2,389 research outputs found

    Complementary Effect of Blending on the Volatile Composition of Albariño and Loureira White Wines (Vitis vinifera L.) from NW Spain

    Get PDF
    Albariño and Loureira are very valuables white cultivars from NW Iberian Peninsula (NW Spain and North Portugal). The purpose of the study was to know how blending affects the volatile composition of Albariño and Loureira white wines. Four Vitis vinifera white wines (Albariño, Loureira, Caiño Blanco and Godello) were blended at different proportions resulting in four wines, two two-wine blends (83:17 Albariño-Caiño Blanco and 50:50 Loureira-Caiño Blanco) and two three-wine blends (48:32:20 Albariño-Loureira-Caiño Blanco and 35:35:30 Loureira-Caiño Blanco-Godello). The blended wines were compared with Albariño and Loureira single-wines. Volatile composition of wines was evaluated by GC-MS to show the changes in aroma compounds of the blends respect to varietal Albariño and Loureira wines. The highest concentration of total volatiles was shown for Loureira and Albariño single-wines. However, blended wines, especially with Loureira, showed an increase of terpenes and C13-norisoprenoids concentration. Discriminant analysis (DA) showed C6-alcohols and phenol volatiles as the variables that most contributed to the differentiation between Albariño and blended wines, whereas terpenes and C13-norisoprenoids were those that contributed to the differentiation Loureira vs blended. To show the sensory influence of volatiles Odour Activity Value (OAV) was calculated, showing the superiority of Loureira single-wines aroma and 50:50 LO-CB blended wines vs Albariño and the other blended wines. The blended wines with high proportion of Loureira supposed wines richer in volatile compounds and increased of complexity aromatic of the wines

    CubicleOS: A library OS with software componentisation for practical isolation

    Get PDF
    Library OSs have been proposed to deploy applications isolated inside containers, VMs, or trusted execution environments. They often follow a highly modular design in which third-party components are combined to offer the OS functionality needed by an application, and they are customised at compilation and deployment time to fit application requirements. Yet their monolithic design lacks isolation across components: when applications and OS components contain security-sensitive data (e.g., cryptographic keys or user data), the lack of isolation renders library OSs open to security breaches via malicious or vulnerable third-party components

    CubicleOS: A library OS with software componentisation for practical isolation

    Get PDF
    Library OSs have been proposed to deploy applications isolated inside containers, VMs, or trusted execution environments. They often follow a highly modular design in which third-party components are combined to offer the OS functionality needed by an application, and they are customised at compilation and deployment time to fit application requirements. Yet their monolithic design lacks isolation across components: when applications and OS components contain security-sensitive data (e.g., cryptographic keys or user data), the lack of isolation renders library OSs open to security breaches via malicious or vulnerable third-party components

    ¿Qué hay de nuevo en la Rizartrosis?

    Get PDF
    La rizartrosis en el momento actual está en periodo de avance, ya que nuevos descubrimientos biomecánicos sobre que ligamento es más importante para la estabilidad, e histológicos con el hallazgo de mecanoreceptores en los ligamentos abren un nuevo abanico de posibilidades terapéuticas con el control neuromuscular. La clasificación de Eaton y Littler sigue vigente actualmente, aunque hay nuevas propuestas como el índice radiológico para la artrosis del pulgar. El tratamiento poco ha variado, ya que la trapecectomía sigue siendo una opción válida, pero numerosas técnicas han sido desarrolladas, sin tener ningún estudio que confirme la superioridad de alguna con las demás. Últimamente, nuevas técnicas como la artroscopia, o la utilización de dispositivos tipo Tightrope®, se empiezan a utilizar, sin tener todavía estudios a largo plazo que nos indiquen si son realmente eficaces.Nowadays, osteoarthritis of the thumb is breakthrough time. Thaks to the new biomechanical findings which ligament is more important for stability, and the histological finding of tha mechanoreceptors in the ligaments, that open up a new range of therapeutic possibilities with neuromuscular control. The classification of Eaton and Littler is still currently in force, although there are new proposals as the radiological index for osteoarthritis of the thumb. Treatment has changed little, the trapeziectomy remains as an option, but many techniques have been developed without any studies that confirm the superiority of one with the other ones. Recently, new techniques such as arthroscopy, or use Tightrope® type devices are beginning to use, without yet having longterm studies that tell us whether they are really effective

    Spons & shields: practical isolation for trusted execution

    Get PDF
    Trusted execution environments (TEEs) promise a cost-effective, “lift-and-shift” solution for deploying security-sensitive applications in untrusted clouds. For this, they must support rich, multi-component applications, but a large trusted computing base (TCB) inside the TEE risks that attackers can compromise application security. Fine-grained compartmentalisation can increase security through defense-in-depth, but current solutions either run all software components unprotected in the same TEE, lack efficient shared memory support, or isolate application processes using separate TEEs, impacting performance and compatibility. We describe the Spons & Shields framework (SSF) for Intel SGX TEEs, which offers intra-TEE compartmentalisation using two new abstraction, Spons and Shields. Spons and Shields generalise process, library and user/kernel isolation inside the TEE while allowing for efficient memory sharing. When users deploy unmodified multi-component applications in a TEE, SSF dynamically creates Spons (one per POSIX process or library) and Shields (to enforce a given security policy for memory accesses). Applications can be hardened with minor code changes, e.g., by using a separate Shield to isolate an SSL library. SSF uses compiler instrumentation to protect Shield boundaries, exploiting MPX instructions if available. We evaluate SSF using a complex application service (NGINX, PHP interpreter and PostgreSQL) and show that its overhead is comparable to process isolation

    Caladan: a distributed meta-OS for data center disaggregation

    Get PDF
    Data center resource disaggregation promises cost savings by pool-ing compute, storage and memory resources into separate, net-worked nodes. The benefits of this model are clear, but a closer lookshows that its full performance and efficiency potential cannot beeasily realized. Existing systems use CPUs pervasively to interface ar-bitrary devices with the network and to orchestrate communicationamong them, reducing the benefits of disaggregation.In this paper we presentCaladan, a novel system with a trusteduni-versal resource fabricthat interconnects all resources and efficientlyoffloads the system and application control planes to SmartNICs,freeing server CPUs to execute application logic. Caladan offersthree core services: capability-driven distributed name space, virtualdevices, and direct inter-device communications. These servicesare implemented in a trustedmeta-kernelthat executes in per-nodeSmartNICs. Low-level device drivers running on the commodity hostOS are used for setting up accelerators and I/O devices, and exposingthem to Caladan. Applications run in a distributed fashion acrossCPUs and multiple accelerators, which in turn can directly performI/O, i.e., access files, other accelerators or host services. Our dis-tributed dataflow runtime runs on top of this substrate. It orchestratesthe distributed execution, connecting disaggregated resources usingdata transfers and inter-device communication, while eliminatingthe performance bottlenecks of the traditional CPU-centric design

    DATS - data containers for web applications

    Get PDF
    Data containers enable users to control access to their data while untrusted applications compute on it. However, they require replicating an application inside each container - compromising functionality, programmability, and performance. We propose DATS - a system to run web applications that retains application usability and efficiency through a mix of hardware capability enhanced containers and the introduction of two new primitives modeled after the popular model-view-controller (MVC) pattern. (1) DATS introduces a templating language to create views that compose data across data containers. (2) DATS uses authenticated storage and confinement to enable an untrusted storage service, such as memcached and deduplication, to operate on plain-text data across containers. These two primitives act as robust declassifiers that allow DATS to enforce non-interference across containers, taking large applications out of the trusted computing base (TCB). We showcase eight different web applications including Gitlab and a Slack-like chat, significantly improve the worst-case overheads due to application replication, and demonstrate usable performance for common-case usage

    CAP-VMs: Capability-based isolation and sharing in the cloud

    Get PDF
    Cloud stacks must isolate application components, while permitting efficient data sharing between components deployed on the same physical host. Traditionally, the MMU enforces isolation and permits sharing at page granularity. MMU approaches, however, lead to cloud stacks with large TCBs in kernel space, and page granularity requires inefficient OS interfaces for data sharing. Forthcoming CPUs with hardware support for memory capabilities offer new opportunities to implement isolation and sharing at a finer granularity. We describe cVMs, a new VM-like abstraction that uses memory capabilities to isolate application components while supporting efficient data sharing, all without mandating application code to be capability-aware. cVMs share a single virtual address space safely, each having only capabilities to access its own memory. A cVM may include a library OS, thus minimizing its dependency on the cloud environment. cVMs efficiently exchange data through two capability-based primitives assisted by a small trusted monitor: (i) an asynchronous read/write interface to buffers shared between cVMs; and (ii) a call interface to transfer control between cVMs. Using these two primitives, we build more expressive mechanisms for efficient cross-cVM communication. Our prototype implementation using CHERI RISC-V capabilities shows that cVMs isolate services (Redis and Python) with low overhead while improving data sharing

    Análisis cuantitativo de estilos de aprendizaje y satisfacción en contextos de aprendizaje basado en proyectos de accesibilidad

    Get PDF
    Este trabajo se centra en el análisis cuantitativo mediante técnicas estadísticas de clasificación al problema del estudio de los estilos de aprendizaje (superficial, profundo) y la satisfacción de los estudiantes en el marco de asignaturas universitarias centradas en el aprendizaje de la accesibilidad y gestión de proyectos académicos. Los principales resultados hacen hincapié en la predominancia del estilo profundo respecto al superficial y en la significancia estadística entre estilos de aprendizaje y satisfacción.Postprint (published version

    Understanding the gendered coaching workforce in Spanish sport

    Get PDF
    The present study focuses on the demographic and labor characteristics of coaches in Spain. Kanter’s theory on occupational sex segregation will be used as a guiding framework. The study was conducted with 1685 coaches (82.3% men and 17.7% women) from different sports and performance domains. The results show that there is an underrepresentation of women as coaches in Spain and data highlight that coaches’ gender is related to three structural factors: opportunity, power, and proportion. The present data reveal that women are younger, less likely to be in a marriage-like relationship, less likely to have children, and more likely to have competed at a high level as an athlete when compared to their male counterparts. However, fewer women than men access and participate in coach education in Catalonia and the working status of women was different to that of men. To expand, women worked less hours, were more likely to be assistant coaches, and had less years of coaching experience. Understanding of how gender influences women’s access, progression, and retention in coaching in Spain illustrates the need for gender sport policies and practices in sport organizations. This approach can benefit not only women, but the diversity and enrichment of the coaching system
    corecore