218 research outputs found

    The Public Domain in New Mexico 1854-1891

    Get PDF
    New Mexico enjoys the use and benefits of the most complete and ingenious system of identifying land areas ever devised by man - the rectangular system of surveying. This system of survey was used in the states of the United States except six New England States, New York, Pennsylvania, New Jersey, Delaware, Maryland, Virginia, North Carolina, South Carolina, Georgia, Tennessee, Kentucky, and Texas, the United States not being the owner of public lands in any of these political divisions. The economic efficiency of surveying with this system has done much to preclude the possibility of litigation over boundaries as is so common in the States where it does not prevail

    Multi Directional Latching Mechanism

    Get PDF
    Disclosed is a latching mechanism that allows multiple modules to be retained in one area without limiting the direction in which the module is installed or removed

    Albuquerque in the 1870\u27s

    Get PDF

    The Public Domain in New Mexico, 1854-1891

    Get PDF

    Desenvolvimento de uma Aplicação com dispositivo IoT usando Protocolos DTLS e CoAP

    Get PDF
    TCC(graduação) - Universidade Federal de Santa Catarina. Centro Tecnológico. Ciências da Computação.No contexto de Internet das Coisas, o uso crescente de sensores e equipamentos interligados através da Internet junto ao fato de muitos dispositivos terem limitações energéticas, limitações de processamento e limitações de memória, gera uma demanda por soluções eficientes e compatíveis com a Internet. Assim, certos protocolos foram criados para facilitar a comunicação de dispositivos limitados com a Internet, com o objetivo de não sobrecarregá-los. CoAP (Constrained Application Protocol) e DTLS (Datagram Transport Layer Security) são exemplos de protocolos voltados a dispositivos restritos e representam, respectivamente, protocolo de aplicação e protocolo de segurança. Para resolver um problema da atividade agrícola, envolvendo sensores e um dispositivo de IoT (Internet of Things), foi realizado um estudo, em forma de revisão bibliográfica, acerca de segurança em IoT, identificando métodos e protocolos para a transmissão dos dados, coletados por sensores, seguramente. A partir do conhecimento desses métodos e protocolos, foi desenvolvido um protótipo para a solução do problema agrícola.When dealing with Internet of Things, due to the rising popularity of sensoring and small computing devices use trought Internet and considering their power, processing and storage limitations, there is a need of efficient and compatible solutions regarding these kind of devices and technology. Some specific protocolos were developed aiming to help the comunication of restricted small devices, throught the Internet, without overloading them. CoAP (Constrained Application Protocol) and DTLS (Datagram Transport Layer Security) represent, respectively, application protocol and security protocol and both were developed to be used by restricted devices. In order to solve a problem regarding an agricultural production, that can be solved with sensors and an IoT device, a literature review about IoT security was made, covering methods and protocolos to obtain secure data transmission. By the time the study was complete, a prototype to represent the agricultural problem was developed in order to achieve the solution

    En engelsk bogskat i Det Kgl. Bibliotek, Aarhus

    Get PDF

    Uma experiencia no projeto esprit 2100 : max-metropolitan area communication system

    Get PDF
    Mostra-se um exemplo de um projeto do programa ESPRIT (European Stra tegic Program for R&D in Information Technology) pela comunidade européia, evidenciando a participação do grupo de redes de computadores da Université Paul Sabatier. No caso o projeto MAX (Metropolitan Area Communication System), que visa especificar, projetar, implementar e testar uma Metropolitan Area Network - MAN

    DoS attack detection and prevention in fog-based intelligent environments / Detecção e prevenção de ataques DoS em ambientes inteligentes baseados em nevoeiro

    Get PDF
    The Internet of Things and Fog Computing are technologies currently used in many areas. They can be applied to provide a residential automation environment, for example, fire alarm applications, gas leak alarms, among others. Security-related searches for these fog-based environments are still in the early stages. Also, the fact that these environments are connected to the Internet makes them vulnerable to various threats, such as Denial of Service (DoS) attacks. In this work, we propose a module for detection and prevention of DoS attacks, that operates in the system’s fog layer, to protect the system from external attacks. Practical experiments were carried out with the proposed module, considering a Raspberry Pi 3B as our fog server. The results obtained demonstrates that the approach is capable of detecting external attacks, as well as blocking the IPs from attackers, using less than 20% of cpu and less than 1% of RAM memory usage.

    Gathering Good Corn from the Weeds: Theological and Pastoral Engagements with the Prickynge of Love in Post-Reformation England

    Get PDF
    This essay represents a new approach to the highly conflicted responses of scholars from the period of the English Reformation to medieval religious literature. Recent studies of sixteenth-century antiquarian engagements with medieval literature have thrown much light on the attitudes of bibliophiles like John Leland, John Bale and the circle of antiquarians connected with Archbishop Matthew Parker. However, there has been little detailed documentation of post-Reformation engagements with actual books and of the productive rehabilitation of texts that had become doctrinally problematic in Elizabethan England. This essay analyses the engagements of Stephen Batman and an anonymous ecclesiastical annotator with the Pricking of Love, a deeply affective late fourteenth-century devotional treatise. The medieval text, infused with fervent Christological and Marian piety, is seemingly an unlikely source for reformed Elizabethan readers in which to recognise valuable religious lore. But in fact, these readers go far beyond repudiating ‘papistical’ errors to demonstrate both the past roots of their own reformed theologies and the continuing pastoral utilities of much of the medieval text

    Uma breve análise sobre phishing

    Get PDF
    The number of phishing attacks reached in 2021 the highest number of all time until then, being the triple since 2020. This event demonstrates that as phishing techniques are shaped considering the context of their target since its emergence in 1995, these attacks end up adapting over time and, thus, this problem persists in society for more than 25 years and continues to increase its number of victims. With that, this work presents a study about what is phishing, its concepts, its types and the problems caused in society.O número de ataques phishing atingiu em 2021 o maior número de todos os tempos até então, sendo o triplo desde 2020. Tal evento demonstra que, desde seu surgimento em 1995, como as técnicas de phishing são moldadas considerando o contexto de seu alvo, esses ataques acabam se adaptando com o tempo e, dessa forma, tal problema persiste na sociedade há mais de 25 anos e continua aumentando seu número de vítimas. Com isso, este trabalho apresenta um estudo sobre o que é phishing, seus conceitos, seus tipos e os problemas causados na sociedade
    • …
    corecore