Edumine is the world's leading provider of training and education to the mining industry. We offer individuals, corporations and educators effective solutions.

About Us
You filtered by On-Demand. There are 142 items matching your criteria. Reset filter

Contouring of irregular spatial data by hand has been used by geoscientists for many decades. Contouring using a computer is relatively new and has become more widely used in the earth sciences only in the last 20 years. The availability of inexpensive microcomputer hardware and software makes the use of a computer for contouring affordable for nearly everyone. Gridding and contouring software has become flexible enough to satisfy nearly all needs for contouring with speed and convenience. Computer contouring is not perfect, so it is necessary to constantly be on guard and check results for artifacts and make sure the contour results are representative of the data. This course will help build awareness of what to watch for when using each contour method, when a method is most suitable, and when it is not. Since the early 1980's, we have experienced a significant increase in access to computer programs for contouring, as well as a large variety of computer algorithms. Books have been written about the algorithms and how they are used. The purpose of this course is to pull together information on the most commonly used contouring algorithms and reveal the 'secrets' of how and why they are used. These 'secrets' are not really secrets, but to find all this information you have to dig through many books, use the algorithms (hundreds of times) and observe results. We have explored all these resources for you and present the findings in this course. Hand contouring is still done by some people, and the first section of the course covers hand contouring methods, when to use them, and the pitfalls to avoid. Understanding hand contouring is a first step to using contour software effectively. Author Betty L. Gibbs Dr. Stephen A. Krajewski   Duration 17 Hours Access 90 Days Category Exploration Level Specialize Version Date January 18, 2010   ​Need to train a team? Whether you're looking for a customized training program or developing a team, we have enterprise solutions to fit your needs. Learn More   Read More

This course is aimed at helping those who wish to read and interpret the financial statements of mining companies. It assumes the reader has no formal training or background in accounting but does have a general interest in business with a leaning towards mining. Furthermore, this course assumes a managerial or investor approach rather than that of accountant or bookkeeper. We look at financial statements for their organization, information content and limitations. In short, you will not learn any bookkeeping or debits and credits but rather you will see numerical data and narrative-based descriptions prepared by mining companies. You will learn to use various analytical tools. Simplified fictional examples and actual published reports are used to illustrate various concepts. A brief glossary and a source of further information appear in an Appendix. The course has six primary topics as follows, separated into three parts. This course was formerly entitled Understanding Financial Statements of Mining Companies Under IASB and FASB Regulations. Part 1 Introduction to Accounting and Financial Reports The Statement of Financial Position Part 2 The Statement of Income Part 3 The Cash Flow Statement The Statement of Changes in Equity Notes and Analytical Tools Accounting Standards Financial reporting today is governed by essentially two sets of accounting regulations—those of the United States, through its Financial Accounting Standards Board (FASB), and those of the International Accounting Standards Board (IASB). In this course, both sets of regulations are treated as one agreed-upon set of concepts, principles and guidelines where appropriate. Differences are highlighted wherever they occur. Where there is agreement or the differences are minimal, the common term GAAP is used, which stands for Generally Accepted Accounting Principles. Authors Alain Duncan   Duration 7 Hours Access 90 Days Category Financial Level Cross Train Version Date December 4, 2013 ​Need to train a team? Whether you're looking for a customized training program or developing a team, we have enterprise solutions to fit your needs. Learn More Read More

This course provides current insights and practical suggestions for implementing maintenance management as a viable and valuable asset for any industry seeking to improve its operating systems. Intended as a senior level reference for both maintenance and nonmaintenance professionals alike, Uptime provides an overview of maintenance management. It examines various elements that maintenance managers deal with and offers guidelines for maintenance success, specifically, useful information about "what" works well and "how" to achieve it. Whenever possible, the author has attempted to stay away from excessive details that are likely to be more confusing than illuminating to lay readers; he has tried to balance this by providing enough information to help the dedicated maintenance professional make informed choices. Brief "Summary" sections appear at the end of each session. These outline key points for executives and managers who want to focus on significant points without getting bogged down in minutiae. Authors  James V. Reyes-Picknell    Duration: 18 Hours Access: 90 Days Category: Mining Level: Specialize Version Date: February 25, 2009 Read More

We frequently see in the news that a mining or an oil and gas operation in some remote area has been either attacked by insurgents or has had their security arrangements linked with a human rights incident. The extractive industries have the dual responsibility of protecting their people and operations as well as respecting the human rights of their employees and the members of the communities in which they work. Often operating in increasingly unstable areas and with human rights growing as a salient topic, industries face significant challenges in balancing these two crucial responsibilities. Developed jointly by industry, governments and non-governmental organizations (NGOs), the Voluntary Principles for Security and Human Rights (VPSHR) have increasingly become the industry guideline for achieving this balance. The VPSHR's three components provide a set of guiding principles on how companies should manage: risk assessments relations with public security forces relations with private security providers This course introduces you to the VPSHR, discusses risk assessment in the context of providing a secure working environment and protecting the human rights of employees and surrounding communities, and responsibilities concerned with human rights abuse allegations and the procedures for managing those allegations. It goes on to discuss the roles and responsibilities of public and private security forces and their relationship to management. Authors Tom Green   Duration: 15 Hours Access: 90 Days Category: Leadership Level: Introduce Version Date: September 10, 2014 ​Need to train a team? Whether you're looking for a customized training program or developing a team, we have enterprise solutions to fit your needs. Learn More   Read More

Shopping Cart

Your cart is empty