7,322 research outputs found

    Binary data corruption due to a Brownian agent

    Full text link
    We introduce a model of binary data corruption induced by a Brownian agent (active random walker) on a d-dimensional lattice. A continuum formulation allows the exact calculation of several quantities related to the density of corrupted bits \rho; for example the mean of \rho, and the density-density correlation function. Excellent agreement is found with the results from numerical simulations. We also calculate the probability distribution of \rho in d=1, which is found to be log-normal, indicating that the system is governed by extreme fluctuations.Comment: 39 pages, 10 figures, RevTe

    The Corruption Game: Health Systems, International Agencies, and the State in South Asia

    Get PDF
    Drawing on ethnographic material collected in Pakistan, India, and Nepal, this article analyzes patterns of corruption in vaccination programs in South Asia. Corrupt practices—which required substantial work—were deeply shaped by both the money and systems of accountability of the global health system. Bilateral and multilateral donors provided substantial funding for immunization programs across South Asia. International agencies and governments instituted systems of accountability, including documentation requirements and a parallel UN bureaucracy in problematic districts, to try to ensure that health workers did what they wanted. Some immunization program staff skillfully bent these systems of accountability to their own ends, diverting vaccination funding into their own pockets. Corruption operates not in opposition to the official rules, but in spaces opened up by them. These practices sometimes transform Weber’s rational bureaucracy into a sophisticated game with many players, whose aims are more complex than the stated goals of the bureaucracy

    Measuring information security breach impact and uncertainties under various information sharing scenarios

    Get PDF
    This study draws on information theory and aims to provide simulated evidence using real historical and statistical data to demonstrate how various levels of integration moderate the impact and uncertainties of information security breach on supply chain performance. We find that the supply chain behaves differently under various levels of integration when a security breach occurs. The entropy analysis revealed that the wholesaler experience the most uncertainty under system failure and data corruption. This sort of impact-uncertainty information will aid in designing and managing a resilient supply chain poised for minimal breach impact

    Tools for modelling and simulating migration-based preservation

    No full text
    This report describes two tools for modelling and simulating the costs and risks of using IT storage systems for the long-term archiving of file-based AV assets. The tools include a model of storage costs, the ingest and access of files, the possibility of data corruption and loss from a range of mechanisms, and the impact of having limited resources with which to fulfill access requests and preservation actions. Applications include archive planning, development of a technology strategy, cost estimation for business planning, operational decision support, staff training and generally promoting awareness of the issues and challenges archives face in digital preservation
    • …
    corecore