36,196 research outputs found

    Fault-tolerant computer study

    Get PDF
    A set of building block circuits is described which can be used with commercially available microprocessors and memories to implement fault tolerant distributed computer systems. Each building block circuit is intended for VLSI implementation as a single chip. Several building blocks and associated processor and memory chips form a self checking computer module with self contained input output and interfaces to redundant communications buses. Fault tolerance is achieved by connecting self checking computer modules into a redundant network in which backup buses and computer modules are provided to circumvent failures. The requirements and design methodology which led to the definition of the building block circuits are discussed

    Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies

    Get PDF
    Phishing is a form of electronic identity theft in which a combination of social engineering and web site spoofing techniques are used to trick a user into revealing confidential information with economic value. The problem of social engineering attack is that there is no single solution to eliminate it completely, since it deals largely with the human factor. This is why implementing empirical experiments is very crucial in order to study and to analyze all malicious and deceiving phishing website attack techniques and strategies. In this paper, three different kinds of phishing experiment case studies have been conducted to shed some light into social engineering attacks, such as phone phishing and phishing website attacks for designing effective countermeasures and analyzing the efficiency of performing security awareness about phishing threats. Results and reactions to our experiments show the importance of conducting phishing training awareness for all users and doubling our efforts in developing phishing prevention techniques. Results also suggest that traditional standard security phishing factor indicators are not always effective for detecting phishing websites, and alternative intelligent phishing detection approaches are needed

    A study of systems implementation languages for the POCCNET system

    Get PDF
    The results are presented of a study of systems implementation languages for the Payload Operations Control Center Network (POCCNET). Criteria are developed for evaluating the languages, and fifteen existing languages are evaluated on the basis of these criteria

    Development of a KSC test and flight engineering oriented computer language, Phase 1

    Get PDF
    Ten, primarily test oriented, computer languages reviewed during the phase 1 study effort are described. Fifty characteristics of ATOLL, ATLAS, and CLASP are compared. Unique characteristics of the other languages, including deficiencies, problems, safeguards, and checking provisions are identified. Programming aids related to these languages are reported, and the conclusions resulting from this phase of the study are discussed. A glossary and bibliography are included. For the reports on phase 2 of the study, see N71-35027 and N71-35029

    Where Do Facts Matter? The Digital Paradox in Magazines\u27 Fact-Checking Practices

    Get PDF
    Print magazines are unique among nonfiction media in their dedication of staff and resources to in-depth, word-by-word verification of stories. Over time, this practice has established magazines’ reputation for reliability, helped them retain loyal readers amid a glut of information sources, and protected them from litigation. But during the past decade, websites, mobile platforms, and social media have expanded the types of stories and other content that magazines provide readers. Doing so has shortened the time between the creation and dissemination of content, challenging and in some cases squeezing out fact-checkers’ participation. This study examines the procedures applied to stories in magazines and their non-print platforms, seeking to discern what decisions were made in response to the speed of digital publication, what effects these decisions have had, what lessons have been learned and what changes have been made over time. The results suggest that fact-checking practices for print content remain solidly in place at most magazines, if executed with diminished resources; however, magazine media are also exploring new processes to ensure accuracy and protect their reputations in an accelerated media environment

    Advanced water iodinating system

    Get PDF
    Potable water stores aboard manned spacecraft must remain sterile. Suitable sterilization techniques are needed to prevent microbial growth. The development of an advanced water iodinating system for possible application to the shuttle orbiter and other advanced spacecraft, is considered. The AWIS provides a means of automatically dispensing iodine and controlling iodination levels in potable water stores. In a recirculation mode test, simulating application of the AWIS to a water management system of a long term six man capacity space mission, noniodinated feed water flowing at 32.2 cu cm min was iodinated to 5 + or - ppm concentrations after it was mixed with previously iodinated water recirculating through a potable water storage tank. Also, the AWIS was used to successfully demonstrate its capability to maintain potable water at a desired I2 concentration level while circulating through the water storage tank, but without the addition of noniodinated water
    corecore