Prioritization 4.0
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
AMD Geode™ LX Processors Data Book
AMD Geode™ LX Processors Data Book February 2007 Publication ID: 33234E AMD Geode™ LX Processors Data Book © 2007 Advanced Micro Devices, Inc. All rights reserved. The contents of this document are provided in connection with Advanced Micro Devices, Inc. (“AMD”) products. AMD makes no representations or warranties with respect to the accuracy or completeness of the contents of this publication and reserves the right to make changes to specifications and product descriptions at any time without notice. No license, whether express, implied, arising by estoppel or otherwise, to any intellectual property rights is granted by this publication. Except as set forth in AMD’s Standard Terms and Conditions of Sale, AMD assumes no liability whatsoever, and disclaims any express or implied warranty, relating to its products including, but not limited to, the implied warranty of mer- chantability, fitness for a particular purpose, or infringement of any intellectual property right. AMD’s products are not designed, intended, authorized or warranted for use as components in systems intended for surgical implant into the body, or in other applications intended to support or sustain life, or in any other application in which the failure of AMD’s product could create a situation where personal injury, death, or severe property or environmental damage may occur. AMD reserves the right to discontinue or make changes to its products at any time without notice. Contacts www.amd.com Trademarks AMD, the AMD Arrow logo, AMD Athlon, AMD Geode, and combinations thereof, and 3DNow! and GeodeLink, are trademarks of Advanced Micro Devices, Inc. AMD-K6 is a registered trademark of Advanced Micro Devices, Inc. -
System/370 Model 145 Reference Summary
System/370 Model 145 Reference Summary S229-2239-1 IBM Corporation, Field Support Documentation, Dept 927, Rochester, Minnesota 55901 PREFACE This publication is primarily intended for customer engineers servicing System/370 Model 145. Second Edition (September 1972) This is a major revision of, and makes 8229-2239-0 obsolete. Address any comments concerning the contents of this publication to: IBM, Field Support Documentation, Dept 927, Rochester, Minnesota 55901 © International Business Machines Corporation 1972 CONTENTS Section 1 - Control Words Branch and Module Switch Word "O" . 1. 1 Branch Word . 1.2 GA Function Charts . 1.3 GA Function Charts . 1.4 GA Function Charts . 1.5 Branch and Link or Return Word . 1.6 Word Move Word Version"O" . 1. 7 Word Move Word Version "1" . 1.8 Storage Word, Non K-Addressable . 1.9 Storage Word, K-Addressable . 1.10 Arithmetic Word 10 Byte Version 1.11 Arithmetic Word, Fullword Version 1.12 Arithmetic Word, 11 Direct ByteVersion . 1.13 Arithmetic Word, 10/11 Indirect Byte Version . 1.14 ALU Entry Gating 1.15 Stat Set Symbols . 1.15 BranchSymbols . 1.15 Arithmetic Word Chart Selection 1.16 Address Formation Chart 1.16 Control Word Chart Selection 1.16 Section 2 - CPU 3145 CPU Data Flow . 2.1 I-Cycles Data Flow . 2.2 I-Cycles . 2.3 PSW Locations . 2.3 Expanded Local Storage . 2.3 I-Cycles . 2.3 I-Cycles Control Line Generation . 2.4 Control Word . 2.4 Control Register Decode . 2.4 iii ECCL Board Layout ............ 2.5 Data Bit Location Chart .......... 2.5 Common Test Points ........... -
Advanced Ipv6 Security in the LAN Gilles Roy, Technical Leader BRKSEC-3003 in 2015, 55% of Attacks Are from the Inside! *
Advanced IPv6 Security in the LAN Gilles Roy, Technical Leader BRKSEC-3003 In 2015, 55% of attacks are from the inside! * Source: 2015 IBM Cyber Security Report 3 There is a lot happening on the LAN, it can be difficult to follow everything, lets break it down. 1. Operations 2. Attacks 3. Mitigations 4. Use cases 4 Use cases Enterprise SP Access Datacenter Address Allocation ✔ ✖ ✖ Duplicate Address Detection ✔ ✔ ✔ Address Resolution ✔ ✖ ✔ Operation Neighbor Unreachability Detection ✔ ✖ ✔ Prefix Allocation ✖ ✔ ✖ Making Default Router Discovery ✔ ✖ ✔ sense of Denial of Link Operations ✔ ✖ ✔ Denial of Address Resolution ✔ ✖ ✔ YOUR Router Theft ✔ ✔ ✔ Attacks Address Theft ✔ ✖ ✔ setup. Denial of Address Configuration ✔ ✔ ✖ Denial of Address Assignment ✔ ✖ ✖ RA Guard ✔ ✔ ✔ DHCP Guard ✔ ✔ ✖ Mitigation Source Guard ✔ ✖ ✔ Destination Guard ✔ ✖ ✖ Binding Guard ✔ ✖ ✔ 5 Abstract summary and pre-requisite • This session focuses on IPv6 security within the layer-2 domain • With a multi-dimensional approach: operations, vulnerabilities, mitigations and use-cases • It introduces security features at the First Hop, such RA Guard, Source Guard, Destination guard, etc • Requirements: Knowledge of IPv6 and IPv6 Neighbor Discovery 6 Agenda • IPv6 in the layer-2 domain: operations and protocols • IPv6 in the layer-2 domain: vulnerabilities • Attack Demonstration • Mitigating Vulnerabilities • Use cases overview 7 Some background on layer-2 & IPv6 • Layer-2: what is it? • Layer-2 domain: also “broadcast domain”, link, lan, vlan, segment • Nodes: hosts, routers, -
Report on the Most Appropriate Indicators Related to the Basic Concepts
D 4.1 – Report on the most appropriate indicators related to the basic concepts Report on the most appropriate indicators related to the basic concepts Deliverable D4.1 This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No. 870708 D 4.1 – Report on the most appropriate indicators related to the basic concepts Disclaimer: The contents of this deliverable are the sole responsibility of one or more Parties of the SmartCulTour consortium and can under no circumstances be regarded as reflecting the position of the Research Executive Agency and European Commission under the European Union’s Horizon 2020 programme. Copyright and Reprint Permissions “You may freely reproduce all or part of this paper for non-commercial purposes, provided that the following conditions are fulfilled: (i) to cite the authors, as the copyright owners (ii) to cite the SmartCulTour Project and mention that the EC co-finances it, by means of including this statement “Smart Cultural Tourism as a Driver of Sustainable Development of European Regions - SmartCulTour Project no. H2020-870708 co financed by EC H2020 program” and (iii) not to alter the information.” _______________________________________________________________________________________ How to quote this document: Petrić, L., Mandić, A., Pivčević, S., Škrabić Perić, B., Hell, M., Šimundić, B., Muštra, V., Mikulić, D., & Grgić, J. (2020). Report on the most appropriate indicators related to the basic concepts. Deliverable 4.1 of the Horizon 2020 project SmartCulTour (GA number 870708), published on the project web site on September 2020: http://www.smartcultour.eu/deliverables/ D 4.1 – Report on the most appropriate indicators related to the basic concepts This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No. -
The (Many) Paths to “Destination X”
Blog The (many) paths to “Destination X” Michelle Batten Head of Global Marketing, Mobile Division, Amadeus According to Amadeus’ new whitepaper, Better travel in the Live Travel Space “Get ready for Destination X,” today’s travel sellers have a golden opportunity to Destination X also offers enormous tap into destination services, a growing untapped potential to market and sell marketplace set to reach $183 billion by ancillary destination services to travelers. 2020. Drawing on survey results from It’s a place where travel agents, corporate more than a thousand CheckMyTrip by travel programs, and other providers of Amadeus mobile app users, the research flights, hotels and cars can continue identifies emerging trends about business servicing travelers at their final destination. and leisure travelers destined for Whether traveling on business, leisure or Destination X, one of the most important bleisure, mobile provides the perfect revenue-generating stops on a traveler’s platform to offer these destination services journey. on the move. Take me to travel nirvana Amadeus is helping travel providers better understand and address these challenges The Amadeus research poses questions and opportunities. Using the Amadeus such as, “Are travelers prepared as they Travel Platform, the Live Travel Space arrive to Destination X?” Are their needs aggregates all content into one platform, for add-on destination services like airport making it easier for travel sellers to find transfers, local activities and restaurant what they need, and provide the level of reservations being met? The paper personalization their travelers demand. explores eight trends regarding the challenges and opportunities travel sellers Are you ready to service customers more face in the post-booking ancillary game fully when they reach Destination X? and how you can win travelers trust in Download the whitepaper today at that arena. -
Assessing Contamination Risks Associated with Dust Soil Composted
Assessing Contamination Risk of Dust, Soil, Compost, Compost Amended Soil and Irrigation Water as Vehicles of Pathogen Contamination on Iceberg Lettuce Surfaces Sadhana Ravishankar and Govindaraj Dev Kumar School of Animal & Comparative Biomedical Sciences, University of Arizona, Tucson, AZ 85721 Project Report Submitted to the Arizona Iceberg Lettuce Research Council, 2014 1 Introduction The contamination of fresh produce by foodborne pathogens results in 9.5 million illnesses in the United States annually, causing $39 billion in medical losses (Schraff 2010). Iceberg lettuce and similar leafy greens are usually consumed raw with minimal processing or heat treatment. Hence, there is an increased risk of pathogen transmission from contaminated product. Fresh fruit and produce could be contaminated by spoilage or pathogenic microorganisms during pre-harvest and post-harvest procedures (Brandl, 2006). It has also been indicated that the produce might become contaminated during production in the field or in the packing house (Brandl, 2006; Lynch, Tauxe, & Hedberg, 2009). There has been an increase in produce related outbreaks in recent years. Animals are the primary hosts of Salmonella enterica and the pathogen possesses genes to invade, survive host cells and resist immune defense mechanisms (Wallis & Galyov, 2000). Salmonella also has genes that confer fitness in non-host environments. The application of soil amended with manure produced by food animals could introduce foodborne pathogens in the farm environment (Hutchison, Walters, Moore, Crookes, & Avery, 2004). Several studies have demonstrated the persistence of Salmonella in the farm environment. The pathogen was detected in dairy farms, piggeries and slaughterhouse facilities both before and after slaughter (Baloda, Christensen, & Trajcevska, 2001; Hurd, McKean, Griffith, Wesley, & Rostagno, 2002; Millemann, Gaubert, Remy, & Colmin, 2000). -
A Key-Based Routing System for P4-Programmable Networks
electronics Article P4-KBR: A Key-Based Routing System for P4-Programmable Networks Pilar Manzanares-Lopez * , Juan Pedro Muñoz-Gea and Josemaria Malgosa-Sanahuja Department of Information Technologies and Communications, Universidad Politecnica de Cartagena, E-30202 Cartagena, Spain; [email protected] (J.P.M.-G.); [email protected] (J.M.-S.) * Correspondence: [email protected]; Tel.: +34-968-326534 Abstract: Software-defined networking (SDN) architecture has provided well-known advantages in terms of network programmability, initially offering a standard, open, and vendor-agnostic interface (e.g., OpenFlow) to instruct the forwarding behavior of network devices from different vendors. However, in the last few years, data plane programmability has emerged as a promising approach to extend the network management allowing the definition and programming of customized and non-standardized protocols, as well as specific packet processing pipelines. In this paper, we propose an in-network key-based routing protocol called P4-KBR, in which end-points (hosts, contents or services) are identified by virtual identifiers (keys) instead of IP addresses, and where P4 network elements are programmed to be able to route the packets adequately. The proposal was implemented and evaluated using bmv2 P4 switches, verifying how data plane programmability offers a powerful tool to overcome continuing challenges that appear in SDN networks. Keywords: P4; routing; KBR; SDN Citation: Manzanares-Lopez, P.; Muñoz-Gea, J.P.; Malgosa-Sanahuja, J. 1. Introduction P4-KBR: A Key-Based Routing The idea of decoupling end-points (hosts, contents or services) from network ad- System for P4-Programmable dresses has been demanded in the last few years to provide support to enhanced services Networks. -
Strategic Communication in Tourism
STRATEGIC COMMUNICATION IN TOURISM DEPARTMENT OF DESIGN AND COMMUNICATION CENTRE FOR TOURISM, INNOVATION AND CULTURE (TIC) Bodil Stilling Blichfeldt Strategic Communication in Tourism Background, conceptualizations, introduction to analysis and relations to sustainable tourism and tourism innovation TIC TALKS no. 5, September 2017 1 Author info Associate Professor, Ph.D. Bodil Stilling Blichfeldt, TIC and Department of Design and Communication, University of Southern Denmark. Email: [email protected] Place of publication TIC is University of Southern Denmark’s multidisciplinary research center in tourism, innovation and culture. The center is located at the Kolding campus. TIC strives to transform the university to an engaged, collaborative institution where academics and students pursue an unrelenting examination of knowledge, its sources and its uses. TIC defines the university as a center for higher order knowledge creation and for collaboration with, and for, society at large. We do this through research-based education, education-based research and collaborative engagement with society. We aim to charter new territory in international academe, as well as in multi-level collaboration based on interdisciplinary research with a strong foundation in the Humanities. TIC engages in research dialogues through both a traditional peer-review publication strategy and through involvement in securing free access to knowledge. Supplementing traditional journal articles, TIC TALKS is one of TIC’s contributions to open access sharing and collaborative development of knowledge. TIC TALKS are provided by Centre for Tourism, Innovation and Culture, University of Southern Denmark Universitetsparken 1, Kolding, DK-6000 http://www.sdu.dk/en/Om_SDU/Institutter_centre/C_Tik.aspx The present manuscript qualifies as unfinished work-in-progress and the reader should bear in mind that the manuscript is quite likely to contain a series of errors, flaws and weaknesses. -
G45: Vol 1B: Graphics Core
G45: Volume 1b: Graphics Core Intel® 965G Express Chipset Family, Intel® G35 Express Chipset Graphics Controller Programmer’s Reference Manual (PRM) January 2009 Revision 1.0a Document Number: 321392-001 You are free: to Share — to copy, distribute,display, and perform the work Under the following conditions: Attribution. You must attribute the work in the manner specified by the author or licensor (but not in any way that suggests that they endorse you or your use of the work). No Derivative Works. You may not alter, transform, or build upon this work. You are not obligated to provide Intel with comments or suggestions regarding this document. However, should you provide Intel with comments or suggestions for the modification, correction, improvement, or enhancement of: 9a) this document; or (b) Intel products, which may embody this document, you grant to Intel a non-exclusive, irrevocable, worldwide, royalty-free license, with the right to sublicense Intel’s licensees and customers, under Recipient intellectual property rights, to use and disclose such comments and suggestions in any manner Intel chooses and to display, perform, copy, make, have made, use, sell, and otherwise dispose of Intel’s and its sublicensee’s products embodying such comments and suggestions in any manner and via any media Intel chooses, without reference to the source. INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL® PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL’S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. -
The Experiential Value of Cultural Tourism Destinations Hung, Kuang-Peng; Peng, Norman; Chen, Annie
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by ResearchOnline@GCU Incorporating on-site activity involvement and sense of belonging into the Mehrabian- Russell model – The experiential value of cultural tourism destinations Hung, Kuang-peng; Peng, Norman; Chen, Annie Published in: Tourism Management Perspectives Publication date: 2019 Document Version Peer reviewed version Link to publication in ResearchOnline Citation for published version (Harvard): Hung, K, Peng, N & Chen, A 2019, 'Incorporating on-site activity involvement and sense of belonging into the Mehrabian-Russell model – The experiential value of cultural tourism destinations', Tourism Management Perspectives, vol. 30, pp. 43-52. General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. Take down policy If you believe that this document breaches copyright please view our takedown policy at https://edshare.gcu.ac.uk/id/eprint/5179 for details of how to contact us. Download date: 29. Apr. 2020 Incorporating On-site Activity Involvement and Sense of Belonging into the Mehrabian-Russell Model - The Experiential Value of Cultural Tourism Destinations 1. INTRODUCTION Cultural products are important to post-modern society and the economy (Throsby, 2008). Among a range of different cultural products, cultural tourism destinations are significant because they provide opportunities to present a snapshot of a region’s image and history, symbolize a community’s identity, and increase the vibrancy of local economies (Chen, Peng, & Hung, 2015; Hou, Lin, & Morais, 2005; Wansborough & Mageean, 2000). -
TS 102 871-2 V1.1.1 (2011-06) Technical Specification
ETSI TS 102 871-2 V1.1.1 (2011-06) Technical Specification Intelligent Transport Systems (ITS); Testing; Conformance test specifications for GeoNetworking ITS-G5; Part 2: Test Suite Structure and Test Purposes (TSS&TP) 2 ETSI TS 102 871-2 V1.1.1 (2011-06) Reference DTS/ITS-0030015 Keywords ITS, network, TSS&TP, testing ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http://portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission. -
Retail Prices in a City*
Retail Prices in a City Alon Eizenberg Saul Lach The Hebrew University and CEPR The Hebrew University and CEPR Merav Yiftach Israel Central Bureau of Statistics February 2017 Abstract We study grocery price differentials across neighborhoods in a large metropolitan area (the city of Jerusalem, Israel). Prices in commercial areas are persistently lower than in residential neighborhoods. We also observe substantial price variation within residen- tial neighborhoods: retailers that operate in peripheral, non-a uent neighborhoods charge some of the highest prices in the city. Using CPI data on prices and neighborhood-level credit card data on expenditure patterns, we estimate a model in which households choose where to shop and how many units of a composite good to purchase. The data and the estimates are consistent with very strong spatial segmentation. Combined with a pricing equation, the demand estimates are used to simulate interventions aimed at reducing the cost of grocery shopping. We calculate the impact on the prices charged in each neighbor- hood and on the expected price paid by its residents - a weighted average of the prices paid at each destination, with the weights being the probabilities of shopping at each destina- tion. Focusing on prices alone provides an incomplete picture and may even be misleading. Specifically, we find that interventions that make the commercial areas more attractive and accessible yield only minor price reductions, yet expected prices decrease in a pronounced fashion. The benefits are particularly strong for residents of the peripheral, non-a uent neighborhoods. We thank Eyal Meharian and Irit Mishali for their invaluable help with collecting the price data and with the provision of the geographic (distance) data.