3,697 research outputs found
Academic Computing Newsletter: August 1997
Academic Computing Newsletter (Vol 13 Number 1, August 1997) is published by Academic Computing Services, State University of New York, College at Brockport. This issue focuses on network upgrades, new hardware and software funded by ETI Grant and workshops to be offered throughout the coming academic year.https://digitalcommons.brockport.edu/lits_news/1057/thumbnail.jp
Academic Computing Newsletter: January 1997
Academic Computing Newsletter (Vol 12 Number 2, January 1997) is published by Academic Computing Services, State University of New York, College at Brockport. This issue highlights the Educational Technology Initiative (ETI) proposals, an upcoming Conference on Instructional Technology, workshops, and new hardware and software.https://digitalcommons.brockport.edu/lits_news/1056/thumbnail.jp
On the Identification of Information Extracted from Windows Physical Memory
Forensic investigation of the physical memory of computer systems is gaining the attention of experts in the digital forensics community. Forensic investigators find it helpful to seize and capture data from the physical memory and perform post-incident analysis when identifying potential evidence. However, there have been few investigations which have identified the quantity and quality of information that can be recovered from only the computer system memory (RAM) while the application is still running. In this paper, we present the results of investigations carried out to identify relevant information that has been extracted from the physical memory of computer systems running Windows XP. We found fragments of partial evidence from allocated memory segments. This evidence was dispersed in the physical memory that had been allocated to the application. The identification of this information is useful to forensic investigators as this approach can uncover what a user is doing on the application which can be used as evidence
Academic Computing Newsletter: Fall 1997
Academic Computing Newsletter for Fall 1997. Contents include:
Software Volume Licenses 1 New Programmer Analyst 1 Software Update 2 New Laptops 2 Educational Technology Awards 2 Computer Labs Across the Campus 3 The Campus Network 4 TopClass 5 Workshops Schedule 6 Recommended PC Configuration 7 Student Assistants at ACS 8 How to Forward E-Mail 9 ACS General Information 10 Software Resources 11 Hardware Resources 12https://digitalcommons.brockport.edu/lits_news/1000/thumbnail.jp
On Campus, September 30, 1996
A Newsletter for Faculty and Staff of Coastal Carolina University. Volume 5, Number 18https://digitalcommons.coastal.edu/on-campus/1087/thumbnail.jp
On Campus, January 27, 1997
A Newsletter for Faculty and Staff of Coastal Carolina University. Volume 6, Number 2https://digitalcommons.coastal.edu/on-campus/1094/thumbnail.jp
Driving continuous improvement
The quality of improvement depends on the quality of leading and lagging performance indicators. For this reason, several tools, such as process mapping, cause and effect analysis and FMEA, need to be used in an integrated way with performance measurement models, such as balanced scorecard, integrated performance measurement system, performance prism and so on. However, in our experience, this alone is not quite enough due to the amount of effort required to monitor performance indicators at operational levels. The authors find that IT support is key to the successful implementation of performance measurement-driven continuous improvement schemes
Lecsökkent a számítási teljesítménye az új MS-EXCEL-nek? Has the computational performance of the new MS-EXCEL decreased?
Microsoft Office products are known and used all around the world. One of the most significant application in this package is MS-Excel, which is used by almost every company’s spreadsheet manager. In an update of August 2020 the SOLVER add-on of Excel has become much slower without any additional features. It is a built-in set of general problem-solving methods for smaller tasks. This work will track the performance decline and quantify observations through tasks in different versions of MS-Excel.
Kivonat
Az Microsoft Office termékeket a világ minden táján ismerik és használják. Ebből az egyik legjelentősebb alkalmazás az MS-Excel, amelyet szinte minden vállalat táblázatkezelőként használ. 2020. augusztusában történt nagyobb frissítés után, a SOLVER bővítmény nagyon lassú és kiszámíthatatlan lett, amely egy beépített általános problémamegoldó módszergyűjtemény kisebb feladatokra. Jelen mű ezt a teljesítmény beli visszaesést fogja bemutatni számszerűsített feladatokon keresztül különböző MS-Excel verziókban.
 
Spear Phishing Attack Detection
This thesis addresses the problem of identifying email spear phishing attacks, which are indicative of cyber espionage. Spear phishing consists of targeted emails sent to entice a victim to open a malicious file attachment or click on a malicious link that leads to a compromise of their computer. Current detection methods fail to detect emails of this kind consistently. The SPEar phishing Attack Detection system (SPEAD) is developed to analyze all incoming emails on a network for the presence of spear phishing attacks. SPEAD analyzes the following file types: Windows Portable Executable and Common Object File Format (PE/COFF), Adobe Reader, and Microsoft Excel, Word, and PowerPoint. SPEAD\u27s malware detection accuracy is compared against five commercially-available email anti-virus solutions. Finally, this research quantifies the time required to perform this detection with email traffic loads emulating an Air Force base network. Results show that SPEAD outperforms the anti-virus products in PE/COFF malware detection with an overall accuracy of 99.68% and an accuracy of 98.2% where new malware is involved. Additionally, SPEAD is comparable to the anti-virus products when it comes to the detection of new Adobe Reader malware with a rate of 88.79%. Ultimately, SPEAD demonstrates a strong tendency to focus its detection on new malware, which is a rare and desirable trait. Finally, after less than 4 minutes of sustained maximum email throughput, SPEAD\u27s non-optimized configuration exhibits one-hour delays in processing files and links
- …