6,814 research outputs found
Providing secure remote access to legacy applications
While the widespread adoption of Internet and Intranet technology has been one of the exciting developments of recent years, many hospitals are finding that their data and legacy applications do not naturally fit into the new methods of dissemination. Existing applications often rely on isolation or trusted networks for their access control or security, whereas untrusted wide area networks pay little attention to the authenticity, integrity or confidentiality of the data they transport. Many hospitals do not have the resources to develop new ''network-ready'' versions of existing centralised applications. In this paper, we examine the issues that must be considered when providing network access to an existing health care application, and we describe how we have implemented the proposed solution in one healthcare application namely the diabetic register at Hope Hospital. We describe the architecture that allows remote access to the legacy application, providing it with encrypted communications and strongly authenticated access control but without requiring any modifications to the underlying application. As well as comparing alternative ways of implementing such a system, we also consider issues relating to usability and manageability, such as password management
Initial Experiences of Building Secure Access to Patient Confidential Data via the Internet
A project to enable health care professionals (GPs, practice nurses and diabetes nurse specialists) to access, via the Internet, confidential patient data held on a secondary care (hospital) diabetes information system, has been implemented. We describe the application that we chose to distribute (a diabetes register); the security mechanisms we used to protect the data (a public key infrastructure with strong encryption and digitally signed messages, plus a firewall); the reasons for the implementation decisions we made; the validation testing that we performed and the preliminary results of the pilot implementation
Linguistic theory and 'communicattve' modern language, teaching: the future shows change
According to one of its foremost proponents the influence of transformational generative linguistics (TGG) is waning. This waning influence can be noticed largely in disciplines related to linguistics such as psychology but not among many professional linguistis and language teachers. If this is so, two questions might be asked before a look into the future can be attempted: (1) Wha was transformational grammar? And (2) How dtd it affect language teaching in general and TESL in particular? These two questions are related to two other questions. 1) What was the extent of the inlluence of TCG on language teaching? and (2) How long will this influence remain? The answers to these two questions are largely speculative but are nevertheless interesting and hence are the focus of this report
The sleep cycle and subcortical-cortical EEG relations in the unrestrained chimpanzee
Sleep cycle and subcortical-cortical EEG relations in unrestrained chimpanze
A new efficient method for determining weighted power spectra: detection of low-frequency solar p-modes by analysis of BiSON data
We present a new and highly efficient algorithm for computing a power
spectrum made from evenly spaced data which combines the noise-reducing
advantages of the weighted fit with the computational advantages of the Fast
Fourier Transform (FFT). We apply this method to a 10-year data set of the
solar p-mode oscillations obtained by the Birmingham Solar Oscillations Network
(BiSON) and thereby uncover three new low-frequency modes. These are the l=2,
n=5 and n=7 modes and the l=3, n=7 mode. In the case of the l=2, n=5 modes,
this is believed to be the first such identification of this mode in the
literature. The statistical weights needed for the method are derived from a
combination of the real data and a sophisticated simulation of the instrument
performance. Variations in the weights are due mainly to the differences in the
noise characteristics of the various BiSON instruments, the change in those
characteristics over time and the changing line-of-sight velocity between the
stations and the Sun. It should be noted that a weighted data set will have a
more time-dependent signal than an unweighted set and that, consequently, its
frequency spectrum will be more susceptible to aliasing.Comment: 11 pages, 7 Figures, accepted for publication in MNRAS, Figure 6 had
to be reduced in size to upload and so may be difficult to view on screen in
.ps versio
Blue Boogie / words by John W. Schaum
Cover: caricature of an African American male face; Publisher: Belwin (New York)https://egrove.olemiss.edu/sharris_e/1067/thumbnail.jp
Optical carrier wave shocking: detection and dispersion
Carrier wave shocking is studied using the Pseudo-Spectral Spatial Domain
(PSSD) technique. We describe the shock detection diagnostics necessary for
this numerical study, and verify them against theoretical shocking predictions
for the dispersionless case. These predictions show Carrier Envelope Phase
(CEP) and pulse bandwidth sensitivity in the single-cycle regime. The flexible
dispersion management offered by PSSD enables us to independently control the
linear and nonlinear dispersion. Customized dispersion profiles allow us to
analyze the development of both carrier self-steepening and shocks. The results
exhibit a marked asymmetry between normal and anomalous dispersion, both in the
limits of the shocking regime and in the (near) shocked pulse waveforms.
Combining these insights, we offer some suggestions on how carrier shocking (or
at least extreme self-steepening) might be realised experimentally.Comment: 9 page
Growing house plants, Bulletin, no. 359
The Bulletin is a publication of the New Hampshire Agricultural Experiment Station, College of Life Sciences and Agriculture, University of New Hampshire, Durham, New Hampshire
- âŠ