Arsenic in the Pirkanmaa Region, Southern Finland: from Identification Through to Risk Assessment to Risk Management

Total Page:16

File Type:pdf, Size:1020Kb

Arsenic in the Pirkanmaa Region, Southern Finland: from Identification Through to Risk Assessment to Risk Management Geoscience for Society 125th Anniversary Volume Edited by Keijo Nenonen and Pekka A. Nurmi Geological Survey of Finland, Special Paper 49, 213–227, 2011 ARSENIC IN THE PIRKANMAA REGION, SOUTHERN FINLAND: FROM IDENTIFICATION THROUGH TO RISK ASSESSMENT TO RISK MANAGEMENT by Timo Ruskeeniemi1)*, Birgitta Backman1)), Kirsti Loukola-Ruskeeniemi1), Jaana Sorvari2), Heli Lehtinen1), Eija Schultz2), Ritva Mäkelä-Kurtto3), Esko Rossi4), Kati Vaajasaari5) and Ämer Bilaletdin6) Ruskeeniemi, T., Backman, B., Loukola-Ruskeeniemi, K., Sorvari, J., Lehtinen, H., Schultz, E., Mäkelä-Kurtto, R., Rossi, E., Vaajasaari, K. & Bilaletdin, Ä. 2011. Arsenic in the Pirkanmaa region, southern Finland: From identification through to risk assessment to risk management. Geological Survey of Finland, Special Paper 49, 213–227, 5 figures. The RAMAS Project investigated the occurrence of arsenic in the Tampere region (Pirkanmaa), assessed the potentially arising health and ecological risks at the regional scale, and presented recommendations for preventive and remediation actions. The three-year project (2004–2007) received financial support from the EU LIFE Environ- ment programme. The implementing partners were the Geological Survey of Finland, Helsinki University of Technology, the Pirkanmaa Regional Environment Centre, the Finnish Environment Institute, Agrifood Research Finland, Esko Rossi Oy and Kemira Kemwater. The project mapped the areas where natural arsenic concentrations are elevated in bedrock, the soil cover or in groundwater and surface waters. Arsenic contents in ar- able land, crops, and in some wild berries and mushrooms were analysed. Correspond- ingly, the most important potential anthropogenic sources were located and evaluated. Concerning the human health risk, potable water from drilled wells was determined to be the main exposure route. The exposure for arsenic was demonstrated in a bio- monitoring study. Arsenic concentrations in urine were clearly elevated among those households using arsenic-bearing well water. An epidemiological survey revealed that certain cancer types linked to arsenic are statistically more frequent in those areas where the health limit value for arsenic (10µg/l) in well waters is commonly exceeded. Many of the local municipalities have made major efforts to extend the public water supply network to those areas suffering from elevated arsenic concentrations. Arsenic is not a problem in arable lands, and its uptake by plants also seems to be very low. However, it is less appreciated that both the till cover and bedrock in the region may locally contain naturally high arsenic concentrations. The most important anthropogenic arsenic sources in the region include a few wood treatment plants that have utilized copper-chromium-arsenic solutions in their produc- tion, and closed sulphide mine sites. The environmental and ecological risks related to the various arsenic sources were evaluated and the most urgent needs for remedia- tion measures were identified. Preventive decisions already made during the planning phases of land use activities are the most effective risk management measure both in terms of health and ecological risks. The RAMAS project has published several reports and risk area maps, which can be downloaded from the project’s website: www.gsf.fi /projects/ramas. 213 Geological Survey of Finland, Special Paper 49 Timo Ruskeeniemi, Birgitta Backman, Kirsti Loukola-Ruskeeniemi, Jaana Sorvari, Heli Lehtinen et al. Keywords (GeoRef Thesaurus, AGI): environmental geology, arsenic, background level, bedrock, soils, ground water, surface water, human activity, risk assessment, risk management, Pirkanmaa, Finland 1) Geological Survey of Finland, P.O. Box 96, FI-02151 Espoo, Finland 2) Finnish Environment Institute, P.O. Box 140, FI-00251 Helsinki, Finland 3) MTT Agrifood Research Finland, FI-31600 Jokioinen, Finland 4) Esko Rossi Oy, Kuokkasenmutka 4, FI-40520 Jyväskylä, Finland 5) Reachlaw Ltd., Keilaranta 15, FI-02150 Espoo, Finland 6) Pirkanmaa Centre for Economic Development, Transport and the Environment, P.O. Box 297, FI-33101 Tampere, Finland * E-mail: [email protected] 214 Geological Survey of Finland, Special Paper 49 Arsenic in the Pirkanmaa region, southern Finland: From identification through to risk assessment to risk management ARSENIC IN THE NATURAL ENVIRONMENT Arsenic (As) is a natural component of bedrock. It countries followed this recommendation, including ranks twentieth in abundance among the elements the Finnish Ministry of Social Affairs and Health in the Earth’s crust. The abundance of arsenic in the (STM 1994a, 1994b). In 2007, threshold and guide- continental crust is generally given as 1.5–2 ppm line values for arsenic in soil were defined (Gov- (NRC 1977, Reimann & Caritat 1998). Thus, it is ernment Decree 214/2007). The threshold value for relatively scarce. Nevertheless, it occurs as a major assessing the arsenic contamination of the soil and constituent in more than 200 minerals (NRC 1977, the need for remediation is 5 mg/kg. If the natural Smedley & Kinniburgh 2002). Of these minerals, background value demonstrated for an area is high- arsenopyrite (FeAsS) is by far the most common. er than this, it is applied instead. Soil is regarded as Geological processes have dispersed arsenic to contaminated if the guideline values of 50 mg/kg locations where it is more susceptible to dissolu- (residential areas etc.) or 100 mg/kg (industrial ar- tion and transport to the biosphere, such as water- eas, parks etc.) are exceeded. The guideline values conducting fractures in bedrock and the soil cover. are based on either ecological or health risks. Human activities have also released arsenic into the Since the 1980s, geochemical mapping con- environment, generating contaminated areas with ducted in Finland has revealed several areas with occasionally very high arsenic concentrations. elevated arsenic concentrations in bedrock and soil Arsenic is a redox sensitive element, which (Koljonen et al. 1992, Loukola-Ruskeeniemi & La- means that it may be present in a variety of redox hermo 2004). One widespread arsenic anomaly is states. located in a densely populated area in the southern The common oxidation states are –3, 0, +3 and part of the country, in the Tampere region (Figure +5 (CRC 1986). Under oxidising conditions, the 1). When the analytical methods for water analy- predominant form of arsenic in water and soil is the sis improved in the early 1990s, excess arsenic was oxidised form, arsenate (As5+), while under more re- also detected from bedrock groundwater. Combined ducing conditions, arsenite (As3+) may be the domi- with the reported adverse health effects arising from nant arsenic species (e.g. Cullen & Reimer 1989). rather low arsenic concentrations, municipalities At a near neutral pH, which is common for ground- and health authorities were motivated to launch a waters, arsenate is present as negatively charged number of studies in this region (e.g. Backman et al. - 2- oxyions, H2AsO4 or HAsO4 , whereas arsenite re- 1994, Kurttio et al. 1998, 1999, Carlson et al. 2002, mains in the form of uncharged H3AsO3 until the pH Vaajasaari et al. 2002). is raised to 9. The geochemical properties of these There has been considerable interest in arsenic dissolved arsenic forms differ, and this combined from other perspectives, as well. Numerous po- with the prevailing conditions in the water-rock/soil tential anthropogenic sources of arsenic have been system has significant implications for the behav- identified in the Pirkanmaa region, such as wood iour of arsenic in the environment. impregnation plants, power plants, mines, landfill Naturally occurring arsenic in drinking water has sites and other waste treatment plants (Blinikka been identified as a global problem since the 1980s 2004, Melanen et al. 1999, Register of Contaminat- (Dhar et al. 1997, Battacharya et al. 2007). In South ed Land Areas). In this context, the local authorities and South East Asia, at least 50 million people ex- have monitored arsenic, for instance, in fresh waters posed to arsenic suffer from cancer and other ar- and sewage around suspected contaminated areas. senic-related diseases. Wide areas in South America Earlier studies have been site- or target-specific and the US have been reported to contain an excess without any wider consideration of the impact on of arsenic in groundwater. In most areas of Central the whole community or the environment. Further- and Western Europe, arsenic concentrations in sub- more, the existing information is spread between soil are elevated (Salminen et al. 2005). This is also numerous files and registers and is not readily ac- reflected in the quality of groundwaters. cessible to users. This was the starting point and In the early 1990s, some alarming findings were acted as the promoter for the integrated arsenic published, mainly from Taiwan and Bangladesh, project proposal “Risk assessment and risk manage- concerning the health effects of arsenic. As a con- ment procedure for arsenic in the Tampere Region” sequence of these findings, the WHO recommended (RAMAS), submitted to the EU LIFE Environment that the human health-based limit value for arsenic programme. The proposal was successful and the in drinking water should be reduced from 50 µg/l to project was implemented in 2004–2007. 10 µg/l (WHO 1993). National authorities in many 215 Geological Survey of Finland, Special Paper 49 Timo Ruskeeniemi, Birgitta Backman, Kirsti Loukola-Ruskeeniemi, Jaana Sorvari, Heli
Recommended publications
  • Los Angeles Lawyer October 2006 California Aon Attorneys’ Advantage Insurance Program Building the Foundation for Lawyers’ Protection ONE BLOCK at a TIME
    2006 California State Bar Meeting LACBA 2006-07Directory PULLOUT SECTION October 2006 / $4 EARN MCLE CREDIT Hidden Implications of Arbitration Clauses page 35 MEET andCONFER Los Angeles Superior Court Judge Michael L. Stern offers insight on the new local trial preparation rules page 26 PLUS Local Regulation of Alcohol Sales page 14 Fugitive Disentitlement page 44 Lawyers Who Use Macs page 53 THIS IS MY POST OFFICE. Download My Desktop Post OfficeTM at usps.com/smartbusiness Introducing the online shortcut that lets you pick and choose the services you use most at usps.com and access them instantly. Request pickups, ship, track packages and more. ©2006 United States Postal Service. Eagle symbol and logotype are registered trademarks of the United States Postal Service. *Over 50% of malpractice suits start with client communication, calendaring and deadline issues. Do you remember what you were doing three weeks ago at this time? Your client does. A MEMBER BENEFIT OF Time Matters® Manage your: Communications • Calendars • Deadlines • E-mail • To Dos • Conflict Checks • Matters • Billing For a demo disk at no cost† or more information call 800.328.2898 or go to lexisnexis.com/TMinfo *Law Practice Today, November 2005 †Some restrictions may apply. Offer ends 12/29/06. LexisNexis and the Knowledge Burst logo are registered trademarks of Reed Elsevier Properties Inc., used under license. Time Matters is a registered trademark of LexisNexis, a division of Reed Elsevier Inc. AL9202 © 2006 LexisNexis, a division of Reed Elsevier Inc. All rights reserved. October 2006 Vol. 29, No. 7 26 Meet and Confer BY JUDGE MICHAEL L.
    [Show full text]
  • The Origins of the Underline As Visual Representation of the Hyperlink on the Web: a Case Study in Skeuomorphism
    The Origins of the Underline as Visual Representation of the Hyperlink on the Web: A Case Study in Skeuomorphism The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Romano, John J. 2016. The Origins of the Underline as Visual Representation of the Hyperlink on the Web: A Case Study in Skeuomorphism. Master's thesis, Harvard Extension School. Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:33797379 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#LAA The Origins of the Underline as Visual Representation of the Hyperlink on the Web: A Case Study in Skeuomorphism John J Romano A Thesis in the Field of Visual Arts for the Degree of Master of Liberal Arts in Extension Studies Harvard University November 2016 Abstract This thesis investigates the process by which the underline came to be used as the default signifier of hyperlinks on the World Wide Web. Created in 1990 by Tim Berners- Lee, the web quickly became the most used hypertext system in the world, and most browsers default to indicating hyperlinks with an underline. To answer the question of why the underline was chosen over competing demarcation techniques, the thesis applies the methods of history of technology and sociology of technology. Before the invention of the web, the underline–also known as the vinculum–was used in many contexts in writing systems; collecting entities together to form a whole and ascribing additional meaning to the content.
    [Show full text]
  • Fast, Inexpensive Content-Addressed Storage in Foundation Sean Rhea,∗ Russ Cox, Alex Pesterev∗ Meraki, Inc
    Fast, Inexpensive Content-Addressed Storage in Foundation Sean Rhea,∗ Russ Cox, Alex Pesterev∗ Meraki, Inc. MIT CSAIL Abstract particular operating system, itself depending on a particu- lar hardware configuration. In the worst case, a user in the Foundation is a preservation system for users’ personal, distant future might need to replicate an entire hardware- digital artifacts. Foundation preserves all of a user’s data software stack to view an old file as it once existed. and its dependencies—fonts, programs, plugins, kernel, Foundation is a system that preserves users’ personal and configuration state—by archiving nightly snapshots digital artifacts regardless of the applications with which of the user’s entire hard disk. Users can browse through they create those artifacts and without requiring any these images to view old data or recover accidentally preservation-specific effort on the users’ part. To do so, deleted files. To access data that a user’s current environ- it permanently archives nightly snapshots of a user’s en- ment can no longer interpret, Foundation boots the disk tire hard disk. These snapshots contain the complete soft- image in which that data resides under an emulator, al- ware stack needed to view a file in bootable form: given lowing the user to view and modify the data with the same an emulator for the hardware on which that stack once programs with which the user originally accessed it. ran, a future user can view a file exactly as it was. To limit This paper describes Foundation’s archival storage the hardware that future emulators must support, Foun- layer, which uses content-addressed storage (CAS) to re- dation confines users’ environments to a virtual machine.
    [Show full text]
  • 1 Contributors of Finngen
    BMJ Publishing Group Limited (BMJ) disclaims all liability and responsibility arising from any reliance Supplemental material placed on this supplemental material which has been supplied by the author(s) BMJ Open Resp Res Contributors of FinnGen Steering Committee Aarno Palotie Institute for Molecular Medicine Finland, HiLIFE, University of Helsinki, Finland Mark Daly Institute for Molecular Medicine Finland, HiLIFE, University of Helsinki, Finland Pharmaceutical companies Howard Jacob Abbvie, Chicago, IL, United States Athena Matakidou Astra Zeneca, Cambridge, United Kingdom Heiko Runz Biogen, Cambridge, MA, United States Sally John Biogen, Cambridge, MA, United States Robert Plenge Celgene, Summit, NJ, United States Mark McCarthy Genentech, San Francisco, CA, United States Julie Hunkapiller Genentech, San Francisco, CA, United States Meg Ehm GlaxoSmithKline, Brentford, United Kingdom Dawn Waterworth GlaxoSmithKline, Brentford, United Kingdom Caroline Fox Merck, Kenilworth, NJ, United States Anders Malarstig Pfizer, New York, NY, United States Kathy Klinger Sanofi, Paris, France Kathy Call Sanofi, Paris, France University of Helsinki & Biobanks Tomi Mäkelä HiLIFE, University of Helsinki, Finland, Finland Jaakko Kaprio Institute for Molecular Medicine Finland, HiLIFE, Helsinki, Finland, Finland Petri Virolainen Auria Biobank / Univ. of Turku / Hospital District of Southwest Finland, Turku, Finland Kari Pulkki Auria Biobank / Univ. of Turku / Hospital District of Southwest Finland, Turku, Finland Terhi Kilpi THL Biobank / Finnish Institute
    [Show full text]
  • Exploiting Split Browsers for Efficiently Protecting User Data
    Exploiting Split Browsers for Efficiently Protecting User Data Angeliki Zavou, Elias Athanasopoulos, Georgios Portokalidis, and Angelos D. Keromytis Columbia University, New York, NY, USA {azavou,elathan,porto,angelos}@cs.columbia.edu ABSTRACT as the services offered to them. Web browsers have become Offloading complex tasks to a resource-abundant environ- the preferred “portal” to access these services, since they ment like the cloud, can extend the capabilities of resource allow developers to create a uniform interface that is acces- constrained mobile devices, extend battery life, and improve sible from different platforms (PCs, smartphones, tablets, user experience. Split browsing is a new paradigm that etc.), and requires minimal (if any) changes to support new adopts this strategy to improve web browsing on devices like platforms. For the same reason, many mobile applications smartphones and tablets. Split browsers offload computa- (e.g., the NY Times and Facebook apps) simply encapsulate tion to the cloud by design; they are composed by two parts, browsers, acting in essence, as site-specific browsers [24]. Their key role and popularity, their size, and in the case one running on the thin client and one in the cloud. Render- 1 ing takes place primarily in the latter, while a bitmap or a of mobile devices, a growing monoculture, are probably the simplified web page is communicated to the client. Despite main reasons browsers are frequently targeted by attack- its difference with traditional web browsing, split browsing ers [5, 11, 17]. In the past, they have suffered severe attacks still suffers from the same types of threats, such as cross-site that exploit vulnerabilities like buffer overflows [17], which scripting.
    [Show full text]
  • Forensic Investigation of User's Web Activity on Google Chrome Using
    IJCSNS International Journal of Computer Science and Network Security, VOL.16 No.9, September 2016 123 Forensic Investigation of User’s Web Activity on Google Chrome using various Forensic Tools Narmeen Shafqat, NUST, Pakistan Summary acknowledged browsers like Internet Explorer, Google Cyber Crimes are increasing day by day, ranging from Chrome, Mozilla Firefox, Safari, Opera etc. but should confidentiality violation to identity theft and much more. The also have hands on experience of less popular web web activity of the suspect, whether carried out on computer or browsers like Erwise, Arena, Cello, Netscape, iCab, smart device, is hence of particular interest to the forensics Cyberdog etc. Not only this, the forensic experts should investigator. Browser forensics i.e forensics of suspect’s browser also know how to find artifacts of interest from older history, saved passwords, cache, recent tabs opened etc. , therefore supply ample amount of information to the forensic versions of well-known web browsers; Internet Explorer, experts in case of any illegal involvement of the culprit in any Chrome and Mozilla Firefox atleast, because he might activity done on web browsers. Owing to the growing popularity experience a case where the suspected person is using and widespread use of the Google Chrome web browser, this older versions of these browsers. paper will forensically analyse the said browser in windows 8 According to StatCounter Global market share for the web environment, using various forensics tools and techniques, with browsers (2015), Google Chrome, Mozilla Firefox and the aim to reconstruct the web browsing activities of the suspect. Microsoft’s Internet Explorer make up 90% of the browser The working of Google Chrome in regular mode, private usage.
    [Show full text]
  • Web Technologies [R18a0517] Lecture Notes
    WEB TECHNOLOGIES [R18A0517] LECTURE NOTES B.TECH III YEAR – II SEM(R18) (2020-21) DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING MALLA REDDY COLLEGE OF ENGINEERING & TECHNOLOGY (Autonomous Institution – UGC, Govt. of India) Recognized under 2(f) and 12 (B) of UGC ACT 1956 (Affiliated to JNTUH, Hyderabad, Approved by AICTE - Accredited by NBA & NAAC – ‘A’ Grade - ISO 9001:2015 Certified) Maisammaguda, Dhulapally (Post Via. Hakimpet), Secunderabad – 500100, Telangana State, India III Year B. Tech. CSE –II Sem L T/P/D C 4 1/- / - 3 (R18A0517) WEB TECHNOLOGIES Objectives: Giving the students the insights of the Internet programming and how to design and implement complete applications over the web. It covers the notions of Web servers and Web Application Servers, Design Methodologies with concentration on Object-Oriented concepts, Client-Side Programming, Server-Side Programming, Active Server Pages, Database Connectivity to web applications, Adding Dynamic content to web applications, Programming Common Gateway Interfaces, Programming the User Interface for the web applications. UNIT I: Web Basics and Overview: Introduction to Internet, World Wide Web, Web Browsers, URL, MIME, HTTP, Web Programmers Tool box. HTML Common tags: List, Tables, images, forms, frames, Basics of CSS and types of CSS. Client-Side Programming (Java Script): Introduction to Java Script, declaring variables, functions, Event handlers (onclick, onsubmit, etc.,) and Form Validation. UNIT II: Server-Side Programming (PHP): Declaring Variables, Data types, Operators, Control structures, Functions, Reading data from web form controls like text buttons, radio buttons, list, etc., Handling File Uploads, Handling Sessions & Cookies. Introduction to XML: Document type definition, XML Schemas, Document Object model, Presenting XML , Introduction to XHTML, Using XML Processors: DOM and SAX.
    [Show full text]
  • Media Information 2021: Total TV Television Advertising: MTV3, Sub, AVA, C More Pay Tv Channels, Regional Advertising
    Media information 2021: Total TV Television advertising: MTV3, Sub, AVA, C More pay tv channels, regional advertising Video advertising, instream and outstream :mtv.fi, mtvuutiset.fi 1 Total TV: Television advertising Targeted RBS buying Define the correct target group for your brand and the number of contacts you want to reach in different dayparts, and we'll take care of rest. With targeted RBS buying, you will always receive a contact guarantee, whereby you only pay for the guaranteed contacts you want. In targeted RBS buying, commercials float during the campaign period, which means the final number of showings, placements and specific days cannot be predetermined for the campaign. In channel MTV3's prime time there are certain programs seasonally reserved for program-specific buying method only. Price In targeted buying, national daypart-specific CPT and CPP prices are determined for each target group. The prices in the targeted RBS buying price list are gross prices for 30 seconds with seasonal index 100. For seasonal indexes, see p. 26 Contact guarantee In targeted RBS buying you pay only for the contacts you buy, and we guarantee that they are reached. MTV Oy is responsible for the final placement of the spots so that the number of purchased contacts in the selected target groups is reached. Media products of targeted RBS buying Break connection Break connection means placing two different commercials from the same customer in the same commercial break. The order of showings can be defined freely. Break connection is granted without additional cost. The commercials get a shared contact guarantee.
    [Show full text]
  • Official Journal of the European Communities L 39/49
    14.2.2000 EN Official Journal of the European Communities L 39/49 COMMISSION DECISION of 22 December 1999 listing the areas of Finland eligible under Objective 2 of the Structural Funds for the period 2000 to 2006 (notified under document number C(1999) 4945) (Only the Finnish text is authentic) (2000/120/EC) THE COMMISSION OF THE EUROPEAN COMMUNITIES, eligible under Objective 2 with due regard to national priorities, without prejudice to the transitional support Having regard to the Treaty establishing the European provided for in Article 6(2) of that Regulation; Community, (5) Article 4(11) of Regulation (EC) No 1260/1999 provides Having regard to Council Regulation (EC) No 1260/1999 of that each list of areas eligible under Objective 2 is to be 21 June 1999 laying down general provisions on the valid for seven years from 1 January 2000; however, Structural Funds (1), and in particular the first subparagraph of where there is a serious crisis in a given region, the Article 4(4) thereof, Commission, acting on a proposal from a Member State, may amend the list of areas during 2003 in accordance After consulting the Advisory Committee on the Development with paragraphs 1 to 10 of Article 4, without increasing and Conversion of Regions, the Committee on Agricultural the proportion of the population within each region Structures and Rural Development and the Management referred to in Article 13(2) of that Regulation, Committee for Fisheries and Aquaculture, Whereas: HAS ADOPTED THIS DECISION: (1) point 2 of the first subparagraph of Article 1 of Regulation (EC) No 1260/1999 provides that Objective 2 Article 1 of the Structural Funds is to support the economic and social conversion of areas facing structural difficulties; The areas in Finland eligible under Objective 2 of the Structural Funds for the period 2000 to 2006 are listed in the (2) the first subparagraph of Article 4(2) of Regulation (EC) Annex hereto.
    [Show full text]
  • Rankings Province of Pirkanmaa
    9/29/2021 Maps, analysis and statistics about the resident population Demographic balance, population and familiy trends, age classes and average age, civil status and foreigners Skip Navigation Links FINLANDIA / Länsi- ja Sisä-Suomen AVI / Province of Pirkanmaa Powered by Page 1 L'azienda Contatti Login Urbistat on Linkedin Adminstat logo DEMOGRAPHY ECONOMY RANKINGS SEARCH FINLANDIA Municipalities Akaa Stroll up beside >> Nokia Hämeenkyrö Orivesi Ikaalinen Pälkäne Juupajoki Parkano Kangasala Pirkkala Kihniö Punkalaidun Lempäälä Ruovesi Mänttä-Vilppula Sastamala Tampere Urjala Valkeakoski Vesilahti Virrat Ylöjärvi Provinces Powered by Page 2 ETELÄ- KESKI-SUOMI L'azienda Contatti Login Urbistat on Linkedin POHJANMAA Adminstat logo PIRKANMAA DEMOGRAPHY ECONOMY RANKINGS SEARCH KESKI- FINLANDIAPOHJANMAA POHJANMAA Regions Ahvenanmaan Länsi- ja valtionvirasto Sisä-Suomen Etelä-Suomen AVI AVI Lapin AVI Itä-Suomen AVI Lounais-Suomen AVI Pohjois-Suomen AVI Province of Pirkanmaa Territorial extension of Province of PIRKANMAA and related population density, population per gender and number of households, average age and incidence of foreigners TERRITORY DEMOGRAPHIC DATA (YEAR 2017) Länsi- ja Region Sisä-Suomen AVI Inhabitants (N.) 512,081 Sign Pirkanmaa Families (N.) 136,421 Municipality capital Tampere Males (%) 49.2 Municipalities in Females (%) 50.8 22 Province Foreigners (%) 3.0 Surface (Km2) 14,611.08 Average age 41.7 Population density (years) 35.0 (Inhabitants/Kmq) Average annual variation +0.57 (2014/2017) Powered by Page 3 L'azienda Contatti
    [Show full text]
  • Keski-Pohjanmaa, Pohjanmaa, Etelä-Pohjanmaa, Pirkanmaa, Kanta-Häme, Satakunta, Varsinais-Suomi
    Keski-Pohjanmaa, Pohjanmaa, Etelä-Pohjanmaa, Pirkanmaa, Kanta-Häme, Satakunta, Varsinais-Suomi Maakuntien ja MMM:n toimialan vuorovaikutuksen simulointi luonnonvaratehtävissä Tampere 26.1.2018 Osastopäällikkö Juha S. Niemelä Esimerkkejä luonnonvaratehtävistä alueen maakunnissa • Tulvariskien hallinta, vaelluskalojen elinkierron mahdollisuudet, rakennettujen vesistöjen kunnostaminen ja vesistöjen käyttömuotojen yhteensovittaminen – tulvariskien hallinnan tavoitteiden sekä tulvariskikarttojen päivittäminen – ELYjen vesistöhankkeiden käyttö operatiivisessa tulvantorjunnassa – ELY-keskusten yhteistyö Kokemäenjoen tulvasuojelussa – vaelluskalat kärkihanke • Kalastuslain toimeenpano, uusien kalatalousalueiden perustaminen • Kalatalouden arvoketju; meri- ja sisävesikalastus (rannikkokalastuksen kriisi), vesiviljelyn ja kalanjalostuksen mahdollisuuksien hyödyntäminen mm. kalajauhotehdas • EU-kalastuksenvalvonnan kustannustehokas toteuttaminen • Sinisen biotalouden kokeiluhankkeet ja niiden rahoitus • Vesihuollon toimijoiden alueellisen yhteistyön ja häiriötilanteisiin varautumisen edistäminen Kalatalouden arvoketjun kehittäminen • Kalatalouden arvoketju ja sininen biotalous osana maakunnan ja sen yritystoiminnan kehittämistä • EMKR:n rahoitus 140 milj. €, 2014-2020 = 20 milj. €/v, yli puolet kohdistuu koko elinkeinoa hyödyttäviin valtakunnallisesti koordinoituihin hankkeisiin ja viranomaistoimiin alueellisiin hankkeisiin on käytettävissä noin 8-10 milj. €/v • EMKR:n varat kohdennetaan joustavasti ELYjen alueellisten tarvearvioiden mukaisesti
    [Show full text]
  • Why Websites Can Change Without Warning
    Why Websites Can Change Without Warning WHY WOULD MY WEBSITE LOOK DIFFERENT WITHOUT NOTICE? HISTORY: Your website is a series of files & databases. Websites used to be “static” because ​ there were only a few ways to view them. Now we have a complex system, and telling your webmaster what device, operating system and browser is crucial, here’s why: TERMINOLOGY: You have a desktop or mobile “device”. Desktop computers and mobile ​ ​ ​ devices have “operating systems” which are software. To see your website, you’ll pull up a ​ ​ ​ ​ “browser” which is also software, to surf the Internet. Your website is a series of files that ​ ​ needs to be 100% compatible with all devices, operating systems and browsers. Your website is built on WordPress and gets a weekly check up (sometimes more often) to ​ ​ ​ see if any changes have occured. Your site could also be attacked with bad files, links, spam, comments and other annoying internet pests! Or other components will suddenly need updating which is nothing out of the ordinary. WHAT DOES IT LOOK LIKE IF SOMETHING HAS CHANGED? Any update to the following can make your website look differently: There are 85 operating ​ systems (OS) that can update (without warning). And any of the most popular roughly 7 ​ ​ ​ browsers also update regularly which can affect your site visually and other ways. (Lists below) ​ Now, with an OS or browser update, your site’s 18 website components likely will need ​ ​ updating too. Once website updates are implemented, there are currently about 21 mobile ​ devices, and 141 desktop devices that need to be viewed for compatibility.
    [Show full text]