possible damage can include modifying, destroying or stealing sensitive data, gaining or allowing unauthorized access to a system and executing functions that a user never intended. So computer viruses are the most common form of malicious code. A virus is a program that infects a computer by attaching itself to another program and propagating itself when that program is executed. It should be noted that some malicious programs are able to exhibit the behaviors of more than one type of malicious code. For example, certain programs may be both a virus and a Trojan horse at the same time. Thus there are plenty of antiviruses are available in the market which uses different approaches to detect and remove viruses. Generally, these approaches can be distinguished into three categories 1) Signature-based detection 2) Heuristic-based detection and 3) Behavioral-based detection
The reaction time for car accidents depends on each person’s ability and training. The ability of emergency response is related to the decision time. Furthermore, the decision should consider disadvantages like the amount of people injured and property damage. Research shows that the time of low awareness and concentration decreases the ability to respond, increasing the risk of accident. The necessary driving skills are accuracy of response, quick reaction time and good control of the steering wheel. Presently, there is technology that evaluates these driving skills. If the driver can reduce error of judgement, the chance of accident would decreased. Drivers get low accuracy scores, they should practice more. If the driver has slow response time, they should take a break in order to drive with common sense and reduce road accidents. In addition, the steering wheel skills are related to the experience of the driver. The driver should have experience before driving on the road in order to reduce road accidents. According to the Domino Theory of H.W. Heinrich, if the first domino (Social environment of background) falls over, the next domino would fall over as well. Thus, if you don’t want the fourth domino (Accident) to fall over, you should remove third domino (Unsafe acts or unsafe condition) to prevent injury and property damage. Thus, if the driver has developed these 3 skills (accuracy of response, quick reaction time and good control of the steering wheel) as mentioned, it would help to reduce the chance of accident. How responsive are you on emergencies
Various technologies exist to help people when unexpected accidents happen on the road.
There is a wide range of choice, especially with car accessories such as GPS, car cameras,
speed and distance recorder, emergency kit and break hammer rescue tool.
All devices as mentioned would save human life and help the driver in the case of the problems while driving.
Do I need website security? What is an SSL certificate?Do I need website security? What is an SSL certificate? Exactly how safe is your website? As ordinary web users, we rarely think about the risks of an unprotected site. This is a short guide on how to keep your website and business safe. Some basics are discussed, such as what is an SSL certificate, the different types and why we need them. An SSL certificate, or Secure Sockets Layer certificate, is a third-party verification that provides technology to encrypt data to protect information.Exchange of information can happen in many forms, e.g. blog comments, login details or landing pages. Every website will need at least one SSL certificate.