16,504 research outputs found

    Office 365: Migrating and Managing Your Business in the Cloud

    Get PDF
    Written for the IT professional and business owner, this book provides the business and technical insight necessary to migrate your business to the cloud using Microsoft Office 365. This is a practical look at cloud migration and the use of different technologies to support that migration. Numerous examples of cloud migration with technical migration details are included. Cloud technology is a tremendous opportunity for an organization to reduce IT costs, and to improve productivity with increased access, simpler administration and improved services. Those businesses that embrace the advantages of the cloud will receive huge rewards in productivity and lower total cost of ownership over those businesses that choose to ignore it. The challenge for those charged with implementing Microsoft Office 365 is to leverage these advantages with the minimal disruption of their organization. This book provides practical help in moving your business to the Cloud and covers the planning, migration and the follow on management of the Office 365 Cloud services

    East Lancashire Research 2007

    Get PDF

    Dockerized MISP (Malware Information Sharing Platform)

    Get PDF
    Dockerització de la plataforma MISP (Malware Information Sharing Platform) per a compartició d'informació relacionada amb malware i atacs cibernètics per crear un entorn segur on les regles de firewall y proxy s'actualitzin automàticament a partir de la informació que s'introdueixi a la plataforma. Vol se una sol·lució econòmica alternativa a appliances com podrien ser FireEye per a empreses petites on empreses del mateix sector puguin compartir informació sobre amenaces comuns entre elles i així estar el més protegides possible. Els objectius principals serien: -Dockeritzar l'aplicació. Crear una instal·lador de MISP fàcilment desplegable en entorns productius mitjançant Docker sense afectació per a les empreses. -Crear una xarxa de MISPs intercommunicats entre ells simulant ser diferentes empreses. -Extreure/automatizar la creació de regles de firewall per a sistemes IPS/IDS (utilitzaria Snort en pfsense). Simularia ser el firewall de les empreses. -Veure com es comporta el sistema simulant atacs dins del parc de les empreses i veient com s'evita la infecció (extreure telemetria).In an age where most companies offer as much services as they can on the Internet, any protection against cyber threats is little. That is why employee awareness campaigns about security, good network architecture designs, fine-tuned monitoring systems and adequate data treatment policies are of vital importance to companies. Any unexpected production disruption, unavailability of services or information leakage due to a cyberattack can be translated to significant losses at both economical and reputational level. The aim of this project is to study feasibility of using a malware related information platform for sharing information assets between small, medium and large sized companies as alternative or complement of most advanced and expensive systems in the market in an open source software deployment. A company environment will be simulated in order to integrate Malware Information Sharing Platform with common security systems and study the behavior when a threat is detected.En una era donde las empresas ofrecen tantos servicios como pueden a través de Internet, toda protección contra amenazas de carácter cibernético es poca. Es por esto que campañas de concienciación a los empleados acerca de seguridad y buenas prácticas, buenos diseños de arquitectura de red, sistemas de monitorización bien afinados i políticas de tratamiento de datos adecuadas son vitales para las empresas. Cualquier corte inesperado en la cadena de producción, indisponibilidad de servicios utilizados día a día para el funcionamiento o fugas de información debidas a un ataque cibernético se pueden traducir en pérdidas importantes tanto a nivel económico como reputacional. El objetivo de este proyecto es estudiar la viabilidad de utilizar una plataforma de información relacionada con malware y amenazas para compartir información entre pequeñas, medianas y grandes empresas como alternativa o complemento a los aplicativos más avanzados y costosos del mercado mediante la utilización de software libre. Se simulará un entorno empresarial para integrar MISP (Malware Information Sharing Platform) con otras herramientas de seguridad comunes y poder estudiar así el comportamiento del sistema ante la detección de una amenaza.En un món on les empresen ofereixen tants serveis com els és posible a través d'Internet, tota protecció contra amenaces de caire cibernètic és poca. És per això que campanyes de concienciació als empleats sobre seguretat i bones pràctiques, bons dissenys d'arquitectura de xarxa, sistemes de monitorització ben ajustats i polítiques de tractament de dades adequades són vitals per a les empreses. Qualsevol aturada inesperada de la cadena de producción, indisponibilitat de serveis que s'utilitzin dia a dia o fugues d'informació degudes a un atac cibernètic es poden traduir en pèrdues importants tant a nivell econònic com reputacional. L'objectiu d'aquest projecte és estudiar la viabilitat d'utilitzar una plataforma d'informació relacionada amb malware i amenaces per compartir informació entre petites, mitjanes i grans empreses com a alternativa o complement als aplicatius més avançats i costosos del mercat mitjançant la utilització de software lliure. És simularà un entorn empresarial per tal d'integrar MISP (Malware Information Sharing Platform) amb altres sistemes de seguretat comuns i estudiar el comportament del sistema davant la detecció duna amenaça

    JUNO Conceptual Design Report

    Get PDF
    The Jiangmen Underground Neutrino Observatory (JUNO) is proposed to determine the neutrino mass hierarchy using an underground liquid scintillator detector. It is located 53 km away from both Yangjiang and Taishan Nuclear Power Plants in Guangdong, China. The experimental hall, spanning more than 50 meters, is under a granite mountain of over 700 m overburden. Within six years of running, the detection of reactor antineutrinos can resolve the neutrino mass hierarchy at a confidence level of 3-4σ\sigma, and determine neutrino oscillation parameters sin2θ12\sin^2\theta_{12}, Δm212\Delta m^2_{21}, and Δmee2|\Delta m^2_{ee}| to an accuracy of better than 1%. The JUNO detector can be also used to study terrestrial and extra-terrestrial neutrinos and new physics beyond the Standard Model. The central detector contains 20,000 tons liquid scintillator with an acrylic sphere of 35 m in diameter. \sim17,000 508-mm diameter PMTs with high quantum efficiency provide \sim75% optical coverage. The current choice of the liquid scintillator is: linear alkyl benzene (LAB) as the solvent, plus PPO as the scintillation fluor and a wavelength-shifter (Bis-MSB). The number of detected photoelectrons per MeV is larger than 1,100 and the energy resolution is expected to be 3% at 1 MeV. The calibration system is designed to deploy multiple sources to cover the entire energy range of reactor antineutrinos, and to achieve a full-volume position coverage inside the detector. The veto system is used for muon detection, muon induced background study and reduction. It consists of a Water Cherenkov detector and a Top Tracker system. The readout system, the detector control system and the offline system insure efficient and stable data acquisition and processing.Comment: 328 pages, 211 figure

    Product software quality

    Get PDF

    Ship machinery and equipment wireless condition monitoring system

    Get PDF
    Condition based maintenance (CBM) is a maintenance approach that has been proven to provide significant reduction in maintenance cost and associated risk. Several industries such as aerospace and power generation have incorporated CBM and have been driving the developments in progressively better diagnostic and prognostic maintenance management. Other benefits that can be linked with appropriate use of CBM include better management of the operational characteristics of the vessel, reduction of emissions and energy efficiency. However in the maritime industry this is not the case. Less than 2% of the global fleet of vessels is utilising CBM (Shorten, 2012). This can be associated with several factors that inhibit the implementation of CBM in vessels. The most important of those are the cost of installation, the capital investment in training staff and the lack of trust in the prediction capabilities of the technology. This paper presents a novel method based on wireless data transmission which can demonstrate reduced installation costs. Moreover, as part of the INCASS (Inspection Capabilities for Enhanced Ship Safety) EU FP7 project, this paper presents a novel decision support system (DSS) solution that can be used onboard a ship with minimal initial training. The reliable user friendly graphical interface (GUI) developed in Java language provides relevant and on-time information for maintenance decision support. The combination of the developed hardware and software give a complete solution that can be applied to vessels while minimising investment costs and training

    Study on Web application Honey pots

    Get PDF
    corecore