820 research outputs found

    Still tied by golden fetters: the global response to the US recession of 1937-1938

    Get PDF
    The US recession of 1937-8 is one of the deepest on record. Yet it did not produce a global depression - quite unlike 1930. According to the standard view, this reflected an unfettering of central banking after the collapse of the international gold standard circa 1931. We challenge this view. While Germany and a couple of Central and Eastern European countries were sheltered by binding exchange controls, most countries were still constrained by their golden fetters, as our new exchange rate regime classification suggests. The underlying policy regime was surprisingly similar to that of the 1929-30 downturn. What mattered was a quick reversal in US policy in 1938 and, for many countries, a more plentiful stock of international reserve

    Untersuchungen zur Degradation der Metallisierung von PERC-Solarzellen

    Get PDF
    Für derzeitige, industriell hergestellte Solarmodule werden Leistungsgarantien von 20 bis 25 Jahren gegeben. Das hat hohen Ansprüchen bezüglich ihrer Zuverlässigkeit, welche sich über ihre Effizienzabnahme pro Jahr definiert, zur Folge. Die Einführung neuer Technologien, wie z.B. die der PERC- (passivated emitter and rear cell) als Ersatz für die bislang dominierende BSF-Technologie (back surface field) hat eine umfangreiche Änderung der Metallisierung der Solarzellen nach sich gezogen, wodurch neue Degradationseffekte auftreten können. In der vorliegenden Arbeit werden die einzelnen Komponenten der Solarzellenmetallisierung und –verschaltung in Bezug auf ihren Beitrag zur Degradation untersucht. Die dafür notwendige beschleunigte Alterung erfolgte mittels Temperaturwechselbelastung zwischen -40 °C und +85 °C. Unterstützt durch die numerische Simulation konnte die Degradation der Rückseitenmetallisierung und Zellverschaltung im Detail charakterisiert und Lösungen zur Reduktion der Leistungsabnahme abgeleitet werden. Erstmals wurde dabei der Einfluss der AgAl-Legierung und des Druckkontaktwiderstandes auf den Serienwiderstand der Solarmodule untersucht

    Our (in)Secure Web: Understanding Update Behavior of Websites and Its Impact on Security

    Get PDF
    Software updates take an essential role in keeping IT environments secure. If service providers delay or do not install updates, it can cause unwanted security implications for their environments. This paper conducts a large-scale measurement study of the update behavior of websites and their utilized software stacks. Across 18 months, we analyze over 5.6M websites and 246 distinct client- and server-side software distributions. We found that almost all analyzed sites use outdated software. To understand the possible security implications of outdated software, we analyze the potential vulnerabilities that affect the utilized software. We show that software components are getting older and more vulnerable because they are not updated. We find that 95 % of the analyzed websites use at least one product for which a vulnerability existed

    An Eisenstein ideal for imaginary quadratic fields and the Bloch-Kato conjecture for Hecke characters

    Get PDF
    For certain algebraic Hecke characters chi of an imaginary quadratic field F we define an Eisenstein ideal in a p-adic Hecke algebra acting on cuspidal automorphic forms of GL_2/F. By finding congruences between Eisenstein cohomology classes (in the sense of G. Harder) and cuspidal classes we prove a lower bound for the index of the Eisenstein ideal in the Hecke algebra in terms of the special L-value L(0,chi). We further prove that its index is bounded from above by the order of the Selmer group of the p-adic Galois character associated to chi^{-1}. This uses the work of R. Taylor et al. on attaching Galois representations to cuspforms of GL_2/F. Together these results imply a lower bound for the size of the Selmer group in terms of L(0,chi), coinciding with the value given by the Bloch-Kato conjecture.Comment: 26 page

    Beyond the Front Page: Measuring Third Party Dynamics in the Field

    Full text link
    In the modern Web, service providers often rely heavily on third parties to run their services. For example, they make use of ad networks to finance their services, externally hosted libraries to develop features quickly, and analytics providers to gain insights into visitor behavior. For security and privacy, website owners need to be aware of the content they provide their users. However, in reality, they often do not know which third parties are embedded, for example, when these third parties request additional content as it is common in real-time ad auctions. In this paper, we present a large-scale measurement study to analyze the magnitude of these new challenges. To better reflect the connectedness of third parties, we measured their relations in a model we call third party trees, which reflects an approximation of the loading dependencies of all third parties embedded into a given website. Using this concept, we show that including a single third party can lead to subsequent requests from up to eight additional services. Furthermore, our findings indicate that the third parties embedded on a page load are not always deterministic, as 50% of the branches in the third party trees change between repeated visits. In addition, we found that 93% of the analyzed websites embedded third parties that are located in regions that might not be in line with the current legal framework. Our study also replicates previous work that mostly focused on landing pages of websites. We show that this method is only able to measure a lower bound as subsites show a significant increase of privacy-invasive techniques. For example, our results show an increase of used cookies by about 36% when crawling websites more deeply

    Towards Understanding First-Party Cookie Tracking in the Field

    Get PDF
    Third-party tracking is a common and broadly used technique on the Web. Different defense mechanisms have emerged to counter these practices (e. g. browser vendors that ban all third-party cookies). However, these countermeasures only target third-party trackers and ignore the first party because the narrative is that such monitoring is mostly used to improve the utilized service (e.g. analytical services). In this paper, we present a large-scale measurement study that analyzes tracking performed by the first party but utilized by a third party to circumvent standard tracking preventing techniques. We visit the top 15,000 websites to analyze first-party cookies used to track users and a technique called “DNS CNAME cloaking”, which can be used by a third party to place first-party cookies. Using this data, we show that 76% of sites effectively utilize such tracking techniques. In a long-running analysis, we show that the usage of such cookies increased by more than 50% over 2021

    Excited bound states and their role in dark matter production

    Full text link
    We explore the impact of highly excited bound states on the evolution of number densities of new physics particles, specifically dark matter, in the early Universe. Focusing on dipole transitions within perturbative, unbroken gauge theories, we develop an efficient method for including around a million bound state formation and bound-to-bound transition processes. This enables us to examine partial-wave unitarity and accurately describe the freeze-out dynamics down to very low temperatures. In the non-Abelian case, we find that highly excited states can prevent the particles from freezing out, supporting a continuous depletion in the regime consistent with perturbativity and unitarity. We apply our formalism to a simplified dark matter model featuring a colored and electrically charged tt-channel mediator. Our focus is on the regime of superWIMP production which is commonly characterized by a mediator freeze-out followed by its late decay into dark matter. In contrast, we find that excited states render mediator depletion efficient all the way until its decay, introducing a dependence of the dark matter density on the mediator lifetime as a novel feature. The impact on the viable dark matter mass can amount to an order of magnitude, relaxing constraints from Lyman-α\alpha observations.Comment: 21 pages + references, 10 figure

    Phylogenomics and biogeography of the world's thrushes (Aves, Turdus) : new evidence for a more parsimonious evolutionary history

    Get PDF
    To elucidate the relationships and spatial range evolution across the world of the bird genus Turdus (Aves), we produced a large genomic dataset comprising ca 2 million nucleotides for ca 100 samples representing 53 species, including over 2000 loci. We estimated time-calibrated maximum-likelihood and multispecies coalescentphylogenies and carried out biogeographic analyses. Our results indicate that there have been considerably fewer trans-oceanic dispersals within the genus Turdus than previously suggested, such that the Palaearctic clade did not originate in America and the African clade was not involved in the colonization of the Americas. Instead, our findings suggest that dispersal from the Western Palaearctic via the Antilles to the Neotropics might have occurred in a single event, giving rise to the rich Neotropical diversity of Turdus observed today, with no reverse dispersals to thePalaearctic or Africa. Our large multilocus dataset, combined with dense species-level sampling and analysed under probabilistic methods, brings important insights into historical biogeography and systematics, even in a scenario of fast and spatially complex diversification.Peer reviewe

    Untersuchung der Praxistauglichkeit eines Ortungssystems zur Verbesserung des Herdenmanagements eines Milchviehbetriebes

    Get PDF
    Ziel dieses Versuches, der im Rahmen eines Praxisprojektes durchgeführt wurde, war die Überprüfung der Praxistauglichkeit des Real Time Location Systems (RTLS) Ubisense 7000 für das Herdenmanagement. Neben der Überprüfung der Genauigkeit der mit dem Ortungssystems erhobenen Daten, wurden Daten, zur Aktivitätsmessung, Brunsterkennung, Aufenthaltsdauer in den Funktionsbereichen sowie Laufverhalten mithilfe von Pedometern und Videobeobachtung erfasst
    corecore