569 research outputs found

    A South American Energy Treaty: How the Region Might Attract Foreign Investment in a Wake of Resource Nationalism

    Get PDF

    Review of \u3ci\u3eValentine T. McGillycuddy: Army Surgeon, Agent to the Sioux\u3c/i\u3e by Candy Moulton

    Get PDF
    Valentine T. McGillycuddy is not famous, but he should be. His presence at many critical events in the 1870s and \u2780s compelled Candy Moulton to write this engaging biography. McGillycuddy worked as a doctor and surveyor on the Northern Boundary Survey and the 1875 Newton-Jenney Expedition into the Black Hills. He tended wounded soldiers as an army surgeon during the war with the Lakotas and Cheyennes in 1876 and served as an Indian agent on the Pine Ridge Reservation from 1879-86. He brushed shoulders with such iconic western figures as Calamity Jane, William F. Cody, Marcus Reno, Red Cloud, and Crazy Horse, the latter a good friend whom he tried desperately, but unsuccessfully, to save following the tragic confrontation with U.S. soldiers at Fort Robinson

    Review of \u3ci\u3eValentine T. McGillycuddy: Army Surgeon, Agent to the Sioux\u3c/i\u3e by Candy Moulton

    Get PDF
    Valentine T. McGillycuddy is not famous, but he should be. His presence at many critical events in the 1870s and \u2780s compelled Candy Moulton to write this engaging biography. McGillycuddy worked as a doctor and surveyor on the Northern Boundary Survey and the 1875 Newton-Jenney Expedition into the Black Hills. He tended wounded soldiers as an army surgeon during the war with the Lakotas and Cheyennes in 1876 and served as an Indian agent on the Pine Ridge Reservation from 1879-86. He brushed shoulders with such iconic western figures as Calamity Jane, William F. Cody, Marcus Reno, Red Cloud, and Crazy Horse, the latter a good friend whom he tried desperately, but unsuccessfully, to save following the tragic confrontation with U.S. soldiers at Fort Robinson

    Time theft: exposing a subtle yet serious driver of socioeconomic inequality

    Get PDF
    Socioeconomic inequality is perpetuated and exacerbated by an overlooked yet serious epidemic of time theft: the act of causing others to lose their time without adequate cause, compensation, or consent. We explain why time theft goes unnoticed, how it drives socioeconomic inequality, and what businesses and policymakers can do to address it

    CAS : student engagement requires unambiguous advantages

    Get PDF
    Encouraging students to develop effective use of Computer Algebra Systems (CAS) is not trivial. This paper reports on a group of undergraduate students who, despite carefully planned lectures and CAS availability for all learning and assessment tasks, failed to capitalize on its affordances. If students are to work within the technical constraints, and develop effective use of CAS, teachers need to provide assistance with technical difficulties, actively demonstrate CAS\u27 value and unambiguously reward its strategic use in assessment.<br /

    Enhanced Security for Preventing Man-in-the-Middle Attacks in Authentication, DataEntry and Transaction Verification

    Get PDF
    There is increasing coverage in the literature highlighting threats to online financial systems. Attacks range from the prevalent reverse social engineering technique known as phishing; where spam emails are sent to customers with links to fake websites, to Trojans that monitor a customer’s account log on process that captures authentication details that are later replayed for financial gain. This ultimately results in loss of monetary funds for affected victims. As technological advances continue to influence the way society makes payment for goods and services, the requirement for more advanced security approaches for transaction verification in the online environment increases. This paper has three main purposes. The first is to detail the current threats and vulnerabilities to online financial systems and in particular online banking, from the selected literature. The second is to present the known prevention techniques for protecting against these attacks. The third is to present a conceptual model for authentication, data entry and transaction verification. It is suggested that the design adds another layer of security to existing methods to either prevent a MitM attack or to make the procedure of capturing and reassembling customer log on and transaction details more computationally and time intensive than what it is worth to an attacker. The model is based on a graphical authentication application previously developed called Authentigraph

    Involuted Matter

    Get PDF
    Rather than functioning as an icon, Involuted Matter dissolves into the background of commercial construction, conceals difference at the envelope, and orchestrates a succession of alternate environments. Accepting the unifying neutrality of a larger framework this project articulates difference at the individual site. But unlike iconic projects, the real force of this thesis unfolds through the interior. Identity is formed not at the level of district, but is centered on the individual occupation of a specific place. The program for this project is a jimjilbang or Korean Bath House. The jimjilbang has the potential to become a new form of collective space not typical of the American metropolis. The bath house is simultaneously an intimate and egalitarian public venue and a private center for personal well being. Immersed in the same waters and ambient environments, clothed in matching jimjilbang attire, a plurality of classes, age groups, and social values congregate around a common program
    • …
    corecore