903 resultados para network security
Resumo:
This article addresses the normative dilemma located within the application of `securitization,’ as a method of understanding the social construction of threats and security policies. Securitization as a theoretical and practical undertaking is being increasingly used by scholars and practitioners. This scholarly endeavour wishes to provide those wishing to engage with securitization with an alternative application of this theory; one which is sensitive to and self-reflective of the possible normative consequences of its employment. This article argues that discussing and analyzing securitization processes have normative implications, which is understood here to be the negative securitization of a referent. The negative securitization of a referent is asserted to be carried out through the unchallenged analysis of securitization processes which have emerged through relations of exclusion and power. It then offers a critical understanding and application of securitization studies as a way of overcoming the identified normative dilemma. First, it examines how the Copenhagen School’s formation of securitization theory gives rise to a normative dilemma, which is situated in the performative and symbolic power of security as a political invocation and theoretical concept. Second, it evaluates previous attempts to overcome the normative dilemma of securitization studies, outlining the obstacles that each individual proposal faces. Third, this article argues that the normative dilemma of applying securitization can be avoided by firstly, deconstructing the institutional power of security actors and dominant security subjectivities and secondly, by addressing countering or alternative approaches to security and incorporating different security subjectivities. Examples of the securitization of international terrorism and immigration are prominent throughout.
Resumo:
Since the independence processes in the African continent, armed conflicts, peace and security have raised concern and attention both at the domestic level and at the international scale. In recent years, all aspects have undergone significant changes which have given rise to intense debate. The end of some historical conflicts has taken place in a context of slight decrease in the number of armed conflicts and the consolidation of post-conflict reconstruction processes. Moreover, African regional organizations have staged an increasingly more active internal shift in matters related to peace and security, encouraged by the idea of promoting “African solutions to African problems”. This new scenario, has been accompanied by new uncertainties at the security level and major challenges at the operational level, especially for the African Union. This article aims to ascertain the state of affairs on all these issues and raise some key questions to consider.
Resumo:
Network airlines have been increasingly focusing their operations on hub airports through the exploitation of connecting traffic, allowing them to take advantage of economies of traffic density, which are unequivocal in the airline industry. Less attention has been devoted to airlines? decisions on point-to-point thin routes, which could be served using different aircraft technologies and different business models. This paper examines, both theoretically and empirically, the impact on airlines ?networks of the two major innovations in the airline industry in the last two decades: the regional jet technology and the low-cost business model. We show that, under certain circumstances, direct services on point-to-point thin routes can be viable and thus airlines may be interested in deviating passengers out of the hub.
Resumo:
Tal i com estableix la Carta de les Nacions Unides, el Consell de Seguretat determina l’existència d’una amenaça a la pau, un trencament de la pau o un acte d’agressió i decideix les mesures que han de fer-se servir per restaurar la pau i seguretat internacionals, també l’ús de la força. L’objectiu d’aquest article és explorar la legitimitat d’aquest ús de la força. Amb aquest objectiu, el text parteix d’una definició centrada en les seves dimensions legal, normativa i social. En segon lloc, s’analitzarà com aquestes dimensions estan representades als debats del Consell de Seguretat de la guerra d’Irak de 2003, un dels usos de la força més controvertits i que més debat ha generat als darrers anys. Finalment, l’anàlisi proposat permet treure algunes conclusions sobre les bases canviants de la legitimitat de l’ús de la força.
Resumo:
Avui en dia, estem assistint a una expansió de la tecnologia d’agents mòbils i noves aplicacions basades en aquesta s’estan obrint pas constantment. Les aplicacions han de demostrar la seva viabilitat sobretot en entorns heterogenis i complexos com les xarxes MANET. En aquest projecte es desenvolupa un sistema per simular el comportament dels agents mòbils, ampliant l’actual simulador de xarxa NS2, i també es comprova la viabilitat de l’implementació de l’ETTMA pel triatge de víctimes en situacions d’emergència.
Resumo:
Network airlines have been increasingly focusing their operations on hub airports through the exploitation of connecting traffic, allowing them to take advantage of economies of traffic density, which are unequivocal in the airline industry. Less attention has been devoted to airlines' decisions on point-to-point thin routes, which could be served using different aircraft technologies and different business models. This paper examines, both theoretically and empirically, the impact on airlines' networks of the two major innovations in the airline industry in the last two decades: the regional jet technology and the low-cost business model. We show that, under certain circumstances, direct services on point-to-point thin routes can be viable and thus airlines may be interested in deviating passengers out of the hub. Keywords: regional jet technology; low-cost business model; point-to-point network; hub-and-spoke network JEL Classi…fication Numbers: L13; L2; L93
Resumo:
We use a difference-in-difference estimator to examine the effects of a merger involving three airlines. The novelty lies in the examination of this operation in two distinct scenarios: (1) on routes where two low-cost carriers and (2) on routes where a network and one of the low-cost airlines had previously been competing. We report a reduction in frequencies but no substantial effect on prices in the first scenario, while in the second we report an increase in prices but no substantial effect on frequencies. These results may be attributed to the differences in passenger types flying on these routes.
Neonatal dexamethasone induces premature microvascular maturation of the alveolar capillary network.
Resumo:
Postnatal glucocorticoid treatment of preterm infants was mimicked by treating newborn rats with dexamethasone (0.1-0.01 microg/g, days 1-4). This regimen has been shown to cause delayed alveolarization. Knowing that microvascular maturation (transformation of double- to single-layered capillary networks in alveolar septa) and septal thinning prevent further alveolarization, we measured septal maturation on electron photomicrographs in treated and control animals. In treated rats and before day 10, we observed a premature nonreversing microvascular maturation and a transient septal thinning, which both appeared focally. In vascular casts of both groups, we observed contacts between the two capillary layers of immature alveolar septa, which were predictive for capillary fusions. Studying serial electron microscopic sections of human lungs, we were able to confirm the postulated fusion process for the first time. We conclude that alveolar microvascular maturation indeed occurs by capillary fusion and that the dexamethasone-induced impairment of alveolarization is associated with focal premature capillary fusion.
Resumo:
Aim: The study aims to describe the activities of the Swiss Early Psychosis Project (SWEPP) which was founded in 1999 as a national network to further and disseminate knowledge on early psychosis (EP) and to enhance collaboration between healthcare groups. Methods: The present paper is a detailed account of the initiation and the development of the Swiss network. We describe all activities such as the several educational campaigns that were addressed to primary and secondary care groups since the early days. We also provide an overview of the current status of EP services throughout the country. Results: Today, most regions in Switzerland provide specialized EP inpatient and/or outpatient services with a clinical or combined clinical research approach that targets at-risk and/or first-episode populations. Some more recently initiated EP services have been launched as collaborative models between several local or regional psychiatric services. Conclusions: The increasing number of EP services and experts in Switzerland may mirror the catalyzing contribution of the Swiss Early Psychosis Project in this important field of health care. The country's small size and the increasing density of specialized services provide excellent bases for larger-scale networking activities in the future, both in clinical and research areas.
Resumo:
In the recent years most libraries have focused on mass digitization programs and keeping electronic born documents, showing and organizing them in a repository. While those repositories have evolved to a much more manageable systems focusing on the user expectations and introducing web 2.0 tools, digital preservation is still in the to-do list of most of them. There is quite a lot of studies focused on preservation and some complex models exist, unfortunately, very few practical systems are running and its quite difficult for a library to get involved in a solution already tested by others. The CBUC (Consortium of University Catalan Libraries) runs TDX, an ETD repository now keeping more than 10.000 full text thesis from any of the 12 university members. After 10 years running TDX a solid preservation system was needed to ensure every thesis would be kept as it was regardless what happens to the repository. The perfect solution was found in the MetaArchive cooperative, this is the effort of many insitutions to keep a copy of each other content through a newtwork using the LOCKSS software as a mechanism to keep track of any change. The presentation will shortly introduce what TDX and MetaArchive is but will, in a practical way, show how the LOCKSS network for presrervation works. Finally a summary of the benefits of the overall experience will be shown.
Resumo:
Since the early nineties, several hundreds of Chinese immigrants have settled in what has become known as the 'Chinese wholesalers area'. For the past two years, Chinese wholesalers in Aubervilliers have been calling on public authorities to address the problem of street robberies and violent thefts, which they experience on a daily basis. Yet, they have been encouraged by the authorities to ensure their own protection, by - amongst other things - installing surveillance cameras to film the streets. This is illegal according to French legislation on camera surveillance. Knowing this, why have surveillance cameras been adopted as a solution? This question guides the ethnographic analysis presented here of a situation where the installation of surveillance cameras was locally negotiated by the main actors involved - namely, the wholesalers' representatives and the police.
Resumo:
Accumulating evidence suggests that changes in the metabolic signature of astrocytes underlie their response to neuroinflammation, but how proinflammatory stimuli induce these changes is poorly understood. By monitoring astrocytes following acute cortical injury, we identified a differential and region-specific remodeling of their mitochondrial network: while astrocytes within the penumbra of the lesion undergo mitochondrial elongation, those located in the core-the area invaded by proinflammatory cells-experience transient mitochondrial fragmentation. In brain slices, proinflammatory stimuli reproduced localized changes in mitochondrial dynamics, favoring fission over fusion. This effect was triggered by Drp1 phosphorylation and ultimately resulted in reduced respiratory capacity. Furthermore, maintenance of the mitochondrial architecture critically depended on the induction of autophagy. Deletion of Atg7, required for autophagosome formation, prevented the reestablishment of tubular mitochondria, leading to marked reactive oxygen species accumulation and cell death. Thus, our data reveal autophagy to be essential for regenerating astrocyte mitochondrial networks during inflammation.
Resumo:
MOTIVATION: Combinatorial interactions of transcription factors with cis-regulatory elements control the dynamic progression through successive cellular states and thus underpin all metazoan development. The construction of network models of cis-regulatory elements, therefore, has the potential to generate fundamental insights into cellular fate and differentiation. Haematopoiesis has long served as a model system to study mammalian differentiation, yet modelling based on experimentally informed cis-regulatory interactions has so far been restricted to pairs of interacting factors. Here, we have generated a Boolean network model based on detailed cis-regulatory functional data connecting 11 haematopoietic stem/progenitor cell (HSPC) regulator genes. RESULTS: Despite its apparent simplicity, the model exhibits surprisingly complex behaviour that we charted using strongly connected components and shortest-path analysis in its Boolean state space. This analysis of our model predicts that HSPCs display heterogeneous expression patterns and possess many intermediate states that can act as 'stepping stones' for the HSPC to achieve a final differentiated state. Importantly, an external perturbation or 'trigger' is required to exit the stem cell state, with distinct triggers characterizing maturation into the various different lineages. By focusing on intermediate states occurring during erythrocyte differentiation, from our model we predicted a novel negative regulation of Fli1 by Gata1, which we confirmed experimentally thus validating our model. In conclusion, we demonstrate that an advanced mammalian regulatory network model based on experimentally validated cis-regulatory interactions has allowed us to make novel, experimentally testable hypotheses about transcriptional mechanisms that control differentiation of mammalian stem cells. SUPPLEMENTARY INFORMATION: Supplementary data are available at Bioinformatics online.