318 research outputs found

    Erstellung und Analyse von TALE-Transkriptionsfaktoren mit benutzerdefinierter ErkennungsspezifitÀt

    Get PDF

    O racjonalnym wykorzystaniu internetu w edukacji

    Get PDF
    Janusz Morbitzer, On the rational use of the Internet in education, Interdisciplinary Contexts of Special Pedagogy, No. 23, PoznaƄ 2018. Pp. 7–21. Adam Mickiewicz University Press. ISSN 2300-391X. DOI: https://doi.org/10.14746/ikps.2018.23.01 The Internet has become one of the most important educational tools today. However, research shows that it is often used without the necessary reflection, as an easily accessible source of information instead of being a tool for intellectual development. This article presents new opportunities offered by the Internet and new competences that are necessary to fully use the Internet’s potential in education. These competences are mostly intellectual and axiological, not technical.Janusz Morbitzer, On the rational use of the Internet in education, Interdisciplinary Contexts of Special Pedagogy, No. 23, PoznaƄ 2018. Pp. 7–21. Adam Mickiewicz University Press. ISSN 2300-391X. DOI: https://doi.org/10.14746/ikps.2018.23.01 The Internet has become one of the most important educational tools today. However, research shows that it is often used without the necessary reflection, as an easily accessible source of information instead of being a tool for intellectual development. This article presents new opportunities offered by the Internet and new competences that are necessary to fully use the Internet’s potential in education. These competences are mostly intellectual and axiological, not technical

    The use of building simulation within an architectural practice

    Get PDF
    This paper documents the development and implementation and use of simulation within an architectural practice and reports how its use facilitates the practice's commitment to Sustainable Design

    Experience of using building simulation within the design process of an architectural practice

    Get PDF
    This paper documents work that follows on from a previous study [Morbitzer et al 2001] on the implementation of a simulation-tool into anarchitectural practice at outline design stage. Theuse of simulation is now pervasively and routinely undertaken by designers within the company toevaluate energy and environmental performance oftheir design concepts. The paper documents the changes to the interface, based on the feedback from designers. It includes a case study of how these improvements have impacted on the degree-of-use of the simulation tool by designers, the impact of the tool on the design process and the design outcome, a discussion on the development of the simulation tool, and the issues facing the architectural practice with use of simulation

    Extracting Secrets from Encrypted Virtual Machines

    Full text link
    AMD SEV is a hardware extension for main memory encryption on multi-tenant systems. SEV uses an on-chip coprocessor, the AMD Secure Processor, to transparently encrypt virtual machine memory with individual, ephemeral keys never leaving the coprocessor. The goal is to protect the confidentiality of the tenants' memory from a malicious or compromised hypervisor and from memory attacks, for instance via cold boot or DMA. The SEVered attack has shown that it is nevertheless possible for a hypervisor to extract memory in plaintext from SEV-encrypted virtual machines without access to their encryption keys. However, the encryption impedes traditional virtual machine introspection techniques from locating secrets in memory prior to extraction. This can require the extraction of large amounts of memory to retrieve specific secrets and thus result in a time-consuming, obvious attack. We present an approach that allows a malicious hypervisor quick identification and theft of secrets, such as TLS, SSH or FDE keys, from encrypted virtual machines on current SEV hardware. We first observe activities of a virtual machine from within the hypervisor in order to infer the memory regions most likely to contain the secrets. Then, we systematically extract those memory regions and analyze their contents on-the-fly. This allows for the efficient retrieval of targeted secrets, strongly increasing the chances of a fast, robust and stealthy theft.Comment: Accepted for publication at CODASPY 201

    In Search of New (Meta)Models of Education in the Twenty-First Century

    Get PDF
    The aim of the publication is to present new models of education appropriate to the twenty-firstcentury and the needs of modern network society. The article presents a comprehensive substantiation for necessity changes in education, resulting from technological development, as well socio-cultural changes. The article characterizes selected models of education of the future: a new culture of learning, the school as a learning organization, so-called turquoise education, and education for wisdom and spirituality. It is emphasized that essential for the new models are new interpersonal relationships and basing on humanistic values rather than on new technologies

    Application of data mining techniques for building simulation performance prediction analysis

    Get PDF
    Simulation exercises covering long periods (e.g.. annual simulations) can produce large quantities of data. The result data set is often primarily used to determine key performance parameters such as the frequency binning of internal temperatures. Efforts to obtain an understanding for reasons behind the predicted building performance are often only carried out to a limited extent and simulation is therefore not used to its full potential. This paper describes how data mining can be used to enhance the analysis of results obtained from a simulation exercise. It identifies clustering as a particular useful analysis technique and illustrates its potential in enhancing the analysis of building simulation performance predictions

    Wisdom as a special value of pedagogy in the digital era

    Get PDF
    PURPOSE: The aim of the article is to show selected changes taking place in the modern world, in particular to draw attention to the enormous pace of technological and cultural changes and the anthropocene epoch, i.e., the destruction of the natural environment. In order not to bring about adverse consequences for people, these changes require a new look at education systems and awakening of environmental awareness.DESIGN/METHODOLOGY/APPROACH: The article is a contemporary scientific reflection, it is a critical analysis of selected sources (monographs, journal articles and netographic sources). The method of analysis and criticism of the literature was used, as well as in-depth own reflection.FINDINGS: Pedagogical reflection and a change in economic thinking is necessary - moving to the so-called ecological economy, considering environmental costs, slowdown of growth, departure from pro-market policy, focused only on profit, and in global education - education towards wisdom and spirituality.PRACTICAL IMPLICATIONS: The lack of information on the current initiation, the perpetuation of the world's weak epidemics of idiocracy is the gradual destruction of our civilization. Too great changes are required in the education system of the ages and an orientation towards education towards wisdom and spirituality. Such a radical change in programming will also contribute to increasing ontological support.ORIGINALITY/VALUE: Linking contemporary global threats, including, above all, the enormous destruction of the natural environment, with such axiological categories as wisdom, knowledge, responsibility, control over emotions; indication of a possible way out of the current crisis situation and the tasks of education in this area.peer-reviewe

    Erstellung und Analyse von TALE-Transkriptionsfaktoren mit benutzerdefinierter ErkennungsspezifitÀt

    Get PDF
    • 

    corecore