Dictionary and translator for handheld
New : sensagent is now available on your handheld
A windows (pop-into) of information (full-content of Sensagent) triggered by double-clicking any word on your webpage. Give contextual explanation and translation from your sites !
With a SensagentBox, visitors to your site can access reliable information on over 5 million pages provided by Sensagent.com. Choose the design that fits your site.
Improve your site content
Add new content to your site from Sensagent by XML.
Crawl products or adds
Get XML access to reach the best products.
Index images and define metadata
Get XML access to fix the meaning of your metadata.
Please, email us to describe your idea.
Lettris is a curious tetris-clone game where all the bricks have the same square shape but different content. Each square carries a letter. To make squares disappear and save space for other squares you have to assemble English words (left, right, up, down) from the falling squares.
Boggle gives you 3 minutes to find as many words (3 letters or more) as you can in a grid of 16 letters. You can also try the grid of 16 letters. Letters must be adjacent and longer words score better. See if you can get into the grid Hall of Fame !
Change the target language to find translations.
Tips: browse the semantic fields (see From ideas to words) in two languages to learn more.
1.a fortification 1,500 miles long built across northern China in the 3rd century BC; it averages 6 meters in width
city wall; town wall[Classe]
pays socialiste et assimilé (fr)[Classe]
château fort (fr)[DomainDescrip.]
bulwark, rampart, wall[Hyper.]
Chinese Wall (n.)
||This article needs additional citations for verification. (July 2008)|
In business, a Chinese wall or firewall is an information barrier implemented within a firm to separate and isolate persons who make investment decisions from persons who are privy to undisclosed material information which may influence those decisions. This is a way of avoiding conflict of interest problems.
In general, all firms are required to develop, implement, and enforce reasonable policies and procedures to safeguard insider information and to ensure that no improper trading occurs. Although specific procedures are not mandated, adopted practices must be formalized in writing and be appropriate and sufficient. Procedures should address the following areas: education of employees, containment of inside information, restriction of transactions, and trading surveillance.
The term was popularized in the United States following the stock market crash of 1929, when the U.S. government legislated information separation between investment bankers and brokerage firms, in order to limit the conflict of interest between objective analysis of companies and the desire for successful initial public offerings. Rather than prohibiting one company from engaging in both businesses, the government permitted the implementation of Chinese wall procedures.
At least one California judge has taken offense to the phrase Chinese Wall. In Peat, Marwick, Mitchell & Co. v. Superior Court 200 Cal.App.3d 272, 293–294, 245 Cal.Rptr. 873, 887–888 (1988), Presiding Justice Low wrote:
The term has an ethnic focus which many would consider a subtle form of linguistic discrimination. Certainly, the continued use of the term would be insensitive to the ethnic identity of the many persons of Chinese descent. Modern courts should not perpetuate the biases which creep into language from outmoded, and more primitive, ways of thought.
Other alternative phrases include screen (screening), firewall, cone of silence, and ethical wall. Screen or the verb to screen is the preferred term under the American Bar Association (ABA) Model Rules of Professional Conduct, a code of legal ethics that has been highly influential throughout the jurisdictions of the United States.
A Chinese wall is most commonly employed in investment banks, between the corporate-advisory area and the brokering department in order to separate those giving corporate advice on takeovers from those advising clients about buying shares. The "wall" is thrown up to prevent leaks of corporate inside information, which could influence the advice given to clients making investments, and allow staff to take advantage of facts that are not yet known to the general public.
In spite of Chinese walls, these conflicts of interest arose during the heyday of the "dot-com" era, when research analysts published dishonest positive analyses on companies in which they, or related parties, owned shares (see Global Settlement). The U.S. government has since passed laws strengthening the Chinese wall concept (e.g. Sarbanes-Oxley Act) with the desire to more carefully formalize and prevent such conflicts.
Chinese walls are also used in the Corporate Finance departments of certain 'Big Four' accountancy firms. They are designed to insulate sensitive documentation from the wider firm in order to prevent conflicts of interest as described above.
The Chinese wall is regarded as breached for advertorial projects.
Chinese Walls are used in law firms when one part of the firm, representing a party on a deal or litigation, is separated from another part with contrary interests or with confidential information from an adverse party. In the United Kingdom, a law firm may represent competing parties in a suit, but only in strictly defined situations and when individual fee earners do not act for both sides In the United States, at least in Ohio, it is illegal for members of the same law firm to represent both sides of a legal conflict regardless of whether the individuals communicate about the case. To do so is considered a conflict of interest and can result in disciplinary action against the attorney or the firm that employs him or her. Even Legal Aid cannot represent both sides of a conflict.
Chinese wall refers to a reverse engineering method involving two separate groups. One group reverse-engineers the original code and writes thorough documentation, while the other group writes new code based only on the new documentation. This method insulates the new code from the old code, so that it will not be considered a derived work. See also clean room design.
The Chinese Wall Model (also Brewer and Nash Model) is a security model where read/write access to files is governed by membership of data in conflict-of-interest classes and datasets. This is the basic model used to provide both privacy and integrity for data.