774 research outputs found

    InfoTech Update, Volume 6, Number 3, May/June 1997

    Get PDF
    https://egrove.olemiss.edu/aicpa_news/4962/thumbnail.jp

    The Inkwell

    Get PDF

    Pontem interrumpere : Plautus' Casina and absent characters in Roman comedy

    Get PDF
    In the opening of Plautus’ Casina the interpolated (?) prologue warns the audience: ‘in case you’re waiting for [Euthynicus], he isn’t returning to the city in this comedy today. Plautus didn’t want him to, he demolished a bridge on his way (64-66)’. euthynicus is the young lover of the play, com- peting with his father for an alluring slave-girl, the eponymous Casina. Casina too, despite (or because of?) her telic role as the craved object of the characters’ desire, was never allowed by plautus to cross into the world of the play. Casina and euthynicus are not alone: Roman comedy is populated by a crowd of missing characters, which the playwrights keep or move on the other side of the bridge, for parts or indeed the whole of the play. All these missing characters ‘benefit us in their absence as if they were present’, as the same prologue of Casina pro- claims (20), with reference to the most important absence of all, plautus himself. The aim of the article is to investigate the crowd of absentees in Roman comedy, starting from a close-reading of plautus’ Casina and focusing on a number of prototypical roles and fun- ctions, as well as discussing their contribution to the dramatic framework of Roman comedy.Publisher PDFPeer reviewe

    Integration of SDN frameworks and Cloud Computing platforms: an Open Source approach

    Get PDF
    As a result of the explosion in the number of services offered over the Internet, network traffic has experienced a remarkable increment and is supposed to increase even more in the few next years. Therefore, Telco operators are investigating new solutions aiming at managing this traffic efficiently and transparently to guarantee the users the needed Quality of Service. The most viable solution is to have a paradigm shift in the networking field: the old and legacy routing will be indeed replaced by something more dynamic, through the use of Software Defined Networking. In addition to it, Network Functions Virtualization will play a key role making possible to virtualize the intermediate nodes implementing network functions, also called middle-boxes, on general purpose hardware. The most suitable environment to understand their potentiality is the Cloud, where resources, as computational power, storage, development platforms, etc. are outsourced and provided to the user as a service on a pay-per-use model. All of this is done in a complete dynamic way, as a result of the presence of the implementation of the above cited paradigms. However, whenever it comes to strict requirements, Telecommunication Networks are still underperforming: one of the cause is the weak integration among these paradigms to reactively intervene to the users' need. It is therefore remarkably important to properly evaluate solutions where SDN and NFV are cooperating actively inside the Cloud, leading to more adaptive systems. In this document, after the description of the state of the art in networking, the deployment of an OpenStack Cloud platform on an outperforming cluster will be shown. In addition, its networking capabilities will be improved via a careful cloud firewalling configuration; moreover, this cluster will be integrated with Open Source SDN frameworks to enhance its services. Finally, some measurements showing how much this approach could be interesting will be provided

    Automatic Test Framework Anomaly Detection in Home Routers

    Get PDF
    In a modern world most people have a home network and multiple devices behind it. These devices include simple IoT, that require external protection not to join a botnet. This protection can be granted by a security router with a feature of determining the usual network traffic of a device and alerting its unusual behaviour. This work is dedicated to creating a testbed to verify such router's work. The test bed includes tools to capture IoT traffic, edit and replay it. Created tool supports UDP, TCP, partially ICMP and is extendable to other protocols. UDP and TCP protocols are replayed using OS sockets at transport network layer. The methods described have proved to work on a real setup

    InfoTech Update, Volume 10, Number 3, May/June 2002

    Get PDF
    https://egrove.olemiss.edu/aicpa_news/4992/thumbnail.jp

    Tamen apsentes prosunt pro praesentibus : proxied absences and Roman comedy

    Get PDF
    Publisher PD

    InfoTech Update, Volume 15, Number 2, March/April 2006

    Get PDF
    https://egrove.olemiss.edu/aicpa_news/5015/thumbnail.jp

    Volume 41 - Issue 17 - Friday, February 10, 2006

    Get PDF
    The Rose Thorn, Rose-Hulman\u27s independent student newspaper.https://scholar.rose-hulman.edu/rosethorn/2275/thumbnail.jp

    Using Architectural Constraints and Game Theory to Regulate International Cyberspace Behavior

    Get PDF
    The debate over whether cyberspace can or should be regulated is essentially dead. This is the conclusion being taught in law schools today. The battle between Judge Frank Easterbrook and Professor Lawrence Lessig over laws and horses , infamous among cyberspace legal scholars, became irrelevant when geographically-based governments began regulating Internet related activities. However, debate over how the Internet should be regulated continues. One way of framing this debate is in terms of deciding how to regulate behavior in cyberspace. Professor Lessig postulated four kinds of constraints regulate behavior: (1) social norms, (2) markets, (3) law, and (4) architecture. This comment first argues that lawmakers must focus on using the fourth constraint-architecture-if an interconnected global, democratic society is truly an international goal. Second, this comment argues that, in focusing on architectural constraint, game theory is a uniquely appropriate tool for analyzing Internet issues and developing Internet laws
    • …
    corecore