966 resultados para Seguretat inform


Relevância:

10.00% 10.00%

Publicador:

Resumo:

El correu electrònic ha esdevingut una eina molt important per a la societat i crítica per a molts negocis. Amb la proliferació dels proveïdors de correu gratuït a la web, hom pot accedir fàcilment al correu des de qualsevol lloc, fins i tot seguir accedint-hi amb les eines de sempre. Així, moltes empreses i particulars han deixat de tenir serveis de correu propis i han passat a utilitzar el que ofereixen d'altres proveïdors. Però què passa amb les còpies de seguretat del correu? Quins proveïdors ofereixen recuperar correus esborrats? En quines condicions? Durant quant de temps guarden les còpies de seguretat? Què passa si el proveïdor deixa d'oferir el servei? Amb backimap hom pot recuperar el control de les còpies de seguretat del correu i romandre una mica més tranquil.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Trabajo Final de Carrera en desarrollo .NET: Aplicación web ASP.NET MVC cliente de correo electrónico con cifrado PGP y servicio web WCF que brinda funcionalidades de cifrado PGP.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

La finalidad de este proyecto es la creación de un nuevo software para la gestión de las fichas personales en las parroquias, facilitando el acceso a estos datos para cualquier usuario y su actualización. Se pretende que aquestainformació deje de estar únicamente conservada en papeles para pasar a estar guardada en una base de datos y teniendo así la opción de guardar copias de seguridad. El sistema a desarrollar lo hará con tecnología J2EE.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dokuwiki es un wiki de uso sencillo y compatible con los estándares, orientado a crear documentación de cualquier tipo dentro de grupos de desarrolladores, grupos de trabajo y pequeñas empresas. Su sintaxis simple y potente facilita la creación de textos estructurados, permitiendo que los archivos generados sean legibles incluso fuera del wiki. Todos los datos se almacenan en archivos de texto plano, y no necesita de ninguna base de datos para su funcionamiento. La autenticación de usuarios es sencilla. El módulo desarrollado permite integrar DokuWiki con una infraestructura de autenticación y autorización basada en PAPI.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Este proyecto consiste en realizar un estudio sobre el protocolo IPv6 enfocado a la seguridad y realizar unas pruebas prácticas para poder intentar vulnerar el sistema de alguna manera mediante un software libre (Scapy).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Esta memoria parte del estudio de la teoría de las Relaciones Internacionales, seguido de un análisis del regionalismo en el Este asiático, así como del multilateralismo y del minilateralismo como modus operandi en las relaciones internacionales y su desarrollo específico en el Noreste asiático, o Asia oriental. Todo ello se ha examinado con el fin de poder aprehender la dinámica internacional de la segunda crisis nuclear con Corea del Norte, así como proveer con un mayor entendimiento sobre las conversaciones a seis bandas (6PT), como ejemplo de foro de negociación minilateral creado ad hoc con el fin de buscar una solución al problema norcoreano. Hemos procedido al examen del pensamiento estratégico de los diferentes países que conforman las 6PT, así como al estudio de los intereses, acuerdos y desacuerdos de cada uno de ellos en la mesa de negociaciones con el objetivo de intentar comprender el porqué de su aparente fracaso a la hora de solucionar dicha crisis nuclear. Finalmente, hemos procedido a un estudio de la comunidad del Noreste asiático y del marco de seguridad existente en la región, así como de las perspectivas para la institucionalización de las conversaciones a seis bandas para poder comprender si, desarrollado como organización multilateral, este foro podría favorecer la estabilidad en la región, la cooperación regional y con ello una mayor integración.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Treball d'investigació que ha consistit a analitzar si, prenent com a base els acords de seguretat entre el Japó i els Estats Units, en cas que actualment esclatés un conflicte armat entre Taiwan i la Xina (independentment de qui en sigui el responsable), i els Estats Units intervinguessin en defensa o ajuda de Taiwan, el Japó estaria jurídicament obligat a oferir la seva col·laboració al país nord-americà.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Aquest estudi observacional transversal pretén analitzar la presència dels continguts antivacunes tipificats a l'article de Zimmerman et al. (2005) en els portals web que defensen aquestes postures. Del total de 16 pàgines web localitzades, la mitja del nombre de ítems avaluats que van aparèixer en cadascuna de les pàgines va ser 16,75 ± 5,7 (rang 9-27), destacant per damunt de tots l'ítem risc de malalties/seguretat de les vacunes" que hi apareix en totes les pàgines. També s'ha constatat que les pàgines web antivacunes al·leguen errades en les vacunes i greus violacions ètiques, incloent l'encobriment, conspiració, i violacions de llibertats civils.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Open educational resource (OER) initiatives have made the shift from being a fringe activity to one that is increasingly considered as a key component in both teaching and learning in higher education and in the fulfilment of universities' mission and goals. Although the reduction in the cost of materials is often cited as a potential benefit of OER, this potential benefit has not yet been realised in practice necessitating thoughtful consideration of various strategies for new OER initiatives such as the OpenContent directory at the University of Cape Town (UCT) in South Africa.This paper reviews the range of sustainability strategies mentioned in the literature, plots the results of a small-scale OER sustainability survey against these strategies and explains how these findings and other papers on OER initiatives were used to inform an in-house workshop at UCT to deliberate the future strategy for the sustainability of OER at UCT.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The role of ecology in the evolution and maintenance of arthropod sociality has received increasing research attention in recent years. In some organisms, such as halictine bees, polistine wasps, and social spiders, researchers are investigating the environmental factors that may contribute to high levels of variation in the degree of sociality exhibited both among and within species. Within lineages that include only eusocial members, such as ants and termites, studies focus more on identifying extrinsic factors that may contribute to the dramatic variation in colony size, number of queens, and division of labour that is evident across these species. In this review, I propose a comparative approach that seeks to identify environmental factors that may have a common influence across such divergent social arthropod groups. I suggest that seeking common biogeographic patterns in the distribution of social systems or key social traits may help us to identify ecological factors that play a common role in shaping the evolution of sociality across different organisms. I first review previous studies of social gradients that form along latitudinal and altitudinal axes. Within families and within species, many organisms show an increasing degree of sociality at lower latitudes and altitudes. In a smaller number of cases, organisms form larger groups or found nests cooperatively at higher latitudes and altitudes. I then describe several environmental factors that vary consistently along such gradients, including climate variables and abundance of predators, and outline their proposed role in the social systems of terrestrial arthropods. Finally, I map distributions of a social trait against several climatic factors in five case studies to demonstrate how future comparative studies could inform empirical research.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

OBJECTIVE: To explore the potential of deep HIV-1 sequencing for adding clinically relevant information relative to viral population sequencing in heavily pre-treated HIV-1-infected subjects. METHODS: In a proof-of-concept study, deep sequencing was compared to population sequencing in HIV-1-infected individuals with previous triple-class virological failure who also developed virologic failure to deep salvage therapy including, at least, darunavir, tipranavir, etravirine or raltegravir. Viral susceptibility was inferred before salvage therapy initiation and at virological failure using deep and population sequencing genotypes interpreted with the HIVdb, Rega and ANRS algorithms. The threshold level for mutant detection with deep sequencing was 1%. RESULTS: 7 subjects with previous exposure to a median of 15 antiretrovirals during a median of 13 years were included. Deep salvage therapy included darunavir, tipranavir, etravirine or raltegravir in 4, 2, 2 and 5 subjects, respectively. Self-reported treatment adherence was adequate in 4 and partial in 2; one individual underwent treatment interruption during follow-up. Deep sequencing detected all mutations found by population sequencing and identified additional resistance mutations in all but one individual, predominantly after virological failure to deep salvage therapy. Additional genotypic information led to consistent decreases in predicted susceptibility to etravirine, efavirenz, nucleoside reverse transcriptase inhibitors and indinavir in 2, 1, 2 and 1 subject, respectively. Deep sequencing data did not consistently modify the susceptibility predictions achieved with population sequencing for darunavir, tipranavir or raltegravir. CONCLUSIONS: In this subset of heavily pre-treated individuals, deep sequencing improved the assessment of genotypic resistance to etravirine, but did not consistently provide additional information on darunavir, tipranavir or raltegravir susceptibility. These data may inform the design of future studies addressing the clinical value of minority drug-resistant variants in treatment-experienced subjects.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Internet is a fundamental part of the daily life of adolescents, they consider it as a safe and confidential source of information on health matters. The aims is to describe the experience of Spanish adolescents searching for health information on the Internet. Methods A cross-sectional study of 811 school-age adolescents in Granada was carried out. An adapted and piloted questionnaire was used which was controlled by trained personnel. Sociodemographic and health variables were included together with those concerning the conditions governing access to and use of information and communication technologies (ICT). Results 811 adolescents were surveyed (99.38% response rate), mean age was 17 years old. Of these, 88% used the Internet; 57.5% used it on a daily or weekly basis and 38.7% used it occasionally. Nearly half the sample group (55.7%) stated that they used the Internet to search for health-related information. The main problems reported in the search for e-health were the ignorance of good web pages (54.8%) and the lack of confidence or search skills (23.2%). Conclusions In conclusion, it seems plausible to claim that websites designed and managed by health services should have a predominant position among interventions specifically addressed to young people.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Although the genome of Trypanosoma cruzi has been completely sequenced, little is known about its population structure and evolution. Since 1999, two major evolutionary lineages presenting distinct epidemiological characteristics have been recognised: T. cruzi I and T. cruzi II. We describe new and important aspects of the population structure of the parasite, and unequivocally characterise a third ancestral lineage that we propose to name T. cruzi III. Through a careful analysis of haplotypes (blocks of genes that are stably transmitted from generation to generation of the parasite), we inferred at least two hybridisation events between the parental lineages T. cruzi II and T. cruzi III. The strain CL Brener, whose genome was sequenced, is one such hybrid. Based on these results, we propose a simple evolutionary model based on three ancestral genomes, T. cruzi I, T. cruzi II and T. cruzi III. At least two hybridisation events produced evolutionarily viable progeny, and T. cruzi III was the cytoplasmic donor for the resulting offspring (as identified by the mitochondrial clade of the hybrid strains) in both events. This model should be useful to inform evolutionary and pathogenetic hypotheses regarding T. cruzi.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we define a new scheme to develop and evaluate protection strategies for building reliable GMPLS networks. This is based on what we have called the network protection degree (NPD). The NPD consists of an a priori evaluation, the failure sensibility degree (FSD), which provides the failure probability, and an a posteriori evaluation, the failure impact degree (FID), which determines the impact on the network in case of failure, in terms of packet loss and recovery time. Having mathematical formulated these components, experimental results demonstrate the benefits of the utilization of the NPD, when used to enhance some current QoS routing algorithms in order to offer a certain degree of protection

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, a method for enhancing current QoS routing methods by means of QoS protection is presented. In an MPLS network, the segments (links) to be protected are predefined and an LSP request involves, apart from establishing a working path, creating a specific type of backup path (local, reverse or global). Different QoS parameters, such as network load balancing, resource optimization and minimization of LSP request rejection should be considered. QoS protection is defined as a function of QoS parameters, such as packet loss, restoration time, and resource optimization. A framework to add QoS protection to many of the current QoS routing algorithms is introduced. A backup decision module to select the most suitable protection method is formulated and different case studies are analyzed