965 resultados para File-to-File


Relevância:

50.00% 50.00%

Publicador:

Resumo:

The discourse surrounding the virtual has moved away from the utopian thinking accompanying the rise of the Internet in the 1990s. The Cyber-gurus of the last decades promised a technotopia removed from materiality and the confines of the flesh and the built environment, a liberation from old institutions and power structures. But since then, the virtual has grown into a distinct yet related sphere of cultural and political production that both parallels and occasionally flows over into the old world of material objects. The strict dichotomy of matter and digital purity has been replaced more recently with a more complex model where both the world of stuff and the world of knowledge support, resist and at the same time contain each other. Online social networks amplify and extend existing ones; other cultural interfaces like youtube have not replaced the communal experience of watching moving images in a semi-public space (the cinema) or the semi-private space (the family living room). Rather the experience of viewing is very much about sharing and communicating, offering interpretations and comments. Many of the web’s strongest entities (Amazon, eBay, Gumtree etc.) sit exactly at this juncture of applying tools taken from the knowledge management industry to organize the chaos of the material world along (post-)Fordist rationality. Since the early 1990s there have been many artistic and curatorial attempts to use the Internet as a platform of producing and exhibiting art, but a lot of these were reluctant to let go of the fantasy of digital freedom. Storage Room collapses the binary opposition of real and virtual space by using online data storage as a conduit for IRL art production. The artworks here will not be available for viewing online in a 'screen' environment but only as part of a downloadable package with the intention that the exhibition could be displayed (in a physical space) by any interested party and realised as ambitiously or minimally as the downloader wishes, based on their means. The artists will therefore also supply a set of instructions for the physical installation of the work alongside the digital files. In response to this curatorial initiative, File Transfer Protocol invites seven UK based artists to produce digital art for a physical environment, addressing the intersection between the virtual and the material. The files range from sound, video, digital prints and net art, blueprints for an action to take place, something to be made, a conceptual text piece, etc. About the works and artists: Polly Fibre is the pseudonym of London-based artist Christine Ellison. Ellison creates live music using domestic devices such as sewing machines, irons and slide projectors. Her costumes and stage sets propose a physical manifestation of the virtual space that is created inside software like Photoshop. For this exhibition, Polly Fibre invites the audience to create a musical composition using a pair of amplified scissors and a turntable. http://www.pollyfibre.com John Russell, a founding member of 1990s art group Bank, is an artist, curator and writer who explores in his work the contemporary political conditions of the work of art. In his digital print, Russell collages together visual representations of abstract philosophical ideas and transforms them into a post apocalyptic landscape that is complex and banal at the same time. www.john-russell.org The work of Bristol based artist Jem Nobel opens up a dialogue between the contemporary and the legacy of 20th century conceptual art around questions of collectivism and participation, authorship and individualism. His print SPACE concretizes the representation of the most common piece of Unicode: the vacant space between words. In this way, the gap itself turns from invisible cipher to sign. www.jemnoble.com Annabel Frearson is rewriting Mary Shelley's Frankenstein using all and only the words from the original text. Frankenstein 2, or the Monster of Main Stream, is read in parts by different performers, embodying the psychotic character of the protagonist, a mongrel hybrid of used language. www.annabelfrearson.com Darren Banks uses fragments of effect laden Holywood films to create an impossible space. The fictitious parts don't add up to a convincing material reality, leaving the viewer with a failed amalgamation of simulations of sophisticated technologies. www.darrenbanks.co.uk FIELDCLUB is collaboration between artist Paul Chaney and researcher Kenna Hernly. Chaney and Hernly developed together a project that critically examines various proposals for the management of sustainable ecological systems. Their FIELDMACHINE invites the public to design an ideal agricultural field. By playing with different types of crops that are found in the south west of England, it is possible for the user, for example, to create a balanced, but protein poor, diet or to simply decide to 'get rid' of half the population. The meeting point of the Platonic field and it physical consequences, generates a geometric abstraction that investigates the relationship between modernist utopianism and contemporary actuality. www.fieldclub.co.uk Pil and Galia Kollectiv, who have also curated the exhibition are London-based artists and run the xero, kline & coma gallery. Here they present a dialogue between two computers. The conversation opens with a simple text book problem in business studies. But gradually the language, mimicking the application of game theory in the business sector, becomes more abstract. The two interlocutors become adversaries trapped forever in a competition without winners. www.kollectiv.co.uk

Relevância:

50.00% 50.00%

Publicador:

Resumo:

P>AimTo compare the efficacy of different digital radiographic imaging systems for determining the length of endodontic files.MethodologyK-type endodontic files were introduced into the canals of 40 extracted human permanent single-rooted teeth and fixed in place at random lengths. The teeth were radiographed using Digora Optime (R), CygnusRay MPS (R) and CDR Wireless (R) digital imaging systems. Six observers measured every file length in all the images and repeated this procedure in 50% of the image samples, and assigned a score to the level of difficulty found. Analysis of variance for differences between digital systems and Tukey's test were performed. The level of intraobserver agreement was measured by intraclass correlation. The assigned scores were evaluated by Kruskal-Wallis and Dunn's tests.ResultsThe CDR Wireless values did not differ significantly from the actual lengths and the CygnusRay MPS values. The Digora Optime system was significantly different from the others and overestimated the values (P < 0.05). The Digora Optime was significantly easier to use for taking measurements and the CygnusRay MPS the most difficult (P < 0.05). All digital radiographic imaging systems showed excellent agreement with the Intraclass Correlation Coefficient > 0.95.ConclusionsThe three digital radiographic imaging systems were precise. The CDR Wireless system was significantly more accurate in determining endodontic file lengths, and similarly to Digora Optime, was considered the least difficult to use when assessing endodontic file lengths.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)

Relevância:

50.00% 50.00%

Publicador:

Resumo:

In order to simplify computer management, several system administrators are adopting advanced techniques to manage software configuration of enterprise computer networks, but the tight coupling between hardware and software makes every PC an individual managed entity, lowering the scalability and increasing the costs to manage hundreds or thousands of PCs. Virtualization is an established technology, however its use is been more focused on server consolidation and virtual desktop infrastructure, not for managing distributed computers over a network. This paper discusses the feasibility of the Distributed Virtual Machine Environment, a new approach for enterprise computer management that combines virtualization and distributed system architecture as the basis of the management architecture. © 2008 IEEE.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

Objective: The goal of this study was to evaluate the efficacy of the Self-Adjusting File (SAF) and ProTaper for removing calcium hydroxide [Ca(OH)2] from root canals. Material And Methods: Thirty-six human mandibular incisors were instrumented with the ProTaper system up to instrument F2 and filled with a Ca(OH)2-based dressing. After 7 days, specimens were distributed in two groups (n=15) according to the method of Ca(OH)2 removal. Group I (SAF) was irrigated with 5 mL of NaOCl and SAF was used for 30 seconds under constant irrigation with 5 mL of NaOCl using the Vatea irrigation device, followed by irrigation with 3 mL of EDTA and 5 mL of NaOCl. Group II (ProTaper) was irrigated with 5 mL of NaOCl, the F2 instrument was used for 30 seconds, followed by irrigation with 5 mL of NaOCl, 3 mL of EDTA, and 5 mL of NaOCl. In 3 teeth Ca(OH)2 was not removed (positive control) and in 3 teeth canals were not filled with Ca(OH)2 (negative control). Teeth were sectioned and prepared for the scanning electron microscopy. The amounts of residual Ca(OH)2 were evaluated in the middle and apical thirds using a 5-score system. Results: None of the techniques completely removed the Ca(OH)2 dressing. No difference was observed between SAF and ProTaper in removing Ca(OH)2 in the middle (P=0.11) and the apical (P=0.23) thirds. Conclusion: The SAF system showed similar efficacy to rotary instrument for removal of Ca(OH)2 from mandibular incisor root canals.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

As compared with continuous rotary systems, reciprocating motion is believed to increase the fatigue resistance of NiTi instruments. We compared the cyclic fatigue and torsional resistance of reciprocating single-file systems and continuous rotary instrumentation systems in simulated root canals. Eighty instruments from the ProTaper Universal, WaveOne, MTwo, and Reciproc systems (n = 20) were submitted to dynamic bending testing in stainless-steel simulated curved canals. Axial displacement of the simulated canals was performed with half of the instruments (n = 10), with back-and-forth movements in a range of 1.5 mm. Time until fracture was recorded, and the number of cycles until instrument fracture was calculated. Cyclic fatigue resistance was greater for reciprocating systems than for rotary systems (P < 0.05). Instruments from the Reciproc and WaveOne systems significantly differed only when axial displacement occurred (P < 0.05). Instruments of the ProTaper Universal and MTwo systems did not significantly differ (P > 0.05). Cyclic fatigue and torsional resistance were greater for reciprocating systems than for continuous rotary systems, irrespective of axial displacement.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

The social networks on the internet have experienced rapid growth and joined millions of users in Brazil and throughout the world. Such networks allow groups of people to communicate and exchange information. Sharing information in files is also a growing activity on the internet and is done in various ways. However, applications are not yet available to enable file sharing on Facebook, the premier social network today. This study aims to investigate how users use Facebook, and their practices for file sharing. Due to the experimental nature of this research, we opted for a data collection survey, applied over the web. From the data analysis, we have found a frequent use of file sharing, but no interest in paid services. As for Facebook, there was an extensive use of applications. The set of results shows a favourable scenario for applications that allow file sharing on Facebook.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

A home filing system makes important papers readily available when needed. If managed properly, the filing system can get older papers out of the way, making needed records more accessible. A well-organized filing system for your household can pay big dividends when it comes time to find an important paper you need NOW. There is no one best filing system for everyone; what works for you could be a disaster for someone else. Once set up, a filing system helps you to be a more effective and efficient financial manager and decision maker.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

Objective: This ex vivo study evaluated the effect of pre-flaring and file size on the accuracy of the Root ZX and Novapex electronic apex locators (EALs). Material and methods: The actual working length (WL) was set 1 mm short of the apical foramen in the palatal root canals of 24 extracted maxillary molars. The teeth were embedded in an alginate mold, and two examiners performed the electronic measurements using #10, #15, and #20 K-files. The files were inserted into the root canals until the "0.0" or "APEX" signals were observed on the LED or display screens for the Novapex and Root ZX, respectively, retracting to the 1.0 mark. The measurements were repeated after the pre-flaring using the S1 and SX Pro-Taper instruments. Two measurements were performed for each condition and the means were used. Intra-class correlation coefficients (ICCs) were calculated to verify the intra-and inter-examiner agreement. The mean differences between the WL and electronic length values were analyzed by the three-way ANOVA test (p<0.05). Results: ICCs were high (>0.8) and the results demonstrated a similar accuracy for both EALs (p>0.05). Statistically significant accurate measurements were verified in the pre-flared canals, except for the Novapex using a #20 K-file. Conclusions: The tested EALs showed acceptable accuracy, whereas the pre-flaring procedure revealed a more significant effect than the used file size.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

Since instrumentation of the apical foramen has been suggested for cleaning and disinfection of the cemental canal, selection of the file size and position of the apical foramen have challenging steps. This study analyzed the influence of apical foramen lateral opening and file size can exert on cemental canal instrumentation. Thirty-four human maxillary central incisors were divided in two groups: Group 1 (n=17), without flaring, and Group 2 (n=17), with flaring with LA Axxess burs. K-files of increasing diameters were progressively inserted into the canal until binding at the apical foramen was achieved and tips were visible and bonded with ethyl cyanoacrylate adhesive. Roots/files set were cross-sectioned 5 mm from the apex. Apices were examined by scanning electron microscopy at ×140 and digital images were captured. Data were analyzed statistically by Student’s t test and Fisher’s exact test at 5% significance level. SEM micrographs showed that 19 (56%) apical foramina emerged laterally to the root apex, whereas 15 (44%) coincided with it. Significantly more difficulty to reach the apical foramen was noted in Group 2. Results suggest that the larger the foraminal file size, the more difficult the apical foramen instrumentation may be in laterally emerged cemental canals.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

PURPOSE: The aim of this study was to investigate the influence of cervical preflaring in determining the initial apical file (IAF) in the palatal roots of maxillary molars, and to determine the morphologic shape of the canal 1 mm short of the apex. METHODS: After preparing standard access cavities the group 1 received the IAF without cervical preflaring (WCP). In groups 2 to 5, preflaring was performed with Gates-Glidden (GG), Anatomic Endodontics Technology (AET), GT Rotary Files (GT) and LA Axxes (LA), respectively. Each canal was sized using manual K-files, starting with size 08 files, and making passive movements until the WL was reached. File sizes were increased until a binding sensation was felt at the WL. The IAF area and the area of the root canal were measured to verify the percentage occupied by the IAF inside the canal in each sample by SEM. The morphologic shape of the root canal was classified as circular, oval or flattened. Statistical analysis was performed by ANOVA/Tukey test (P < 0.05). RESULTS: The decreasing percentages occupied by the IAF inside the canal were: LA>GT=AET>GG>WCP. The morphologic shape was predominantly oval. CONCLUSION: The type of cervical preflaring used interferes in the determination of IAF.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

Project-based education and portfolio assessments are at the forefront of educational research. This research follows the implementation of a project-based unit in a high school physics class. Students played the role of an engineering firm who designed, built and tested file folder bridges. The purpose was to determine if projectbased learning could improve student attitude toward science and related careers like engineering. Teams of students presented their work in a portfolio for a final assessment of the process of designing, building and testing their bridges.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

File system security is fundamental to the security of UNIX and Linux systems since in these systems almost everything is in the form of a file. To protect the system files and other sensitive user files from unauthorized accesses, certain security schemes are chosen and used by different organizations in their computer systems. A file system security model provides a formal description of a protection system. Each security model is associated with specified security policies which focus on one or more of the security principles: confidentiality, integrity and availability. The security policy is not only about “who” can access an object, but also about “how” a subject can access an object. To enforce the security policies, each access request is checked against the specified policies to decide whether it is allowed or rejected. The current protection schemes in UNIX/Linux systems focus on the access control. Besides the basic access control scheme of the system itself, which includes permission bits, setuid and seteuid mechanism and the root, there are other protection models, such as Capabilities, Domain Type Enforcement (DTE) and Role-Based Access Control (RBAC), supported and used in certain organizations. These models protect the confidentiality of the data directly. The integrity of the data is protected indirectly by only allowing trusted users to operate on the objects. The access control decisions of these models depend on either the identity of the user or the attributes of the process the user can execute, and the attributes of the objects. Adoption of these sophisticated models has been slow; this is likely due to the enormous complexity of specifying controls over a large file system and the need for system administrators to learn a new paradigm for file protection. We propose a new security model: file system firewall. It is an adoption of the familiar network firewall protection model, used to control the data that flows between networked computers, toward file system protection. This model can support decisions of access control based on any system generated attributes about the access requests, e.g., time of day. The access control decisions are not on one entity, such as the account in traditional discretionary access control or the domain name in DTE. In file system firewall, the access decisions are made upon situations on multiple entities. A situation is programmable with predicates on the attributes of subject, object and the system. File system firewall specifies the appropriate actions on these situations. We implemented the prototype of file system firewall on SUSE Linux. Preliminary results of performance tests on the prototype indicate that the runtime overhead is acceptable. We compared file system firewall with TE in SELinux to show that firewall model can accommodate many other access control models. Finally, we show the ease of use of firewall model. When firewall system is restricted to specified part of the system, all the other resources are not affected. This enables a relatively smooth adoption. This fact and that it is a familiar model to system administrators will facilitate adoption and correct use. The user study we conducted on traditional UNIX access control, SELinux and file system firewall confirmed that. The beginner users found it easier to use and faster to learn then traditional UNIX access control scheme and SELinux.