85,315 research outputs found

    Clean Power Players: Landing a Job in Clean Energy

    Get PDF
    A new, first-of-its-kind guidebook by Environmental Entrepreneurs (E2) and the Natural Resources Defense Council (NRDC) offers practical, how-to advice for young people seeking careers in clean energy

    Algorithms for advance bandwidth reservation in media production networks

    Get PDF
    Media production generally requires many geographically distributed actors (e.g., production houses, broadcasters, advertisers) to exchange huge amounts of raw video and audio data. Traditional distribution techniques, such as dedicated point-to-point optical links, are highly inefficient in terms of installation time and cost. To improve efficiency, shared media production networks that connect all involved actors over a large geographical area, are currently being deployed. The traffic in such networks is often predictable, as the timing and bandwidth requirements of data transfers are generally known hours or even days in advance. As such, the use of advance bandwidth reservation (AR) can greatly increase resource utilization and cost efficiency. In this paper, we propose an Integer Linear Programming formulation of the bandwidth scheduling problem, which takes into account the specific characteristics of media production networks, is presented. Two novel optimization algorithms based on this model are thoroughly evaluated and compared by means of in-depth simulation results

    Multinational perspectives on information technology from academia and industry

    Get PDF
    As the term \u27information technology\u27 has many meanings for various stakeholders and continues to evolve, this work presents a comprehensive approach for developing curriculum guidelines for rigorous, high quality, bachelor\u27s degree programs in information technology (IT) to prepare successful graduates for a future global technological society. The aim is to address three research questions in the context of IT concerning (1) the educational frameworks relevant for academics and students of IT, (2) the pathways into IT programs, and (3) graduates\u27 preparation for meeting future technologies. The analysis of current trends comes from survey data of IT faculty members and professional IT industry leaders. With these analyses, the IT Model Curricula of CC2005, IT2008, IT2017, extensive literature review, and the multinational insights of the authors into the status of IT, this paper presents a comprehensive overview and discussion of future directions of global IT education toward 2025

    Secure Mobile Social Networks using USIM in a Closed Environment

    Get PDF
    Online social networking and corresponding mobile based applications are gaining popularity and now considered a well-integrated service within mobile devices. Basic security mechanisms normally based on passwords for the authentication of social-network users are widely deployed and poses a threat for the user security. In particular, for dedicated social groups with high confidentiality and privacy demands, stronger and user friendly principles for the authentication and identification of group members are needed. On the other hand, most of the mobile units already provide strong authentication procedures through the USIM/ISIM module. This paper explores how to build an architectural framework for secure enrollment and identification of group members in dedicated closed social groups using the USIM/SIM authentication and in particular, the 3GPP Generic Authentication Architecture (GAA), which is built upon the USIM/SIM capabilities. One part of the research is to identify the marketable use-cases with corresponding security challenges to fulfill the requirements that extend beyond the online connectivity. This paper proposes a secure identification design to satisfy the security dimensions for both online and offline peers. We have also implemented an initial proof of the concept prototype to simulate the secure identification procedure based on the proposed design. Our implementation has demonstrated the flexibility of the solution to be applied independently for applications requiring secure identification

    Improve safety by reducing the impact of external corrosion on pipelines

    Get PDF
    • Proactive prevention of corrosion defects from growing to a size that ultimately impacts a pipeline’s structural integrity • Continuous assessment to identify & address where corrosion has occurred, is occurring or may occur • Repairing corrosion defects • Correcting the causes of corrosio

    Comparing the XAM API with file system programming

    Get PDF
    XAM is an application programming interface (API) currently being standardized by the Storage Networking Industry Association (SNIA). XAM stands for eXtensible Access Method . The XAM API will allow application developers to store content on a new class of storage systems known as fixed-content storage systems. This new class of storage system is optimized for the storage and retrieval of unstructured data that changes infrequently. While it is anticipated that SNIA will eventually ratify a XAM application programmer\u27s interface (API), it is important that the new API presents an interface that is useful yet offers the richness of the XAM protocol to the developer. An ideal goal for the XAM API would be to become as ubiquitous and familiar to developers as the block file system function calls such as fread(), fwrite(), remove(), etc. This thesis will describe a XAM simulation framework that allows for the building of XAM applications without the need for actual XAM hardware. It will also compare the XAM API to the familiar block file system API. The XAM simulation can form the basis of a robust framework for continuing XAM research; the results of comparing XAM to file system applications will be fed back into the SNIA community
    • …
    corecore