CSDMS Annual Report 2016
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Cities As Complex Systems: Scaling, Interactions, Networks, Dynamics and Urban Morphologies
UCL CENTRE FOR ADVANCED SPATIAL ANALYSIS WORKING PAPERS SERIES Paper 131 - Feb 08 Cities as Complex Systems: Scaling, Interactions, Networks, Dynamics and Urban Morphologies ISSN 1467-1298 Centre for Advanced Spatial Analysis University College London 1 - 19 Torrington Place Gower St London WC1E 7HB Tel: +44 (0)20 7679 1782 [email protected] www.casa.ucl.ac.uk Cities as Complex Systems† Scaling, Interactions, Networks, Dynamics and Urban Morphologies Michael Batty Centre for Advanced Spatial Analysis, University College London, 1-19 Torrington Place, London WC1E 6BT, UK Email: [email protected], Web: www.casa.ucl.ac.uk Abstract Cities have been treated as systems for fifty year but only in the last two decades has the focus changed from aggregate equilibrium systems to more evolving systems whose structure merges from the bottom up. We first outline the rudiments of the traditional approach focusing on equilibrium and then discuss how the paradigm has changed to one which treats cities as emergent phenomena generated through a combination of hierarchical levels of decision, driven in decentralized fashion. This is consistent with the complexity sciences which dominate the simulation of urban form and function. We begin however with a review of equilibrium models, particularly those based on spatial interaction, and we then explore how simple dynamic frameworks can be fashioned to generate more realistic models. In exploring dynamics, nonlinear systems which admit chaos and bifurcation have relevance but recently more pragmatic schemes of structuring urban models based on cellular automata and agent-based modeling principles have come to the fore. Most urban models deal with the city in terms of the location of its economic and demographic activities but there is also a move to link such models to urban morphologies which are clearly fractal in structure. -
Trends of Urbanization and Suburbanization in Southeast Asia 1
1 Trends of Urbanization and Suburbanization in Southeast Asia 1 TRENDS OF URBANIZATION AND SUBURBANIZATION IN SOUTHEAST ASIA Edited by Tôn Nữ Quỳnh Trân Fanny Quertamp Claude de Miras Nguyễn Quang Vinh Lê Văn Năm Trương Hoàng Trương Ho Chi Minh City General Publishing House 2 Trends of Urbanization and Suburbanization in Southeast Asia 3 Trends of Urbanization and Suburbanization in Southeast Asia TRENDS OF URBANIZATION AND SUBURBANIZATION IN SOUTHEAST ASIA 4 Trends of Urbanization and Suburbanization in Southeast Asia Cooperation Centre for Urban Development, Hanoi (Institut des Métiers de la Ville (IMV)) was created in 2001 by the People’s Committee of Hanoi and the Ile- de-France Region (France) within their general cooperation agreement. It has for first vocation to improve the competences of the municipal staff in the field of urban planning and management of urban services. The concerned technical departments are the department or urban planning and architecture, the department of transport and civil engineering, the authority for public transports planning, the construction department… IMV organizes seminars to support decision-makers and technicians, finances studies, implements consultancies, contributes to knowledge dissemination by the translation of scientific and technical books, and maintain a library on urban planning. Ho Chi Minh City Urban Development Management Support Centre (Centre de Prospective et d’Etudes Urbaines (PADDI)) was created in 2004 in cooperation between the People’s Committee of Ho Chi Minh City and the Rhône-Alpes Region (France). Its office is located inside the Ho Chi Minh City Town Planning Institute. Competences of PADDI are training, consultancies and research. -
Guide to Secure Software Development in Ruby
Fedora Security Team Secure Ruby Development Guide Guide to secure software development in Ruby Ján Rusnačko Secure Ruby Development Guide Fedora Security Team Secure Ruby Development Guide Guide to secure software development in Ruby Edition 1 Author Ján Rusnačko [email protected] Copyright © 2014 Ján Rusnačko. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. For guidelines on the permitted uses of the Fedora trademarks, refer to https://fedoraproject.org/wiki/ Legal:Trademark_guidelines. Linux® is the registered trademark of Linus Torvalds in the United States and other countries. Java® is a registered trademark of Oracle and/or its affiliates. XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. -
WEB2PY Enterprise Web Framework (2Nd Edition)
WEB2PY Enterprise Web Framework / 2nd Ed. Massimo Di Pierro Copyright ©2009 by Massimo Di Pierro. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600, or on the web at www.copyright.com. Requests to the Copyright owner for permission should be addressed to: Massimo Di Pierro School of Computing DePaul University 243 S Wabash Ave Chicago, IL 60604 (USA) Email: [email protected] Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created ore extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. Library of Congress Cataloging-in-Publication Data: WEB2PY: Enterprise Web Framework Printed in the United States of America. -
Original.Pdf
Rails Security Primer I am not a software security expert CVE? Common Vulnerabilities and Exposures Vulnerability A weakness that an attacker can use to exploit a system Exploit A piece of software that exploits a vulnerability to achieve unintended or unanticipated behavior CVE-2012-5664 SQL Injection Vulnerability SQL Injection Vulnerability …but only exploitable if you used Authlogic or find_by_* methods in a certain way A cookie like { "session_id" => "41414141", "user_credentials" => "Phenoelit", "user_credentials_id" => { :select=> " *,\"Phenoelit\" as persistence_token from users -- " } } …would create a query like this User.find_by_id(params[:user_credendtials_id]) …would create a query like this User.find_by_id(params[:user_credendtials_id]) User.find_by_id({:select =>"*,\"Phenoelit\" as persistence_token from users --"}) …would create a query like this User.find_by_id(params[:user_credendtials_id]) User.find_by_id({:select =>"*,\"Phenoelit\" as persistence_token from users --"}) SELECT *,"Phenoelit" as persistence_token from users -- FROM "users" WHERE "users"."id" IS NULL LIMIT 1 Blood in the water… CVE-2013-0155 CVE-2013-0156 CVE-2013-0269 CVE-2013-0333 CVE-2013-0155 "Unsafe Query Generation Risk in Ruby on Rails" def reset_password if (@user = User.find_by_token(params[:token])) @user.reset_password! render :json => 'Success' else render :json => 'Failure' end end # POST to http://localhost:3000/users/ reset_password with "{\"token\":[null]}" CVE-2013-0156 "Multiple vulnerabilities in parameter parsing in Action Pack" Content-Type: -
Professor Michael Batty CBE FBA FRS Curriculum Vitae 1
Professor Michael Batty CBE FBA FRS Curriculum Vitae _______________________________________________________________________________ Brief Biography and Summary Michael Batty is, by training, an architect-planner and geographer. He is Bartlett Professor of Planning at University College London where he is Chairman of the Centre for Advanced Spatial Analysis (CASA). His career began in the University of Manchester in 1966 where he was appointed an Assistant Lecturer in Town and Country Planning. He then spent 10 years at the University of Reading as Research Assistant, Lecturer and Reader in Geography, before moving to the University of Wales Institute of Science and Technology (now the University of Cardiff), in 1979, where he was Professor of Town Planning. During this time, he acted as Head of Department, and Dean of the Faculty of Environmental Design. In 1990, he moved to direct the NSF National Centre for Geographic Information and Analysis (NCGIA) at the State University of New York at Buffalo (SUNY-Buffalo) where he was a Professor of Geography. He has held several visiting appointments in computing, engineering, planning, and geography at the Universities of Illinois, Melbourne, Hong Kong, Bristol, and Michigan, and is currently a Visiting Distinguished Professor at Arizona State University, and an Honorary Professor at Cardiff University. He has been at UCL since 1995 where he set up CASA as an interdisciplinary centre focussed on the development of mathematical models and digital technologies in geographical information science, urban and regional modelling, and the science of cities. CASA has grown to around 50 research and administrative staff in the last 15 years and now has an annual income of around £3 million mainly funded from research grants coming primarily from EPSRC, ESRC, JISC, the EU 7th Framework, and the ERC. -
Azure Forum DK Survey
#msdkpartner #msdkpartner Meeting Ground Rules Please post your questions in the chat – We aim to keep QnA at the end of each session Please mute yourself to ensure a good audio experience during presentations This meeting will be recorded #msdkpartner Today's Agenda 08:30 - 08:35 Welcome 08:35 - 09:15 Best of Build 09:15 - 10:00 Top 5 Reasons to chose azure (vs. on-premise) 10:05 - 10:25 Azure in SMB 10:25 - 10:30 Closing #msdkpartner #msdkpartner Hello! I’m Sherry List Azure Developer Engagement Lead Microsoft You can find me at @SherrryLst | @msdev_dk DevOps with Azure, GitHub, and Azure DevOps 500M apps and microservices will be written in the next five years Source: IDC Developer Velocity 100x 200x 7x 8x faster to set up a more frequent fewer failures on more likely to have dev environment code deployments deployments integrated security Source: DORA / Sonatype GitHub Actions for Azure https://github.com/azure/actions Azure Pipelines AKS & k8s support YAML CI Pipelines YAML CD Pipelines Elastic self-hosted agents Community and Collaboration In modern applications 90% of the code comes Your Code from open source Open Source Most of that code lives on GitHub Sign up for Codespaces Preview today https://github.co/codespaces Security and Compliance 70 Security and Compliance 12 56 10 42 7 LOC (M) LOC 28 5 Security Issues (k) Issues Security 14 2 Lines of code Security threats 0 0 Apr Jul Oct Jan Apr Jul Oct Jan Apr Jul Oct Jan Apr Jul Oct Jan Apr Jul Oct Jan Apr 2015 2015 2015 2016 2016 2016 2016 2017 2017 2017 2017 2018 2018 2018 -
Web Development Frameworks Ruby on Rails VS Google Web Toolkit
Bachelor thesis Web Development Frameworks Ruby on Rails VS Google Web Toolkit Author: Carlos Gallardo Adrián Extremera Supervisor: Welf Löwe Semester: Spring 2011 Course code: 2DV00E SE-391 82 Kalmar / SE-351 95 Växjö Tel +46 (0)772-28 80 00 [email protected] Lnu.se/dfm Abstract Web programming is getting more and more important every day and as a consequence, many new tools are created in order to help developers design and construct applications quicker, easier and better structured. Apart from different IDEs and Technologies, nowadays Web Frameworks are gaining popularity amongst users since they offer a large range of methods, classes, etc. that allow programmers to create and maintain solid Web systems. This research focuses on two different Web Frameworks: Ruby on Rails and Google Web Toolkit and within this document we will examine some of the most important differences between them during a Web development. Keywords web frameworks, Ruby, Rails, Model-View-Controller, web programming, Java, Google Web Toolkit, web development, code lines i List of Figures Figure 2.1. mraible - History of Web Frameworks....................................................4 Figure 2.2. Java BluePrints - MVC Pattern..............................................................6 Figure 2.3. Libros Web - MVC Architecture.............................................................7 Figure 2.4. Ruby on Rails - Logo.............................................................................8 Figure 2.5. Windaroo Consulting Inc - Ruby on Rails Structure.............................10 -
Aquaveo News January 2009 Volume 2 - Issue 1
Aquaveo News January 2009 Volume 2 - Issue 1 INSIDE THIS ISSUE: Arc Hydro Groundwater Tools Version 1.0 Released! 1. Arc Hydro Groundwater Tools ESRI and Aquaveo are pleased to bring you the Arc Hydro Version 1.0 Groundwater Tools to help you better manage your groundwater data Released! within ArcGIS. Based on the Arc Hydro Groundwater data model, the 2. Aquaveo Webinar tools will enable you to take advantage of the ArcGIS platform to Series archive, manage, and visualize your groundwater information. 3. Join the Aquaveo Team Two sets of tools are currently available: 4. Upcoming Training Courses Groundwater Analyst Tools in the Groundwater Analyst will help you import data into your Arc Hydro geodatabase, manage key attributes, and visualize your data. With Groundwater Analyst you will be able to import a variety of datasets (wells, time series, cross sections, volumes) into your EMS-I IS NOW AQUAVEO: Please see Arc Hydro Groundwater on page 2 As of October 1, 2008 ems-i will operate under the name Aquaveo. For Aquaveo Webinar Series more info, please visit our website at: 2009 marks the launch of Aquaveo’s webinar series. The first webinar, www.aquaveo.com/ Spatial Hydrologic Modeling Using GSSHA and WMS , was hosted by merge the Engineering Research and Development Center of the US Army Corps of Engineers and lasted one-hour. Registration was free. A Please see Webinar on page 3 801 302-1400 | [email protected] www.aquaveo.com Page 2 Aquaveo News Arc Hydro Groundwater , continued from page 1 geodatabase, manage symbology of layers in ArcMap and ArcScene, map and plot time series, and create common products such as water level, water quality, and flow direction maps. -
FULLTEXT01.Pdf
UPTEC F 18029 Examensarbete 30 hp Juni 2018 Investigation and Implementation of a Log Management and Analysis Framework for the Treatment Planning System RayStation Elias Norrby Abstract Investigation and Implementation of a Log Management and Analysis Framework for the Treatment Planning System RayStation Elias Norrby Teknisk- naturvetenskaplig fakultet UTH-enheten The purpose of this thesis is to investigate and implement a framework for log management and analysis tailored to the treatment planning system (TPS) Besöksadress: RayStation. A TPS is a highly advanced software package used in radiation Ångströmlaboratoriet Lägerhyddsvägen 1 oncology clinics, and the complexity of the software makes writing robust code Hus 4, Plan 0 challenging. Although the product is tested rigorously during development, bugs are present in released software. The purpose of the the framework is to allow the Postadress: RayStation development team insight into errors encountered in clinics by Box 536 751 21 Uppsala centralizing log file data recorded at clinics around the world. Telefon: A framework based on the Elastic stack, a suite of open-source products, is 018 – 471 30 03 proposed, addressing a set of known issues described as the access problem, the Telefax: processing problem, and the analysis problem. Firstly, log files are stored locally on 018 – 471 30 00 each machine running RayStation, some of which may not be connected to the Internet. Gaining access to the data is further complicated by legal frameworks Hemsida: such as HIPAA and GDPR that put constraints on how clinic data can be handled. http://www.teknat.uu.se/student The framework allows for access to the files while respecting these constraints. -
Fiz: a Component Framework for Web Applications
Fiz: A Component Framework for Web Applications John K. Ousterhout Department of Computer Science Stanford University Abstract Fiz is a framework for developing interactive Web applications. Its overall goal is to raise the level of programming for Web applications, first by providing a set of high-level reusable components that simplify the task of creating interactive Web applications, and second by providing a framework that encourages other people to create addi- tional components. Components in Fiz cover both the front-end of Web applications (managing a browser-based user interface) and the back end (managing the application's data). Fiz makes it possible to create components that encapsulate complex behaviors such as Ajax-based updates, hiding many of the Web's complexities from applica- tion developers. Because of its focus on components, Fiz does not use mechanisms such as templates and model- view-controller in the same way as other frameworks. ger and more useful structures. We will release Fiz in 1 Introduction open-source form and hope to build a user community Although the World-Wide Web was initially conceived that creates an ever-increasing set of interesting com- as a vehicle for delivering and viewing documents, its ponents, which will make it dramatically easier to cre- focus has gradually shifted from documents to applica- ate applications that advance the state-of-the-art in Web tions. Facilities such as Javascript, the Document Ob- interactivity. ject Model (DOM), and Ajax have made it possible to offer sophisticated interactive applications over the The rest of this paper is organized as follows. -
Insight MFR By
Manufacturers, Publishers and Suppliers by Product Category 11/6/2017 10/100 Hubs & Switches ASCEND COMMUNICATIONS CIS SECURE COMPUTING INC DIGIUM GEAR HEAD 1 TRIPPLITE ASUS Cisco Press D‐LINK SYSTEMS GEFEN 1VISION SOFTWARE ATEN TECHNOLOGY CISCO SYSTEMS DUALCOMM TECHNOLOGY, INC. GEIST 3COM ATLAS SOUND CLEAR CUBE DYCONN GEOVISION INC. 4XEM CORP. ATLONA CLEARSOUNDS DYNEX PRODUCTS GIGAFAST 8E6 TECHNOLOGIES ATTO TECHNOLOGY CNET TECHNOLOGY EATON GIGAMON SYSTEMS LLC AAXEON TECHNOLOGIES LLC. AUDIOCODES, INC. CODE GREEN NETWORKS E‐CORPORATEGIFTS.COM, INC. GLOBAL MARKETING ACCELL AUDIOVOX CODI INC EDGECORE GOLDENRAM ACCELLION AVAYA COMMAND COMMUNICATIONS EDITSHARE LLC GREAT BAY SOFTWARE INC. ACER AMERICA AVENVIEW CORP COMMUNICATION DEVICES INC. EMC GRIFFIN TECHNOLOGY ACTI CORPORATION AVOCENT COMNET ENDACE USA H3C Technology ADAPTEC AVOCENT‐EMERSON COMPELLENT ENGENIUS HALL RESEARCH ADC KENTROX AVTECH CORPORATION COMPREHENSIVE CABLE ENTERASYS NETWORKS HAVIS SHIELD ADC TELECOMMUNICATIONS AXIOM MEMORY COMPU‐CALL, INC EPIPHAN SYSTEMS HAWKING TECHNOLOGY ADDERTECHNOLOGY AXIS COMMUNICATIONS COMPUTER LAB EQUINOX SYSTEMS HERITAGE TRAVELWARE ADD‐ON COMPUTER PERIPHERALS AZIO CORPORATION COMPUTERLINKS ETHERNET DIRECT HEWLETT PACKARD ENTERPRISE ADDON STORE B & B ELECTRONICS COMTROL ETHERWAN HIKVISION DIGITAL TECHNOLOGY CO. LT ADESSO BELDEN CONNECTGEAR EVANS CONSOLES HITACHI ADTRAN BELKIN COMPONENTS CONNECTPRO EVGA.COM HITACHI DATA SYSTEMS ADVANTECH AUTOMATION CORP. BIDUL & CO CONSTANT TECHNOLOGIES INC Exablaze HOO TOO INC AEROHIVE NETWORKS BLACK BOX COOL GEAR EXACQ TECHNOLOGIES INC HP AJA VIDEO SYSTEMS BLACKMAGIC DESIGN USA CP TECHNOLOGIES EXFO INC HP INC ALCATEL BLADE NETWORK TECHNOLOGIES CPS EXTREME NETWORKS HUAWEI ALCATEL LUCENT BLONDER TONGUE LABORATORIES CREATIVE LABS EXTRON HUAWEI SYMANTEC TECHNOLOGIES ALLIED TELESIS BLUE COAT SYSTEMS CRESTRON ELECTRONICS F5 NETWORKS IBM ALLOY COMPUTER PRODUCTS LLC BOSCH SECURITY CTC UNION TECHNOLOGIES CO FELLOWES ICOMTECH INC ALTINEX, INC.