1,037 research outputs found

    ACUTA eNews October 2002, Vol 31, No. 10

    Get PDF
    In This Issue Convergence on Sewanee Campus.................... Jeanne Jansenius, Univ. of the South Tech Talk Free Space Optics............................ Kevin Tanzillo, Dux Public Relations Cabling: Asset or Liability?................... Diane Santarelli, wireville.com DC Update.............................. Whitney Johnson, Retired, Northern Michigan Univ. Higher Ed\u27s Contribution to Cyberspace Security................. Jeri Semer, CAE, Executive Director Board Report................... John Bradley, Rensselaer Polytechnic lnstitute Welcome New Member

    An investigation of key growth industry sectors in Wales using Multi-Sectoral Qualitative Analysis

    Get PDF
    This paper examines the problem of key sector identification in regional economies. Whilst the paper questions the desirability of policy focusing on the promotion of key sectors, it suggests that tools are generally underdeveloped to identify these sectors. The paper suggests that multi-sectoral qualitative analysis provides one means of forming conclusions on sector potentials.

    Towards responsible quantum technology, safeguarding, engaging and advancing Quantum R&D

    Full text link
    The expected societal impact of quantum technologies (QT) urges us to proceed and innovate responsibly. This article proposes a conceptual framework for Responsible QT that seeks to integrate considerations about ethical, legal, social, and policy implications (ELSPI) into quantum R&D, while responding to the Responsible Research and Innovation dimensions of anticipation, inclusion, reflection and responsiveness. After examining what makes QT unique, we argue that quantum innovation should be guided by a methodological framework for Responsible QT, aimed at jointly safeguarding against risks by proactively addressing them, engaging stakeholders in the innovation process, and continue advancing QT (SEA). We further suggest operationalizing the SEA-framework by establishing quantum-specific guiding principles. The impact of quantum computing on information security is used as a case study to illustrate (1) the need for a framework that guides Responsible QT, and (2) the usefulness of the SEA-framework for QT generally. Additionally, we examine how our proposed SEA-framework for responsible innovation can inform the emergent regulatory landscape affecting QT, and provide an outlook of how regulatory interventions for QT as base-layer technology could be designed, contextualized, and tailored to their exceptional nature in order to reduce the risk of unintended counterproductive effects of policy interventions. Laying the groundwork for a responsible quantum ecosystem, the research community and other stakeholders are called upon to further develop the recommended guiding principles, and discuss their operationalization into best practices and real-world applications. Our proposed framework should be considered a starting point for these much needed, highly interdisciplinary efforts

    Social indicators for use with multi-regional input-output analysis

    Get PDF
    Accounting for social impacts in supply chain analysis is of increasing importance. Global trade has increased significantly since 1970, as has inequality. As global supply chains have become more prevalent, the need to understand and analyse these supply chains has also grown. Excellent work on quantitative analysis of environmental impacts in supply chains has taken place in the past two decades. However, relatively few methodologies have been applied to quantitative analysis of social impacts in supply chains. This thesis considers how social indicators for supply chain analysis can be developed through the use of socially extended multi-regional input-output analysis. Chapter 1 provides an introduction and context. Chapter 2 considers the history of social accounting. Chapter 3 looks at quantitative accounting for social-economic indicators and the development of national accounts, particularly in reference to standardised collection of data for social-economic indicators and socially-extended input- output analysis. Chapter 4 presents a case study of coltan mining and methodological analysis using deaths in the Democratic Republic of Congo as a social indicator for the electronics supply chain. Chapter 5 analyses the results of the same case study and considers how enumerating social impacts in upstream supply chains can influence environmental and social justice actions in downstream supply chains. Chapter 6 provides a review of input-output analysis used as a tool for analysing consumption since 2010. Chapter 7 proposes the use of a suite of quantitative social indicators for analysis in the form of a social footprint. Chapter 8 provides a conclusion. This thesis tracks the author’s interest in understanding social impacts in global supply chains and proposes a social footprint for supply chain analysis using the multi-regional input output methodology

    UTB/TSC Legacy Degree Programs and Courses 2014 – 2015

    Get PDF
    https://scholarworks.utrgv.edu/brownsvillelegacycatalogs/1030/thumbnail.jp

    Käyttöjärjestelmän kovennuskonfiguraation hallinta automaatioympäristössä

    Get PDF
    Hardening improves security by removing unnecessary features from the system. Hardening can be performed for a network, a device, an operating system and single applications. As virtualization is added, the virtualization environment must also be hardened. In this thesis, the focus is on operating system hardening and its management. Frequent operating system updates cause system changes that make hardening management challenging. System hardening is presented using the ICS lifecycle model. This includes tasks, such as designing of the hardening configuration, implementation and testing, and maintaining the system hardening. To make implementation and maintaining of the hardening configuration possible two PowerShell scripts are made. One for automating hardening and other for auditing of Windows hosts. The scripts use a new hardening configuration template which is designed in this thesis. As a result, effective scripts were implemented, though some features had to be dropped due to lack of proper tools. Discarded features and other development ideas are presented in further development section. Additionally, several challenges for hardening and using Windows 10 in control systems, are observed in this thesis. Most notable discovery is that Windows 10 restores hardened settings and even broke the operation of system without any apparent reason. For this reason, the hardening configuration should be monitored and its management continued through the systems lifecycle

    UTB/TSC Legacy Degree Programs and Courses 2013 – 2014

    Get PDF
    https://scholarworks.utrgv.edu/brownsvillelegacycatalogs/1029/thumbnail.jp

    Cyber Security in the Healthcare Industry

    Get PDF
    • …
    corecore