84 resultados para hacking


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Learning is most effective when intrinsically motivated through personal interest, and situated in a supportive socio-cultural context. This paper reports on findings from a study that explored implications for design of interactive learning environments through 18 months of ethnographic observations of people’s interactions at “Hack The Evening” (HTE). HTE is a meetup group initiated at the State Library of Queensland in Brisbane, Australia, and dedicated to provide visitors with opportunities for connected learning in relation to hacking, making and do-it-yourself technology. The results provide insights into factors that contributed to HTE as a social, interactive and participatory environment for learning – knowledge is created and co-created through uncoordinated interactions among participants that come from a diversity of backgrounds, skills and areas of expertise. The insights also reveal challenges and barriers that the HTE group faced in regards to connected learning. Four dimensions of design opportunities are presented to overcome those challenges and barriers towards improving connected learning in library buildings and other free-choice learning environments that seek to embody a more interactive and participatory culture among their users. The insights are relevant for librarians as well as designers, managers and decision makers of other interactive and free-choice learning environments.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

It could be argued that architecture has an inherent social responsibility to enrich the urban and spatial environments for the city’s occupants. However how we define quality, and how ‘places’ can be designed to be fair and equitable, catering for individuals on a humanistic and psychological level, is often not clearly addressed. Lefebvre discusses the idea of the ‘right to the city’; the belief that public space design should facilitate freedom of expression and incite a sense of spatial ownership for its occupants in public/commercial precincts. Lefebvre also points out the importance of sensory experience in the urban environment. “Street-scape theatrics” are performative activities that summarise these two concepts, advocating the ‘right to the city’ by way of art as well as providing sensual engagement for city users. Literature discusses the importance of Street-scape Theatrics however few sources attempt to discuss this topic in terms of how to design these spaces/places to enhance the city on both a sensory and political level. This research, grounded in political theory, investigates the case of street music, in particular busking, in the city of Brisbane, Australia. Street culture is a notion that already exists in Brisbane, but it is heavily controlled especially in central locations. The study discusses how sensory experience of the urban environment in Brisbane can be enriched through the design for busking; multiple case studies, interviews, observations and thematic mappings provide data to gather an understanding of how street performers see and understand the built form. Results are sometime surprisingly incongruous with general assumptions in regards to street artist as well as the established political and ideological framework, supporting the idea that the best and most effective way of urban hacking is working within the system. Ultimately, it was found that the Central Business District in Brisbane, Australia, could adopt certain political and design tactics which attempt to reconcile systematic quality control with freedom of expression into the public/commercial sphere, realism upheld. This can bridge the gap between the micro scale of the body and the macro of the political economy through freedom of expression, thus celebrating the idiosyncratic nature of the city.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Com o crescente aumento de utilizadores e da importância no quotidiano de uma grande parte da população mundial, a Internet disponibiliza hoje às empresas, um conjunto de oportunidades que devidamente aproveitadas, se poderão traduzir na captação de novos clientes e no aumento da notoriedade da marca. Tem-se assistido nos últimos anos a um crescimento considerável do investimento das empresas em Marketing Digital, fazendo uso das mais variadas ferramentas que potenciam e aumentam a sua presença online. Decorrente do aumento de competividade no meio digital, têm surgido diversos casos de startups que desenvolveram e aplicaram técnicas e acções de marketing digital inovadoras, que se traduziram num crescimento exponencial do seu número de clientes/utilizadores. Desta forma, o presente trabalho tem como principais objetivos identificar o conceito de Growth Hacking, principais tácticas e ferramentas utilizadas, e avaliar qual impacto que o mesmo poderá ter para o sucesso de uma organização no meio online. Recorrendo ao estudo de dois casos de sucesso é feita uma análise das estratégias adotadas pelas empresas Uber e Dropbox e apresentadas as principais caraterísticas que as diferenciam e que permitiram o seu sucesso no meio digital.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The following project introduces a model of Growth Hacking strategies for business-tobusiness Software-as-a-Service startups that was developed in collaboration with and applied to a Portuguese startup called Liquid. The work addresses digital marketing channels such as content marketing, email marketing, social marketing and selling. Further, the company’s product, pricing strategy, partnerships and website communication are examined. Applying best case practices, competitor benchmarks and interview insights from numerous industry influencers and experts, areas for improvement are deduced and procedures for each of those channels recommended.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This share has a web resource on hacking. The web resource provides a tutorial on hacking and then an interactive quiz to test the user's knowledge.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Organisations spend large sums of money to ensure that they are protected
against the risks associated with external threats. The perceived threats
against organisations are well known, and the losses can be quantifiable.
The perceived threat considered here is that associated with hackers. Much
is known about hackers, their rationale, and their ethical views. However,
it is harder to quantify what computer abuse is and what the associated
losses are. This chapter focuses on hackers, computer abuse, and ethical
issues.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this article, we explare a recent incident involving aprolonged and severe denial of service attack directed at the Undemet Intemet Relay Chat network. It put the future viabifity of Undernet in doubt; it took some months for service quality to be restored. The circumstances of the attack and the responses, both technical and social, within Undemet are enlightening in themselves, as we discuss. But they also allow us to explore, contrast, and match up the limits of the libertarianism that seems embedded in the socio-technics of the Intemet and the possible and actual containment of 'free' services in a 'free' market, through the operation of commercial transactions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

 Many web servers contain some dangerous pages (we name them eigenpages) that can indicate their vulnerabilities. Therefore, some worms such as Santy locate their targets by searching for these eigenpages in search engines with well-crafted queries. In this paper, we focus on the modeling and containment of these special worms targeting web applications. We propose a containment system based on honey pots. We make search engines randomly insert a few honey pages that will induce visitors to the pre-established honey pots among the search results for the arriving queries. And then infectious can be detected and reported to the search engines when their malicious scans hit the honey pots. We find that the Santy worm can be well stopped by inserting no more than two honey pages in every one hundred search results. We also solve the challenging issue to dynamically generate matching honey pages for those dynamically arriving queries. Finally, a prototype is implemented to prove the technical feasibility of this system. © 2013 by CESER Publications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As the new millennium approaches, we are living in a society that is increasingly dependent upon information technology. However, whilst technology can deliver a number of benefits, it also introduces new vulnerabilities that can be exploited by persons with the necessary technical skills. Hackers represent a well-known threat in this respect and are responsible for a significant degree of disruption and damage to information systems. However, they are not the only criminal element that has to be taken into consideration. Evidence suggests that technology is increasingly seen as potential tool for terrorist organizations. This is leading to the emergence of a new threat in the form of 'cyber terrorists', who attack technological infrastructures such as the Internet in order to help further their cause. The paper discusses the problems posed by these groups and considers the nature of the responses necessary to preserve the future security of our society.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: The objective of routine outpatient assessment of well functioning patients after primary total hip arthroplasty (THA) is to detect asymptomatic failure of prostheses to guide recommendations for early intervention. We have observed that the revision of THAs in asymptomatic patients is highly uncommon. We therefore question the need for routine follow-up of patients after THA. Methods: A prospective analysis of an orthopaedic database identified 158 patients who received 177 revision THAs over a 4 year period. A retrospective chart review was conducted. Patient demographics, primary and revision surgery parameters and follow-up information was recorded and cross referenced with AOA NJRR data. Results: 110 THAs in 104 patients (average age 70.4 (SD 9.8 years). There were 70 (63.6%) total, 13 (11.8%) femoral and 27 (24.5%) acetabular revisions. The indications for revision were aseptic loosening (70%), dislocation (8.2%), peri-prosthetic fracture (7.3%), osteolysis (6.4%) and infection (4.5%). Only 4 (3.6%) were asymptomatic revisions. A mean of 5.3 (SD 5.2 and 1.9 (SD 5.3 follow-up appointments were required before revision in patients with and without symptoms, respectively. The average time from the primary to revision surgery was 11.8 (SD 7.23) years. Conclusions: We conclude that patients with prostheses with excellent long term clinical results as validated by Joint Registries, routine follow-up of asymptomatic THA should be questioned and requires further investigation. Based on the work of this study, the current practice of routine follow-up of asymptomatic THA may be excessively costly and unnecessary and a less resource-intensive review method may be more appropriate.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Consumer personal information is now a valuable commodity for most corporations. Concomitant with increased value is the expansion of new legal obligations to protect personal information. Mandatory data breach notification laws are an important new development in this regard. Such laws require a corporation that has suffered a data breach, which involves personal information, such as a computer hacking incident, to notify those persons who may have been affected by the breach. Regulators may also need to be notified. Australia currently does not have a mandatory data breach notification law but this may be about to change. The Australian Law Reform Commission has suggested that a data breach notification scheme be implemented through the Privacy Act 1988 (Cth). However, the notification of data breaches may already be required under the continuous disclosure regime stipulated by the Corporations Act 2001 (Cth) and the Australian Stock Exchange (ASX) Listing Rules. Accordingly, this article examines whether the notification of data breaches is a statutory requirement of the existing continuous disclosure regime and whether the ASX should therefore be notified of such incidents.