2,206 research outputs found
Time-sharing of hybrid computers using electronic patching by
Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/69107/2/10.1177_003754977001500303.pd
A solid-state crossbar switch for automatic analog-computer patching
Solid-state crossbar switch for automatic, analog computer patchin
Analog, hybrid, and digital simulation
Analog, hybrid, and digital computerized simulation technique
Designers manual for circuit design by analog/digital techniques Final report
Manual for designing circuits by hybrid compute
Recommended from our members
PREVENTING RANSOMWARE WITHIN LOCAL GOVERNMENT AGENCIES: A PUBLIC POLICY ANALYSIS PERSPECTIVE
Cases of ransomware within local government agencies have become prevalent over the last decade. While solutions to ransomware are available, local government agencies are slow to implement such measures. As a result, local government agencies are among the most famous victims of ransomware. This project attempts to provide an answer for ransomware prevention within these agencies from a public policy perspective. To formulate this answer, the issues local governments face in combating ransomware are compared to the solutions implemented in the private sector. This project then analyzes the mechanisms local governments have at their disposal to implement such solutions through the public policy analysis process and provides a hypothetical policy agencies can use to combat ransomware. Finally, a real-world case study provides a context of what solutions local governments have implemented and where these agencies are falling short. This project found that policies focused on ransomware and cybersecurity at large are not being developed nor implemented within local government agencies. It is recommended that local government agencies should consider developing and implementing specific policies to combat ransomware and other cybersecurity crimes.
The impact of information and communications technology on teaching and design of flexible, online and distance education courses at Deakin University
This paper describes the use of an online learning environment which has been established for postgraduate students studying at Master’s level in Professional Education and Training Deakin University. A detailed evaluation of the use of computer conferences in an Open and Distance Education specialism was undertaken during 2000 as part of a CUTSD funded project, Learner Centred Evaluation of Computer Facilitated Learning Projects in Higher Education. As the Open and Distance Education specialism is being revised and new units are written, the information gathered in this evaluation is being integrated into the pedagogical planning and the technological decisions being made about the design of the new master’s program.</div
Recommended from our members
INVESTIGATING THE RANSOMWARE INFECTION RATE OF K12 SCHOOL DISTRICTS DURING THE COVID PANDEMIC
Ransomware attacks have become part of the normal vernacular, as more organizations get attacked and must deal with the outcome in the media. School districts are in a unique position because of COVID and the sudden shift to online or hybrid learning. Over the past few years, ransomware attacks on K12 school districts have been widely reported in the news, leading to questions on whether K12 school districts are more vulnerable to these attacks. This project focused on: the prevalence of ransomware attacks in K12 School Districts in the USA in general and in the Inland Empire in particular, examining what value attackers gain by attacking a school district as well as looking at the costs incurred to the district because of an attack, whether K12 School districts in the Inland Empire are following cybersecurity best practices to protect in case of a ransomware attack. The findings are: that school districts are at a higher risk of ransomware attacks because they are soft targets with understaffed under budgeted IT departments, school districts do not pay ransoms and are left with the higher cost or remediation, there is a lack of security focus in the job descriptions for IT managers working in K12 in the Inland Empire, temporary school shutdowns due to ransomware are shown to negatively affect the GDP in the long term. The recommendations are: school districts should use COVID relief funds to hire/contract a CISO and figure out a way to keep the position funded into the future, [1] [2] school districts in the Inland Empire should hire more IT staff and focus on security awareness training for its users including students, schools should move away from passwords and replace it with 2FA using badge and pins. For future study the issues of long term funding for CISO positions and the creation of security awareness for K12 students needs to be addressed
Narrative music: towards an understanding of musical narrative functions in multimedia
As the computer screen is replacing the book as the dominant medium for communication (Kress, 2003), questions about how meaning is constituted by the multimodal interaction of different media (including music) is becoming increasingly important in contemporary research of pedagogy, sociology and media studies. The overall aim with this licentiate thesis is to explore musical narrative functions as they appear in multimedia such as film and computer games.
The thesis is based on three publications. Publication 1 proposes a classification of musical narrative functions, with 6 narrative classes(the Emotive, Informative, Descriptive, Guiding, Temporal and Rhetorical classes) and 11 categories. The relational interplay of music with contextual factors is emphasized.
Publication 2 describes the design of a software tool, REMUPP (Relations Between Musical Parameters and Perceived Properties), to be used for experimental studies of musical expression. REMUPP is used for real time alteration of musical expression, by the manipulation of musical parameters such as tempo, harmony, rhythm, articulation, etc.
Publication 3 describes a quasi-experiment using REMUPP, where a group of young participants (12-13 years old) were given the task of adapting musical expression – by manipulating 7 parameters – to make it fit 3 visual scenes shown on a computer screen. They also answered a questionnaire asking about their musical backgrounds and habits of listening to music, watching movies and playing computer games. Numerical data from the manipulations were analyzed statistically with regards to the preferred values of the musical parameters in relation to the different visual scenes. The results indicated awareness and knowledge about codes and conventions of musical narrative functions, and were to some degree affected by the participants’ gender, musical backgrounds and media habits
Custom Windows Patching Methodology - Comparative Analysis
Windows Server Update Services has been a common mainstay among organizations with a heavy footprint of Windows operating systems since it was originally released as Software Update Services in 2002. While the product has grown in scope, the primary allure remains the same: WSUS offers organizations greater control over the patches that are released to their environment and saves bandwidth by allowing a centralized device to download and offer patches to internal clients rather than having each of those clients download the content they require from the Internet. Unfortunately, the product has a structural limitation in that it lacks the capacity to provide high-availability to the metadata synchronization process that must occur in order to deliver the most up-to-date patches to endpoints. WSUS metadata contains details about the individual updates, EULAs, and supersedence relationships.
Due to design limitations and the growing concern of outages, a solution was developed to supplement and perhaps replace WSUS in certain scenarios. This solution, dubbed the Custom Patching Manager (CPM), is an extension of a concept originally started by Alejandro GĂłmez Galindo and finds middle-ground between Windows Server Update Services and Windows Update using freely available software. The solution assesses the vulnerabilities of a system or systems, determines whether or not the patches are part of an approved list, determines whether or not the content for missing updates is available locally, acquires that content depending on the previous step, and applies the patches to the endpoint. This proof-of-concept proved functional and reliable but would benefit from some optimizations that have been recommended as future works
- …