2,449 research outputs found
Complementary Effect of Blending on the Volatile Composition of Albariño and Loureira White Wines (Vitis vinifera L.) from NW Spain
Albariño and Loureira are very valuables white cultivars from NW Iberian Peninsula (NW Spain and North Portugal). The purpose of the study was to know how blending affects the volatile composition of Albariño and Loureira white wines. Four Vitis vinifera white wines (Albariño, Loureira, Caiño Blanco and Godello) were blended at different proportions resulting in four wines, two two-wine blends (83:17 Albariño-Caiño Blanco and 50:50 Loureira-Caiño Blanco) and two three-wine blends (48:32:20 Albariño-Loureira-Caiño Blanco and 35:35:30 Loureira-Caiño Blanco-Godello). The blended wines were compared with Albariño and Loureira single-wines. Volatile composition of wines was evaluated by GC-MS to show the changes in aroma compounds of the blends respect to varietal Albariño and Loureira wines. The highest concentration of total volatiles was shown for Loureira and Albariño single-wines. However, blended wines, especially with Loureira, showed an increase of terpenes and C13-norisoprenoids concentration. Discriminant analysis (DA) showed C6-alcohols and phenol volatiles as the variables that most contributed to the differentiation between Albariño and blended wines, whereas terpenes and C13-norisoprenoids were those that contributed to the differentiation Loureira vs blended. To show the sensory influence of volatiles Odour Activity Value (OAV) was calculated, showing the superiority of Loureira single-wines aroma and 50:50 LO-CB blended wines vs Albariño and the other blended wines. The blended wines with high proportion of Loureira supposed wines richer in volatile compounds and increased of complexity aromatic of the wines
CubicleOS: A library OS with software componentisation for practical isolation
Library OSs have been proposed to deploy applications isolated inside containers, VMs, or trusted execution environments. They often follow a highly modular design in which third-party components are combined to offer the OS functionality needed by an application, and they are customised at compilation and deployment time to fit application requirements. Yet their monolithic design lacks isolation across components: when applications and OS components contain security-sensitive data (e.g., cryptographic keys or user data), the lack of isolation renders library OSs open to security breaches via malicious or vulnerable third-party components
CubicleOS: A library OS with software componentisation for practical isolation
Library OSs have been proposed to deploy applications isolated inside containers, VMs, or trusted execution environments. They often follow a highly modular design in which third-party components are combined to offer the OS functionality needed by an application, and they are customised at compilation and deployment time to fit application requirements. Yet their monolithic design lacks isolation across components: when applications and OS components contain security-sensitive data (e.g., cryptographic keys or user data), the lack of isolation renders library OSs open to security breaches via malicious or vulnerable third-party components
¿Qué hay de nuevo en la Rizartrosis?
La rizartrosis en el momento actual está en periodo de avance, ya que nuevos descubrimientos
biomecánicos sobre que ligamento es más importante para la estabilidad, e histológicos con el hallazgo de mecanoreceptores
en los ligamentos abren un nuevo abanico de posibilidades terapéuticas con el control neuromuscular.
La clasificación de Eaton y Littler sigue vigente actualmente, aunque hay nuevas propuestas como el índice
radiológico para la artrosis del pulgar. El tratamiento poco ha variado, ya que la trapecectomía sigue siendo una
opción válida, pero numerosas técnicas han sido desarrolladas, sin tener ningún estudio que confirme la superioridad
de alguna con las demás. Últimamente, nuevas técnicas como la artroscopia, o la utilización de dispositivos
tipo Tightrope®, se empiezan a utilizar, sin tener todavía estudios a largo plazo que nos indiquen si son realmente
eficaces.Nowadays, osteoarthritis of the thumb is breakthrough time. Thaks to the new biomechanical findings
which ligament is more important for stability, and the histological finding of tha mechanoreceptors in the
ligaments, that open up a new range of therapeutic possibilities with neuromuscular control. The classification of
Eaton and Littler is still currently in force, although there are new proposals as the radiological index for osteoarthritis
of the thumb. Treatment has changed little, the trapeziectomy remains as an option, but many techniques
have been developed without any studies that confirm the superiority of one with the other ones. Recently, new
techniques such as arthroscopy, or use Tightrope® type devices are beginning to use, without yet having longterm
studies that tell us whether they are really effective
Spons & shields: practical isolation for trusted execution
Trusted execution environments (TEEs) promise a cost-effective, “lift-and-shift” solution for deploying security-sensitive applications in untrusted clouds. For this, they must support rich, multi-component applications, but a large trusted computing base (TCB) inside the TEE risks that attackers can compromise application security. Fine-grained compartmentalisation can increase security through defense-in-depth, but current solutions either run all software components unprotected in the same TEE, lack efficient shared memory support, or isolate application processes using separate TEEs, impacting performance and compatibility. We describe the Spons & Shields framework (SSF) for Intel SGX TEEs, which offers intra-TEE compartmentalisation using two new abstraction, Spons and Shields. Spons and Shields generalise process, library and user/kernel isolation inside the TEE while allowing for efficient memory sharing. When users deploy unmodified multi-component applications in a TEE, SSF dynamically creates Spons (one per POSIX process or library) and Shields (to enforce a given security policy for memory accesses). Applications can be hardened with minor code changes, e.g., by using a separate Shield to isolate an SSL library. SSF uses compiler instrumentation to protect Shield boundaries, exploiting MPX instructions if available. We evaluate SSF using a complex application service (NGINX, PHP interpreter and PostgreSQL) and show that its overhead is comparable to process isolation
Caladan: a distributed meta-OS for data center disaggregation
Data center resource disaggregation promises cost savings by pool-ing compute, storage and memory resources into separate, net-worked nodes. The benefits of this model are clear, but a closer lookshows that its full performance and efficiency potential cannot beeasily realized. Existing systems use CPUs pervasively to interface ar-bitrary devices with the network and to orchestrate communicationamong them, reducing the benefits of disaggregation.In this paper we presentCaladan, a novel system with a trusteduni-versal resource fabricthat interconnects all resources and efficientlyoffloads the system and application control planes to SmartNICs,freeing server CPUs to execute application logic. Caladan offersthree core services: capability-driven distributed name space, virtualdevices, and direct inter-device communications. These servicesare implemented in a trustedmeta-kernelthat executes in per-nodeSmartNICs. Low-level device drivers running on the commodity hostOS are used for setting up accelerators and I/O devices, and exposingthem to Caladan. Applications run in a distributed fashion acrossCPUs and multiple accelerators, which in turn can directly performI/O, i.e., access files, other accelerators or host services. Our dis-tributed dataflow runtime runs on top of this substrate. It orchestratesthe distributed execution, connecting disaggregated resources usingdata transfers and inter-device communication, while eliminatingthe performance bottlenecks of the traditional CPU-centric design
DATS - data containers for web applications
Data containers enable users to control access to their data while untrusted applications compute on it. However, they require replicating an application inside each container - compromising functionality, programmability, and performance. We propose DATS - a system to run web applications that retains application usability and efficiency through a mix of hardware capability enhanced containers and the introduction of two new primitives modeled after the popular model-view-controller (MVC) pattern. (1) DATS introduces a templating language to create views that compose data across data containers. (2) DATS uses authenticated storage and confinement to enable an untrusted storage service, such as memcached and deduplication, to operate on plain-text data across containers. These two primitives act as robust declassifiers that allow DATS to enforce non-interference across containers, taking large applications out of the trusted computing base (TCB). We showcase eight different web applications including Gitlab and a Slack-like chat, significantly improve the worst-case overheads due to application replication, and demonstrate usable performance for common-case usage
CAP-VMs: Capability-based isolation and sharing in the cloud
Cloud stacks must isolate application components, while permitting efficient data sharing between components deployed on the same physical host. Traditionally, the MMU enforces isolation and permits sharing at page granularity. MMU approaches, however, lead to cloud stacks with large TCBs in kernel space, and page granularity requires inefficient OS interfaces for data sharing. Forthcoming CPUs with hardware support for memory capabilities offer new opportunities to implement isolation and sharing at a finer granularity. We describe cVMs, a new VM-like abstraction that uses memory capabilities to isolate application components while supporting efficient data sharing, all without mandating application code to be capability-aware. cVMs share a single virtual address space safely, each having only capabilities to access its own memory. A cVM may include a library OS, thus minimizing its dependency on the cloud environment. cVMs efficiently exchange data through two capability-based primitives assisted by a small trusted monitor: (i) an asynchronous read/write interface to buffers shared between cVMs; and (ii) a call interface to transfer control between cVMs. Using these two primitives, we build more expressive mechanisms for efficient cross-cVM communication. Our prototype implementation using CHERI RISC-V capabilities shows that cVMs isolate services (Redis and Python) with low overhead while improving data sharing
Análisis cuantitativo de estilos de aprendizaje y satisfacción en contextos de aprendizaje basado en proyectos de accesibilidad
Este trabajo se centra en el análisis cuantitativo mediante técnicas estadísticas de
clasificación al problema del estudio de los estilos de aprendizaje (superficial, profundo) y la
satisfacción de los estudiantes en el marco de asignaturas universitarias centradas en el aprendizaje
de la accesibilidad y gestión de proyectos académicos. Los principales resultados hacen hincapié en
la predominancia del estilo profundo respecto al superficial y en la significancia estadística entre
estilos de aprendizaje y satisfacción.Postprint (published version
Characterization of Myeloid Cellular Populations in Mesenteric and Subcutaneous Adipose Tissue of Holstein-Friesian Cows
Immune cells resident in adipose tissue have important functions in local and systemic metabolic homeostasis. Nevertheless, these immune cell populations remain poorly characterized in bovines. Recently, we described diverse lymphocyte subpopulations in adipose tissue of Holstein-Friesian cows. Here, we aimed at characterising myeloid cell populations present in bovine adipose tissue using multicolour flow cytometry, cell sorting and histochemistry/immunohistochemistry. Macrophages, CD14(+)CD11b(+)MHC-II(+)CD45(+) cells, were identified in mesenteric and subcutaneous adipose tissue, though at higher proportions in the latter. Mast cells, identified as SSC-A(high)CD11b(-/+)CD14(-)MHC-II(-)CH138A(-)CD45(+) cells, were also observed in adipose tissue and found at higher proportions than macrophages in mesenteric adipose tissue. Neutrophils, presenting a CH138A(+)CD11b(+) phenotype, were also detected in mesenteric and subcutaneous adipose tissue, however, at much lower frequencies than in the blood. Our gating strategy allowed identification of eosinophils in blood but not in adipose tissue although being detected by morphological analysis at low frequencies in some animals. A population not expressing CD45 and with the CH138A(+) CD11b(-)MHC-II- phenotype, was found abundant and present at higher proportions in mesenteric than subcutaneous adipose tissue. The work reported here may be useful for further studies addressing the function of the described cells
- …