Terms Beginning With 'c'

Coal Bed Methane (CBM)

Coal Bed Methane, commonly known as CBM, is the entrapped methane gas found in underground coal seams. Methane is produced when organic material is geologically turned into coal and found in the adsorbed form in the coal itself. The gas is extracted using a pressure drop technique and is widely used for industrial and utility purposes.

Understanding CBM in Detail:

CBM is an unconventional gas as it is different from the conventionally found natural gas based on the nature of accumulation. Natural gas is accumulated into the pores of naturally occurring reservoir rocks whereas, CBM is found on the surfaces of coal seams in the adsorbed state.

The gas is formed as a result of coalification which is a process of conversion of plants into coal. During coalification, the coal becomes saturated with water trapping methane gas into the facets of coal. CBM mainly contains methane gas (CH4) along with some traceable amounts of ethane (C2H6), carbon dioxide (CO2) and water (H2O).

Kalkine Group Image

As per a report published by USGS, a sample of CBM in Virginia contains around 96.6 per cent of methane and has a calorific value of around 990 Btu/cubic feet.

How is CBM formed?

CBM is formed along with the formation of coal. The organic matter gets deposited in swampy lakes and undergoes various stages of bacterial and chemical alterations to form peat. Induced pressure and temperature on buried peat further converts it to lignite, sub-bituminous, bituminous and anthracite, over a period of time. The entire conversion process may take millions of years to convert Peat into Anthracite. During the transformation process, the decomposition of organic matter gives rise to methane gas along with nitrogen and carbon dioxide.

Where is CBM found? 

CBM is found as an associated gas with Coal deposits along the facets of the coal seams. Previously, due to limited technological support, the extraction and usage of CBM were not possible, which was the leading cause of undermining explosions and accidents. With the gradual advancement in technology, the gas first started to be vented out from the mines. More recently, with further advanced technology CBM is targeted as an unconventional source of energy to fulfil the rising energy demands worldwide.

CBM Extraction Process:

Due to the challenging extraction process in contrast to conventionally deposited Natural gas, CBM is considered as an unconventional source of energy. The method of extraction of CBM is much similar to the extraction of shale gas.

A horizontal well is drilled conventionally as applicable in the case of oil extraction. Casing, cementation followed by perforation is carried out to allow methane gas flow into the well and ultimately to the surface. Usually, coal seams are also covered in water which must be pumped out to obtain the methane. Water removal lowers the reservoir pressure, and entrapped methane gas tends to follow the path of the water to the surface. The gas mixed in water is separated at the surface and transported to gathering station and then shipped to storage facilities through pipelines or tankers.

Uses of CBM:

Image Source: Megapixl

CBM can be used in for various purposes like in CNG station for fueling vehicles, in power plants for the generation of electricity, as feedstock for the manufacturing of fertilizers, in petrochemical product generation, in rolling mills and for cement production.

Kalkine Group Image

Environmental Concerns in CBM Production:

Image Source: © Kalkine Group Image

The issue around coal bed methane extraction is related to the water drawn out during the CBM extraction process and its effect on global climate change. CBM extraction incorporates removal of a huge amount of water present along the coal seam, which is responsible for maintaining the hydrostatic pressure and holding CBM within the seams. Removal of water releases the pressure and gas starts flowing out.

The pumped water from CBM wells has high salt content making it unacceptable for certain agrarian use due to long term adverse effects on soil. Generally extracted water is re-injected into subsurface formations, and sometimes it is allowed to flow to the surface to drain or put in ponds to evaporate. Produced water contaminates and deteriorates the soil & surface water quality along with groundwater table.

What is the Dark Web?  The dark web is one such portion of the World Wide Web which is not accessible by regular search engines. The dark web is considered a hotbed for criminal activities, and it is much more than that. Various websites exist on an encrypted network inside the dark web. Standard web browsers and programs cannot find these websites. Once inside the dark web, different sites and pages can be accessed like one does on the web. Scientists believe that the internet we see is only 4% of the entire ocean of the web, meaning the 96% consists of the "Deep and Dark Web".  The user interface used in the dark web is usually internet-based, but it utilises special software which is not part of the standard ones. There are dozens of web browsers to surf the internet, but they all work in the same way. These standard browsers use ports and protocols to request, transfer and view data on the Internet. The website you access may look familiar, but as you enter, it may be illegal or something familiar but otherwise not monitored by anyone else. Therefore, the deep web and the dark web are famous for being anonymous. Also read: Cyber Espionage Campaign: Strings that tie China, Australia and the US How to access dark web browser? In order to access a few areas which are restricted, the user may need a password and a process to follow. A special software called TOR (The Onion Router) or the Freenet has these non-standard connections. These browsers are unlike standard internet browsers and have a process to access. They allow the users to browse around the dark web and are focused on keeping the user identity anonymous. If hacked or accessed, the regular web browser can easily provide user information such as who the user is and whereabouts. Though the dark web is providing 100% anonymity, federal agencies have been successful in tracking down criminal activities on the dark web. It is often said that the person you are talking to on the dark web could either be an FBI agent or a criminal. Image: Kalkine   What happens inside the world of the dark web?  The dark web is famous for allowing sinister activities, but many users go on the dark web to access information which otherwise may not be accessible on standard internet. Such as users from extremely oppressive governments who cut access to the world for their citizens. Unfortunately, such confidential environments also provide open platforms to criminals, terrorists and other such individuals involved in illegal activities.   Hence, experts advise users to not access the dark web even out of curiosity as it is a lawless environment. There have been many incidents where innocent, curious users were trapped and forced to get involved in criminal activities or their digital devices hacked and compromised without their knowledge.  A study conducted by a University of Surrey researcher Dr Michael McGuires in 2019, Into the Web of Profit, shows that the dark web has become worse in recent times. Since 2016 of all the listings on the dark web suggested, 60% could harm companies. Everything illegal and criminal can be found on the dark web, it also has other legitimate options such as chess clubs or book clubs, but because of the anonymity, the user will not know whom he/she is interacting with. Inside the dark web, anonymity and lawless nature make the crimes which exist otherwise in our society hard to trace.  The payment procedure inside the dark web is also different from the World Wide Web. Most often, Bitcoin and Monero cryptocurrency are used for the transactions.    RELATED READ: Knock Knock! Cybercriminal at Your Doorstep   What’s the difference between the deep web and dark web? The dark web is part of the entire deep web and is hidden from regular browsing access. Most people confuse the deep web and the dark web as one entity. It is not. The deep web content includes anything hidden and restricted behind the security wall such as content which otherwise requires paywall or sign-in or blocked by the author. Content which cannot be easily accessible on regular internet such as medical records, membership websites, paid content are available on the deep web; hence it is also called Invisible Web.  No one really knows the total size of the internet, but the experts believe that the standard World Wide Web consists of only 4% internet, the deep web consists of 90% and dark web consists of 6% of the entire internet.  ALSO READ: Technology has changed the way we work amid the COVID-19 crisis: A look at in-demand technologies Image: Kalkine     Also read: It happens again, NZX being bullied by Cyber-attackers- Down for the fourth day   What kind of risk companies face due to the dark web?  The Into the Web of Profit report listed below threats various organisations around the world are facing, especially the ones who have weak or insufficient cybersecurity measures.   Malware attacks Distributed denial of service (DDoS) attacks Botnets Trojan, keyloggers, exploits  Espionage  Credentials access  Phishing  Refunds Customer data Operational data Financial data Intellectual property/ trade secrets    Also read: Cybersecurity and the Requirement of a Resilient Environment in Australia  Are there advantages and disadvantages to the dark web?  The dark web provides complete anonymity, the users get complete privacy to perform any activity, be it illegal or legal. Many countries in the world still have authoritarian regimes offering no civil rights to their people. To such oppressed lot, the dark web provides an opportunity to access news, information, data and also express their views. The dark web is also a perfect place for law agencies to map criminal activities while being undercover. It is also easy to commit gruesome crimes through the dark web as it is complicated and lawless. Criminals can easily use the dark web to compromise someone's privacy, steal data or private information or even hire someone to commit murder.  Do internet users need to be concerned about the dark web?  The simple answer is no unless the user is using the dark web. Study says that most young people visit the dark web out of curiosity. They do not want to indulge in any criminal activity but want to see how the hidden and secret world of the dark web operates. And that is where the possibility of the electronic device IP address getting hacked by other criminals to perform their criminal activities lies.  The earliest use of darknet dates back to the year 2000. Freenet was created at the University of Edinburgh based on a student research paper. Ian Clark wrote the paper in 1999 on the possibility of such an encrypted internet base. Freenet was created to oppose censorship and provide a platform for free speech. The most powerful dark web is TOR, and it was created by the United States government to have a secure encrypted communication in case of emergency and complete disaster. Even today, many law agencies are secretly active inside the world of the dark web to gain access in the criminal world and stay one step ahead.

What is Earnings Per Share? EPS is the per share profit by a business in a given period. While analysing a business financially, it serves as one of the basic tools. EPS is calculated by dividing profits by total shares outstanding for a given period. EPS is reported on the profit and loss statement of an enterprise and works as a denominator for beloved price-to-earnings ratio (P/E ratio), used not just by novice investors but also fund managers. A business is required to generate sustainable earnings in its life cycle, and earnings or profits are essentially among major intend of a promotor. To know more about P/E ratio read: Understanding Price-Earnings Ratio But reported earnings of a business will likely differ from actual cash earnings because devising profits mandate broader accounting standards and principles to provide a fair picture of an enterprise. EPS, therefore, becomes imperative for investors, market participants and other users of information. EPS estimates are circulated by sell-side analysts to market participants. Financial Modelling is applied to arrive at the EPS estimates of future financial years, semi-annual periods or quarterly, depending on the reporting adopted by the firm. Analyst estimates are then collected by market data providers like Reuters, Bloomberg, IRESS to provide a consensus view of analysts on the business and its financials, including revenue, operating expense, earnings before interest and tax, profit after tax, EPS. Market estimates enable participants to evaluate the expectations of sell-side analysts from a particular company, sector or even index. Analyst estimates also indicate the divergence between an individual’s expectations and collective expectations of analysts that are tracking the company. An individual can, therefore, determine whether the stock of the company is undervalued or overpriced by the market against hi one’s fair value estimates that are based on the expectations from the company. More on EPS read: What Do We Mean By Earnings Per Share (EPS)? How to calculate EPS? Although general formula considers total shares outstanding in the denominator, it is preferred to use weighted average shares outstanding over a period because companies issue new shares, buyback or cancel shares. Net Income is the profit reported by a business after incurring income tax. It is also called as Net Profit After Tax. Dividends on Preferred Shares are paid to preferential shareholders because they have first right over the income of a business, but preferred shares don’t have voting rights like common shareholders or ordinary shareholders. Weighted Average Shares Outstanding is calculated after incorporating changes in number of shares during a period, and using weighted average shares outstanding provides a fair financial position of a company. Basic V/S Diluted EPS Diluted EPS is calculated after adding the weighted average number of shares that would be issued after the conversion of dilutive shares to weighted average shares outstanding. Dilutions can include share rights, performance rights, convertible bonds etc. Whereas Basic EPS is calculated by taking weighted average shares outstanding that incorporate changes to number of shares outstanding such as buyback, new issues etc. What is Adjusted-EPS? In a financial period, firms may incur one-time expenses or transactions that are not usual in the normal course of business. The objective of adjusted EPS is to arrive at a fair picture of the business, especially for financial forecasting. Extraordinary items are excluding from EPS to arrive at adjusted EPS figure. These items can include gain on sale of assets, loss on sale of assets, merger costs, capital raising costs, integration expenses etc. What is Normalised EPS? Normalised EPS is calculated to arrive at an EPS figure, which embeds the fluctuations in income due to business cycles or industry cycles. It also includes adjustments made for calculation of adjusted EPS such as one-time gains or losses. Normalised EPS is a useful measure for companies that are sensitive to economic cycles or changes in the business environment. By smoothening out the fluctuations, it provides a fair picture of the business. If a company has reported high normalised earnings over periods, it is considered that the company is less sensitive to changes in business cycles because of its stable revenues and income during the periods. EPS and Price-to-earnings ratio Calculation of price-to-earnings ratio requires EPS as denominator and price of the stock as numerator. EPS therefore becomes a very important financial metric for investors. EPS and price data also allows participants to compare the historical trends of the P/E ratio with the current market scenario and P/E ratio of the stock. How can increase grow EPS? Businesses can increase EPS by focusing on increasing their revenue, by improving operational efficiencies either by deploying technology to reduce cost, or negotiate better prices with vendors, operate in tax efficient manner, etc. Businesses can also improve EPS by undertaking corporate action such as buying back of shares. Read: Pros and cons of buybacks – Story of 5 Popular Stocks including Aurizon Good read: Every Doubt You Have On Earnings Per Share- Explained Right Here!

A half stock is described as a standard or preferred stock that is sold with a par value or face value of 50% of the standard cost. For example, if the par value of a stock is $100, then the half stock?s value will be $50.

A term used by some sections of the financial services industry referring to individuals whose investible assets, including stocks and bonds, surpass a given amount. Typically, these persons are described as holding financial assets, eliminating their primary residence, with a price higher than US$1 million.?

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it. OK