6,814 research outputs found

    Providing secure remote access to legacy applications

    Get PDF
    While the widespread adoption of Internet and Intranet technology has been one of the exciting developments of recent years, many hospitals are finding that their data and legacy applications do not naturally fit into the new methods of dissemination. Existing applications often rely on isolation or trusted networks for their access control or security, whereas untrusted wide area networks pay little attention to the authenticity, integrity or confidentiality of the data they transport. Many hospitals do not have the resources to develop new ''network-ready'' versions of existing centralised applications. In this paper, we examine the issues that must be considered when providing network access to an existing health care application, and we describe how we have implemented the proposed solution in one healthcare application namely the diabetic register at Hope Hospital. We describe the architecture that allows remote access to the legacy application, providing it with encrypted communications and strongly authenticated access control but without requiring any modifications to the underlying application. As well as comparing alternative ways of implementing such a system, we also consider issues relating to usability and manageability, such as password management

    Initial Experiences of Building Secure Access to Patient Confidential Data via the Internet

    Get PDF
    A project to enable health care professionals (GPs, practice nurses and diabetes nurse specialists) to access, via the Internet, confidential patient data held on a secondary care (hospital) diabetes information system, has been implemented. We describe the application that we chose to distribute (a diabetes register); the security mechanisms we used to protect the data (a public key infrastructure with strong encryption and digitally signed messages, plus a firewall); the reasons for the implementation decisions we made; the validation testing that we performed and the preliminary results of the pilot implementation

    Linguistic theory and 'communicattve' modern language, teaching: the future shows change

    Get PDF
    According to one of its foremost proponents the influence of transformational generative linguistics (TGG) is waning. This waning influence can be noticed largely in disciplines related to linguistics such as psychology but not among many professional linguistis and language teachers. If this is so, two questions might be asked before a look into the future can be attempted: (1) Wha was transformational grammar? And (2) How dtd it affect language teaching in general and TESL in particular? These two questions are related to two other questions. 1) What was the extent of the inlluence of TCG on language teaching? and (2) How long will this influence remain? The answers to these two questions are largely speculative but are nevertheless interesting and hence are the focus of this report

    The sleep cycle and subcortical-cortical EEG relations in the unrestrained chimpanzee

    Get PDF
    Sleep cycle and subcortical-cortical EEG relations in unrestrained chimpanze

    A new efficient method for determining weighted power spectra: detection of low-frequency solar p-modes by analysis of BiSON data

    Full text link
    We present a new and highly efficient algorithm for computing a power spectrum made from evenly spaced data which combines the noise-reducing advantages of the weighted fit with the computational advantages of the Fast Fourier Transform (FFT). We apply this method to a 10-year data set of the solar p-mode oscillations obtained by the Birmingham Solar Oscillations Network (BiSON) and thereby uncover three new low-frequency modes. These are the l=2, n=5 and n=7 modes and the l=3, n=7 mode. In the case of the l=2, n=5 modes, this is believed to be the first such identification of this mode in the literature. The statistical weights needed for the method are derived from a combination of the real data and a sophisticated simulation of the instrument performance. Variations in the weights are due mainly to the differences in the noise characteristics of the various BiSON instruments, the change in those characteristics over time and the changing line-of-sight velocity between the stations and the Sun. It should be noted that a weighted data set will have a more time-dependent signal than an unweighted set and that, consequently, its frequency spectrum will be more susceptible to aliasing.Comment: 11 pages, 7 Figures, accepted for publication in MNRAS, Figure 6 had to be reduced in size to upload and so may be difficult to view on screen in .ps versio

    Blue Boogie / words by John W. Schaum

    Get PDF
    Cover: caricature of an African American male face; Publisher: Belwin (New York)https://egrove.olemiss.edu/sharris_e/1067/thumbnail.jp

    Optical carrier wave shocking: detection and dispersion

    Full text link
    Carrier wave shocking is studied using the Pseudo-Spectral Spatial Domain (PSSD) technique. We describe the shock detection diagnostics necessary for this numerical study, and verify them against theoretical shocking predictions for the dispersionless case. These predictions show Carrier Envelope Phase (CEP) and pulse bandwidth sensitivity in the single-cycle regime. The flexible dispersion management offered by PSSD enables us to independently control the linear and nonlinear dispersion. Customized dispersion profiles allow us to analyze the development of both carrier self-steepening and shocks. The results exhibit a marked asymmetry between normal and anomalous dispersion, both in the limits of the shocking regime and in the (near) shocked pulse waveforms. Combining these insights, we offer some suggestions on how carrier shocking (or at least extreme self-steepening) might be realised experimentally.Comment: 9 page

    Growing house plants, Bulletin, no. 359

    Get PDF
    The Bulletin is a publication of the New Hampshire Agricultural Experiment Station, College of Life Sciences and Agriculture, University of New Hampshire, Durham, New Hampshire
    • 

    corecore