999 resultados para Site security
Resumo:
Elektroninen kaupankäynti ja pankkipalvelut ovat herättäneet toiminnan jatkuvuuden kannalta erittäin kriittisen kysymyksen siitä, kuinka näitä palveluja pystytään suojaamaan järjestäytynyttä rikollisuutta ja erilaisia hyväksikäyttöjä vastaan.
Resumo:
Les lymphocytes T CD4+ sont connus pour leur potentiel d'acquisition de fragments membraneux de cellules présentatrices d'antigène (CPA) dans un processus nommé trogocytose. Ce phénomène est observé lors de l'interaction entre le lymphocyte T CD4+ antigène-spécifique et la CPA lors de la présentation de l'antigène en question, et dépend donc de la spécificité du lymphocyte T CD4+. L'identification des lymphocytes T CD4+ sujets à la trogocytose en co-culture avec des CPA chargées d'un antigène connu permet d'enrichir des lymphocytes T antigène-spécifiques sans connaître leur spécificité exacte ou leur profil de production de cytokines. Dans cette étude, nous avons donc cherché à évaluer l'utilité de cette méthode dans l'identification de la spécificité des lymphocytes T effecteurs et régulateurs lors de l'inflammation auto-immune avec des spécificités souvent inconnues. La trogocytose a démontré son efficacité dans la détection de lymphocytes T réactifs à la protéine basique de myéline in vitro ainsi qu'ex vivo après immunisation. Cependant, le potentiel de la trogocytose à identifier des lymphocytes T régulateurs antigène-spécifiques est limité par le fait que les lymphocytes T régulateurs Foxp3+ montrent un taux élevé de manière constitutive de trogocytose comparé aux lymphocytes T Foxp3-, Un taux localement élevé de trogocytose lors d'un état inflammatoire (observé au niveau des lymphocytes T effecteurs et régulateurs isolés du système nerveux central enflammé) empêche l'utilisation de la trogocytose dans l'évaluation de la réactivité antigénique de cellules extraites d'un site inflammatoire. Nos résultats montrent la possibilité d'enrichir des lymphocytes T conventionnels antigène- réactifs en périphérie par détection au moyen de la trogocytose. Nous avons aussi montré les limitations de cette méthode dans sa capacité d'identifier des lymphocytes T effecteurs et régulateurs antigène- réactifs extraits de sites inflammatoires. Le potentiel de trogocytose élevé dans les sites d'inflammation soulève la question de la signification biologique de ce phénomène dans l'inflammation, dans la suppression médiée par les lymphocytes T régulateurs et dans le maintien de la tolérance immunologique dans des états de santé variables.
Resumo:
During October 23rd and 24th and November 2012 we collected a sample of drosophilids at Font Groga (Barcelona). This site is located on the foothills of the Tibidabo mountain, which is located on the northwest edge of Barcelona and at approximately 400m above sea level. The vegetation is typical for the area, and it is mainly composed of a sparse pine forest (Pinus pinea) with some oaks (Quercus ilex) and Mediterranean brushwood. Flies were netted over 12 baits containing fermenting bananas. A large proportion of D. simulans males was found. The invasive species D. suzukii (Calabria et al. 2010; Cini et al. 2012) was detected in a non-negligible quantity. Taking into account the number of males and females, the estimated Ne for D. suzukii in the Font Groga sample was 33.70. A similar value was obtained for D. subobscura (34.97). Finally, in the study of species diversity the values obtained for H" (Shannon diversity index) and J (Shannon uniformity index) were 0.678 and 0.421, respectively. These estimates are very similar to those obtained in September 2009 in Montpellier by Calabria (2012), who reported H" = 0.679 and J = 0.422, but differ from those reported by the same author in a Font Groga sample of October 2007 (H" = 0.904 and J = 0.505).
Resumo:
Tutkimuksen tavoitteena oli muodostaa viitekehys sijoittajaviestinnän strategian muodostamiseen ja soveltaa viitekehystä käytännössä. Tutkimusongelma nousi case-yrityksestä, SSH Communications Security Oyj:stä, joka listautui vuoden 2000 lopussa. Teoreettinen viitekehys perustuu aikaisempaan kirjallisuuteen sijoittajaviestinnästä, strategian kehittämisestä ja rahoitusteoriasta. Rahoitusteorian alueet, joita käsiteltiin tutkimuksessa ovat; vapaaehtoinen tiedottaminen, markkinatehokkuus ja agenttiteoria. Tutkimuksen empiirinen osa toteutettiin soveltamalla teoreettista viitekehystä case yritykseen. Empiirisessä osuudessa käytiin läpi seuraavat vaiheet; nykyisen tilan ulkoinen ja sisäinen analyysi, tavoitteiden asettaminen ja sijoittajaviestintä strategia ehdotuksen muodostaminen case yritykseen. Tutkielman viimeinen kappale kokoaa tärkeimmät löydökset, pohtii työn teoreettista kontribuutiota ja liikkeenjohdollisia kytköksiä sekä esittää tutkimuksen herättämiä ehdotuksia jatkotutkimuksille
Resumo:
Multicast is one method to transfer information in IPv4 based communication. Other methods are unicast and broadcast. Multicast is based on the group concept where data is sent from one point to a group of receivers and this remarkably saves bandwidth. Group members express an interest to receive data by using Internet Group Management Protocol and traffic is received by only those receivers who want it. The most common multicast applications are media streaming applications, surveillance applications and data collection applications. There are many data security methods to protect unicast communication that is the most common transfer method in Internet. Popular data security methods are encryption, authentication, access control and firewalls. The characteristics of multicast such as dynamic membership cause that all these data security mechanisms can not be used to protect multicast traffic. Nowadays the protection of multicast traffic is possible via traffic restrictions where traffic is allowed to propagate only to certain areas. One way to implement this is packet filters. Methods tested in this thesis are MVR, IGMP Filtering and access control lists which worked as supposed. These methods restrict the propagation of multicast but are laborious to configure in a large scale. There are also a few manufacturerspecific products that make possible to encrypt multicast traffic. These separate products are expensive and mainly intended to protect video transmissions via satellite. Investigation of multicast security has taken place for several years and the security methods that will be the results of the investigation are getting ready. An IETF working group called MSEC is standardizing these security methods. The target of this working group is to standardize data security protocols for multicast during 2004.
Resumo:
This study examines the correlation between buccal dental microwear and stable isotopes. The buccal surface of post-canine teeth casts from El Collado, the largest Mesolithic site in Spain, were examined under Scanning Electron Microscope; photomicrographs were taken from the middle third of the buccal surface with magnification 100X. Only six individuals passed the criteria for buccal dental microwear analysis. The photomicrographs were treated by adobe Photoshop 8.01 to cover an area 0.56 mm² of middle third of buccal surface, the output photomicrographs were digitized using Sigmascan Pro 5 by SPSS. Then the correlation between buccal microwear pattern and stable isotopes of the same individuals, of the previous study of Guixe et al., 2006, was examined using a Pearson test. Statistical analysis revealed that there is no significant correlation between stable isotopes and buccal dental microwear of the people of the Mesolithic site of El Collado. The historical and archaeological documentation suggest that the Mesolithic people tended to consume marine food. Fish-drying techniques were used during the Mesolithic period which allowed the introduction of dust and sand to the fish. These abrasive particles affected the buccal dental microwear pattern, so that no correlation between the isotopes and microwear may be expected. This also suggests that the buccal dental microwear pattern exceeds dietary reconstruction to reconstruct food processing techniques.
Resumo:
En 2015, l'Association CIAO a démarré un processus de réflexion en profondeur sur son offre et son identité de manière générale, avec l'objectif de pouvoir être reconnue comme un service d'utilité publique. L'évaluation vise ainsi à situer le rôle du site ciao.ch au sein du dispositif de santé publique, et plus particulièrement des outils de prévention-santé destinés aux adolescents. La notoriété et l'effet du site sur son public-cible et pour les professionnels travaillant au contact des adolescents sont également évalués. Les résultats de cette évaluation permettront à l'équipe de CIAO de compléter les indices qu'elle possède déjà dans les aspects évalués. Les recommandations finales conduiront à une éventuelle redéfinition de certains aspects du site, de son public et de ses vecteurs de promotion, dans le but de correspondre au mieux aux besoins et aux modes de vie de ses bénéficiaires, et de garantir son efficacité.
Resumo:
A new micromammal site at Alhaurín el Grande (Málaga, southern Spain) located above early Pliocene marine deposits allows an approach to the marine-continental correlation for this age. The early Pliocene marine filling throughout the Málaga Basin is developed in three transgressive-regressive sequences (Pl-1, Pl-2, and Pl-3 units) bounded by discontinuities. At the top of the intermediate sequence Pl-2, peaty sediments have yielded fossils of Rodentia, Lagomorpha, Insectivora, and Crocodylia. The presence of Cricetus barrieri Mein & Michaux, 1970 in combination with murids, both of primitive morphology, such as Apodemus gudrunae Van de Weerd, 1976, and more advanced forms (i.e. Occitanomys brailloni Michaux, 1969 and Stephanomys donnezani cordii Ruiz Bustos, 1986), points to an early Ruscinian age (MN 14 biozone). Based on the planktonic foraminifers, the biostratigraphic data indicate that marine sediments just below the micromammal beds belong to the MPl-2 biozone of the early Zanclean. Available paleomagnetic data from the marine sediments show that the micromammal bed must be located between the normal geomagnetic subchron C3n3n (4.89-4.80 Ma) and the subchron C3n2n (4.63-4.49 Ma), limiting the age of this site to the late part of the early Zanclean.
Resumo:
Mobile technologies have brought about major changes in police equipment and police work. If a utopian narrative remains strongly linked to the adoption of new technologies, often formulated as 'magic bullets' to real occupational problems, there are important tensions between their 'imagined' outcomes and the (unexpected) effects that accompany their daily 'practical' use by police officers. This article offers an analysis of police officers' perceptions and interactions with security devices. In so doing, it develops a conceptual typology of strategies for coping with new technology inspired by Le Bourhis and Lascoumes: challenging, neutralizing and diverting. To that purpose, we adopt an ethnographic approach that focuses on the discourses, practices and actions of police officers in relation to three security devices: the mobile digital terminal, the mobile phone and the body camera. Based on a case study of a North American municipal police department, the article addresses how these technological devices are perceived and experienced by police officers on the beat.
Resumo:
Selective reinnervation of peripheral targets after nerve injury might be assessed by injecting a first tracer in a target before nerve injury to label the original neuronal population, and applying a second tracer after the regeneration period to label the regenerated population. However, altered uptake of tracer, fading, and cell death may interfere with the results. Furthermore, if the first tracer injected remains in the target tissue, available for 're-uptake' by misdirected regenerating axons, which originally innervated another region, then the identification of the original population would be confused. With the aim of studying this problem, the sciatic nerve of adult rats was sectioned and sutured. After 3 days, to allow the distal axon to degenerate avoiding immediate retrograde transport, one of the dyes: Fast Blue (FB), Fluoro-Gold (FG) or Diamidino Yellow (DY), was injected into the tibial branch of the sciatic nerve, or in the skin of one of the denervated digits. Rats survived 2-3 months. The results showed labelled dorsal root ganglion (DRG) cells and motoneurones, indicating that late re-uptake of a first tracer occurs. This phenomenon must be considered when the model of sequential labelling is used for studying the accuracy of peripheral reinnervation.