... democracy e-Parliament enables automation of parliamentary information and the tracking of decisions and documents, for example the stages of the development of legislation, and sharing of information ... as IPEX (Interparliamentary Information Exchange) This project has now resulted in a website that enables parliaments in EU member states and the European Parliament to exchange information about ... http://scholar.sun.ac.za He argues, however, that the potential to transform parliaments centres on three main areas: § increased administrative efficiency § improved information access and dissemination,...
Ngày tải lên: 10/05/2014, 16:26
Creating a foundation for profitability
... designers can accommodate by arranging for slack storage within the network infrastructure plan Multi-fiber ribbon cables are gaining popularity as a valuable way to increase density per line card Without ... cables, but also reduces signal attenuation and enables service providers to realize fiber’s competitive advantage Most new-world equipment platforms feature modular line cards designed to ease ... connectivity Each time a new line card is added or upgraded, it is not uncommon to require substantial connectivity changes For example, to upgrade a line card, as many as to 16 connections may need...
Ngày tải lên: 04/12/2015, 03:52
Tài liệu Module 5: Creating a Security Design for Physical Resources pdf
... internal network If data cables are accessible, attackers can tap into them or attach listening devices that gather network data Not all information is electronic For example, an attacker could read ... as quickly as at an online facility) Additional reading For more information about disaster recovery, see Data Security and Data Availability in the Administrative Authority – Part 2, at: http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/ ... the room and extract an account database from a server by using a boot startup disk or CD The attacker could then perform a brute force attack on the password hashes in the database and access...
Ngày tải lên: 21/12/2013, 19:15
Tài liệu Module 6: Creating a Security Design for Computers ppt
... physically attacks a computer’s hard disk, or a process in an organization omits the application of service packs before deployment Additional reading For more information about change management, ... Northwind Traders has no plans for performing an initial installation or creating a secure baseline for the computers Although its plan to install antivirus software is a good idea, it likely will ... Northwind Traders should transport the computers, rather than hiring a third party It can store the computers in a secure facility, erase and reformat the computers, and perform an initial installation...
Ngày tải lên: 21/12/2013, 19:15
Tài liệu Equal Access Means Equal Opportunity for All: Creating a Real-Time Statewide Advanced Placement Consortium February, 2003 ppt
... I was fortunate enough to be able to attend a pilot program at the University of Iowa called the Advanced Placement Academy The Academy consisted of AP classes in English, History, Biology, and ... statewide advanced placement distance learning clearinghouse for all Wisconsin high schools The AP Consortium staff will: – Recruit AP teachers – Arrange for their summer training at UW-Madison or Lawrence ... University [Appleton] – Help principals and counselors make a wide range of AP distance learning courses available to their students – coordinate fiscal transactions required to participate NUTS...
Ngày tải lên: 15/01/2014, 15:59
Tài liệu Module 7: Creating a Security Design for Accounts pdf
... Anyone who can manage an account can change the rights and permissions of the account or disable its use Anyone who can manage a password to an account can, at any time, access all of the information ... use accounts to grant users access to the information on a network If an attacker gains access to an account that has excessive privileges, or breaks the password that is associated with an account, ... information that the account can access Who can obtain account information Account information often includes personal data, such as home addresses, birthdates, and telephone numbers Each account...
Ngày tải lên: 18/01/2014, 05:20
Tài liệu Module 8: Creating a Security Design for Authentication docx
... NTLM or LAN Manager, and then attack the password hashes offline Threat is easily carried out with little skill required Both attacks enable an attacker to obtain a valid user account and password ... Module 8: Creating a Security Design for Authentication 13 When using LAN Manager and NTLM authentication protocols, consider: Removing LAN Manager password hashes LAN Manager password hashes are sent ... sent along with NTLM authentication messages for compatibility with older operating systems Because an attacker can easily crack LAN Manager password hashes, remove them from the account databases...
Ngày tải lên: 18/01/2014, 05:20
Tài liệu Module 9: Creating a Security Design for Data pptx
... that your organization retains data and how you use redundant hardware and hardware replacement schedules to protect against loss of data due to hardware failure Additional reading For more information ... points Data is vulnerable to threats from both external and internal attackers For example: External attacker scenario An external attacker steals a laptop from an employee’s car Using a floppy ... the attacker replaces the password of the Administrator account in the local Security Accounts Manager (SAM) database The attacker then logs on to the laptop as Administrator and accesses the data...
Ngày tải lên: 18/01/2014, 05:20
Tài liệu Module 10: Creating a Security Design for Data Transmission docx
... of traffic For example, an attacker who wants to gain knowledge about data as it is transmitted can passively monitor the network from within an organization This type of attack reveals data but ... infrastructure (PKI) and a Remote Authentication Dial-In User Service (RADIUS) infrastructure Additional reading For more information about data transmission protocols for the application layer, ... in your organization, the data becomes vulnerable to a variety of additional threats Attackers can potentially intercept transmitted data, depending on how and where the data is transmitted Lesson...
Ngày tải lên: 18/01/2014, 05:20
Tài liệu Module 11: Creating a Security Design for Network Perimeters ppt
... points Assets are vulnerable to threats from both external and internal attackers For example: External attacker scenario An external attacker runs a series of port scans on a network The attacker ... Trojan horse applications, and worms Educate users about security Increasing user awareness through information campaigns and training can help change behavior and prevent users from creating ... deployed a Web server so that employees can retrieve their e-mail messages The IT manager has asked you to explain how a Land attack and a SYN flood attack (or SYN-ACK attack) can prevent users...
Ngày tải lên: 18/01/2014, 05:20
Tài liệu GIVING CREDIT WHERE CREDIT IS DUE: CREATING A COMPETENCY-BASED QUALIFICATIONS FRAMEWORK FOR POSTSECONDARY EDUCATION AND TRAINING pdf
... competency-based framework within which states and institutions can award educational credit for academic-equivalent competencies mastered through formal and informal occupational education and training ... when a student has earned a degree, but also the unit upon which financial aid and formulas for state institutional funding are calculated The credit hour also forms the basis for articulation and ... competency-based framework within which states and institutions can award educational credit for academic equivalent competencies mastered through formal and informal noncredit occupational education and...
Ngày tải lên: 16/02/2014, 03:20
Tài liệu Adding value to traditional products of regional origin - A guide to creating a quality consortium pptx
... whose aim is to add value to a traditional product of regional origin and act as a platform for the fair and balanced coordination of interests and efforts in the same value chain The reach of ... cigars manufactured by the company are marketed under various international, regional, local and niche trademarks, but all carry the “Habanos” label This name has been registered as a geographical ... seen and managed only as a mere formality for protecting intellectual rights, but as a part of a broader communication campaign aimed at increasing product popularity and recognition It must also...
Ngày tải lên: 18/02/2014, 21:20
Tài liệu Creating a Sustainable Organization: Approaches for Enhancing Corporate Value Through Sustainability pdf
... voluntary standards, climate change adaptation, sustainability investing, and a wide array of other topics He sees several areas in which major advancements in corporate attitudes and practices have ... organizations at a strategic level He has developed a substantial number of new innovations for understanding and acting upon the organizational and financial aspects of corporate sustainability ... emotional, green, crunchy granola appeal of sustainability to the argument that appeals to the brain Creating a Sustainable Organization presents the theory, the evidence, and the organizational case...
Ngày tải lên: 19/02/2014, 21:20
Báo cáo khoa học: "Creating a Gold Standard for Sentence Clustering in Multi-Document Summarization" potx
... IM F INDER Hatzivassiloglou et al (2001) created a set of 10.535 manually marked pairs of paragraphs Two human annotator were asked to judge if the paragraphs contained ’common information’ They ... almost paraphrases For our task sentences that are not paraphrases can be in the same cluster (see rule 5, 8, 9) In general there are several constraints that pull against each other The judges have ... the same document and even within the same paragraph are clustered together whereas our approach is to find similar information between documents A gold standard for event identification was built...
Ngày tải lên: 08/03/2014, 01:20
Báo cáo khoa học: "Creating a CCGbank and a wide-coverage CCG lexicon for German" pdf
... Srinivas Bangalore, and K Vijay-Shanker 2005 Automated extraction of Tree-Adjoining Grammars from treebanks Natural Language Engineering Owen Rambow 1994 Formal and Computational Aspects of Natural ... International Conference on Language Resources and Evaluation (LREC), pages 19741981, Las Palmas, Spain, May Julia Hockenmaier and Mark Steedman 2002b Generative models for statistical parsing ... languages In Fifth Conference on Applied Natural Language Processing Gerald Gazdar, Ewan Klein, Geoffrey K Pullum, and Ivan A Sag 1985 Generalised Phrase Structure Grammar Blackwell, Oxford Mark...
Ngày tải lên: 08/03/2014, 02:21
Báo cáo khoa học: "PENS: A Machine-aided English Writing System for Chinese Users" pdf
... PAT-Tree-Based Adaptive Keyphrase Extraction for Intelligent Chinese Information Retrieval Special issue on “Information Retrieval with Asian Language” Information Processing and Management, 1998 ... Large-scale automatic extraction of an English-Chinese translation lexicon Machine Translation, 9:3-4, 285-313 (1995) Church, K.W.(1993), Char-align A program for aligning parallel texts at the character ... Statistical machine translation techniques are used for this translation, and therefore a Chinese-English bilingual dictionary (MRD), an English language model, and an English-Chinese word- translation...
Ngày tải lên: 08/03/2014, 05:20
Simply Put: A guide for creating easy-to-understand materials ppt
... complicated scientific and technical information into communication materials your audiences can relate to and understand The guide provides practical ways to organize information and use language and ... Explain why it is important to them For example: Always wash hands with soap and warm water for 20 seconds before and after handling food Food and water can carry germs that may make you and ... 50 characters are easiest to read Compare Paragraphs A, B, and C below Paragraph A This column is only 20 to 25 characters long and is hard to read Your eyes jump back and forth too much and quickly...
Ngày tải lên: 14/03/2014, 20:20
CREATING A SUPPORTIVE ENVIRONMENT FOR ELDERLY WITH CHRONIC ILLNESS potx
... coordination and quality of community-based care This can be done by fostering a holistic and continuous approach, and strengthening social support through the collaboration of formal and informal ... demand a multidisciplinary collaborative approach among different professionals and organizations in the community Overseas experiences have shown that community-based, and coordinated medical and ... informational support for the elderly should be strengthened in community-based social care programs Formal service providers, such as medical professionals and social workers, are typical agents...
Ngày tải lên: 22/03/2014, 14:20
A Study on the Effects of Argentine Tango as a Form of Partnered Dance for those with Parkinson Disease and the Healthy Elderly pptx
... for their assistance with this study This work was supported by a grant from the Marian Chace Foundation to Madeleine Hackney and a grant from the American Parkinson Disease Association to Gammon ... of balance, because the partner may provide helpful sensory information and stabilizing support that leads to improved balance and gait Argentine tango ‘steps’ are themselves composed of balance ... Scale (Lawton 1975) Balance was evaluated using the Functional Reach (Duncan et al 1990) and One Leg Stance Test (Vellas et al 1997) Walking velocity was assessed by tracking a reflective marker...
Ngày tải lên: 28/03/2014, 20:20