1 |
A situation analysis of the security awareness at Software Vendors and how to best inform them about the Microsoft Security Development Lifecycle / Nulägesanalys av säkerhetsmedvetenheten hos programvaruleverantörer och informationsspridningenom Microsoft Security Development LifecycleGunnbäck, Johannes, Mischel, Helena January 2010 (has links)
<p>In January 2002 Bill Gates sent out the renowned "Trustworthy Computing" memo where he announced that the company would shift their focus from adding new features and functionality to security and privacy. This was what led to the formulation of the Security Development Lifecycle (SDL). This process is now mandatoryfor all development at Microsoft with meaningful business risk and/or with accessto sensitive data. The SDL led to great improvements of the number and severityof vulnerabilities in the products that went through the process. When the vulnerabilitiesin the Operation System (OS) were diminished Microsoft noticed thatthe threats moved to the application layer. This led to them wanting to spread their model to application developers. One interesting target group is mid-sized Independent Software Vendors (ISVs), mainly because there are so many of them. Finding out what development process they use today and how they would benefitfrom and could be informed about the SDL is of interest for Microsoft. Interviews with Microsoft evangelists, security experts and representatives from the target group has been preformed to get a better understanding of the situationtoday and how it could be improved. The interviews have resulted in a numberof recommendations for how to adjust the SDL and the information concerningthe process to meet mid-sized ISVs needs. A clear need for information, that is categorized and directed to the different bussiness areas in the software industry, with specific recommendations and courses of action for each of them, has beenidentified. The inter views have also resulted in a situation analysis of the security awareness at the target group today and the experts view of what activities in the SDL they would benefit from. The maturity level amongst the ISVs was found to be low and their own estimated vulnerability level was low. The estimated security awareness in the future on the other hand is high, this can be accounted for the upcoming migration to cloud services that is requested by the customersand the security issues this will lead to. One thing that is agreed upon that would be suitable to introduce is threat modeling. This requires little security knowledge yet leads to dramatic reduction in vulnerabilities. The experts have also shared improvements they think could be made on the SDL.</p>
|
2 |
Caractérisation de mutants d’Arabidopsis thaliana affectés dans le stockage du fer dans leurs graines / Characterization of Arabidopsis thaliana mutants affected in seed iron storageMary, Viviane 12 March 2015 (has links)
Selon l’Organisation Mondiale de la Santé, environ 30% de la population mondiale souffre de carence en fer. Une des stratégies proposées afin d’endiguer l’anémie due à cette carence est d’augmenter le contenu en fer et sa disponibilité dans les parties consommées des plantes, en particulier les graines. Pour répondre à ce défi, il est important de comprendre les mécanismes de stockage du fer dans la graine. Chez la plante modèle Arabidopsis thaliana, le fer est stocké au sein des vacuoles des cellules entourant les tissus vasculaires de l’embryon. Le transporteur AtVIT1 est impliqué dans l’entrée de fer au sein de ces vacuoles. Le mutant vit1-1 présente un patron de distribution du fer modifié : le fer est accumulé dans les cellules sous épidermiques abaxiales des cotylédons et les cellules corticales de la radicule. AtNRAMP3 et AtNRAMP4 fonctionnent de manière redondante permettant la sortie du fer vacuolaire lors de la germination. En conditions de carence en fer, le double mutant nramp3nramp4 présente un arrêt développemental associé à une forte chlorose dus à son incapacité à utiliser ses stocks de fer vacuolaire. Pour identifier de nouveaux gènes impliqués dans l’homéostasie du fer au sein de la graine, nous avons criblé une population de double mutant nramp3nramp4 mutagénisé à l’EMS à la recherche de suppresseurs du phénotype du double mutant sur un milieu carencé en fer. Nous avons nommés ces mutants isv pour “bypass iron storage in vacuoles”. Nous avons confirmé et classifié 29 candidats selon le patron de distribution du fer de leurs embryons : 20 présentent un patron similaire au type sauvage, 3 dont le patron est semblable à celui du mutant vit1-1 et enfin 6 ne présentent pas de colorations dans la plupart de leurs embryons. Les 3 mutants isv présentant un patron similaire à vit1-1ont été caractérisés de manière plus approfondie. Chez deux d’entre eux, nous avons démontré que des mutations dans le gène AtVIT1 sont responsables du phénotype suppresseur. Ce résultat établit un lien génétique et fonctionnel entre le stockage du fer dans les vacuoles endodermiques par AtVIT1 et sa libération par AtNRAMP3 et AtNRAMP4. Le troisième mutant isv au patron semblable à vit1-1 ne porte pas de mutations dans la séquence codante d’AtVIT1. L’identification du gène affecté apportera sans doute des informations sur la régulation de VIT1. Enfin, pour sept autres mutants isv, nous disposons actuellement des populations F2 dont l’analyse par séquençage haut débit permettra de déterminer la mutation responsable du phénotype suppresseur. / Over 30% of the world population is iron deficient (WHO resources). One strategy proposed to fight iron deficiency is to improve iron (Fe) content and availability in crops, especially in seeds. To address this challenge, it is crucial to decipher the mechanisms that control Fe storage during seed development. In Arabidopsis thaliana seeds, iron is stored in the vacuoles of cells surrounding the vasculature of the embryo. The AtVIT1 transporter is involved in Fe influx into vacuoles. The vit1-1 mutant displays an altered Fe pattern: Fe is accumulated in abaxial cells of the cotyledons and radicle peripheral cells. AtNRAMP3 and AtNRAMP4 function redundantly in Fe retrieval from vacuoles during germination. When germinated under iron deficient conditions, nramp3nramp4 double mutant development is altered as a consequence of impaired Fe mobilization. To identify novel genes involved in seed Fe homeostasis, we screened an EMS mutagenized population of nramp3nramp4 for mutations restoring the growth of nramp3nramp4 on low Fe. We named these mutants isv for “bypass iron storage in vacuoles”. The 29 confirmed isv mutants identified by the screen have been classified according to the iron localization pattern in their embryo after Perls/DAB staining: 20 display a wild type pattern, 3 display a pattern of Fe localization similar to vit1-1 mutant and 6 do not show any staining in most embryos. The three isv mutants displaying a vit1-1 like pattern were further investigated. In two of them, mutations in the AtVIT1 gene were shown to be responsible for the suppressor phenotype. This result establishes a genetic and functional link between Fe loading in endodermal vacuoles by AtVIT1 and its retrieval by AtNRAMP3 and AtNRAMP4. The third isv mutant with a vit1-1 like iron localization pattern does not carry any mutation in AtVIT1 coding sequence. Identification of the mutated gene will likely uncover molecular mechanisms regulating VIT1 action. For seven other confirmed isv mutants, F2 populations are available. High-throughput sequencing of batched segregants from these F2 populations will allow to map and identify the mutations causing the suppression.
|
3 |
A situation analysis of the security awareness at Software Vendors and how to best inform them about the Microsoft Security Development Lifecycle / Nulägesanalys av säkerhetsmedvetenheten hos programvaruleverantörer och informationsspridningenom Microsoft Security Development LifecycleGunnbäck, Johannes, Mischel, Helena January 2010 (has links)
In January 2002 Bill Gates sent out the renowned "Trustworthy Computing" memo where he announced that the company would shift their focus from adding new features and functionality to security and privacy. This was what led to the formulation of the Security Development Lifecycle (SDL). This process is now mandatoryfor all development at Microsoft with meaningful business risk and/or with accessto sensitive data. The SDL led to great improvements of the number and severityof vulnerabilities in the products that went through the process. When the vulnerabilitiesin the Operation System (OS) were diminished Microsoft noticed thatthe threats moved to the application layer. This led to them wanting to spread their model to application developers. One interesting target group is mid-sized Independent Software Vendors (ISVs), mainly because there are so many of them. Finding out what development process they use today and how they would benefitfrom and could be informed about the SDL is of interest for Microsoft. Interviews with Microsoft evangelists, security experts and representatives from the target group has been preformed to get a better understanding of the situationtoday and how it could be improved. The interviews have resulted in a numberof recommendations for how to adjust the SDL and the information concerningthe process to meet mid-sized ISVs needs. A clear need for information, that is categorized and directed to the different bussiness areas in the software industry, with specific recommendations and courses of action for each of them, has beenidentified. The inter views have also resulted in a situation analysis of the security awareness at the target group today and the experts view of what activities in the SDL they would benefit from. The maturity level amongst the ISVs was found to be low and their own estimated vulnerability level was low. The estimated security awareness in the future on the other hand is high, this can be accounted for the upcoming migration to cloud services that is requested by the customersand the security issues this will lead to. One thing that is agreed upon that would be suitable to introduce is threat modeling. This requires little security knowledge yet leads to dramatic reduction in vulnerabilities. The experts have also shared improvements they think could be made on the SDL.
|
4 |
Monotonic Plasticity-Damage and Fatigue Life Model Correlations on Aisi 4140 SteelGomez, Rodolfo Andres 11 August 2007 (has links)
A microstructure-based plasticity-damage model is used to predict the mechanical behavior of commercially available AISI 4140 steel. Monotonic tension, compression and torsion tests were performed to obtain the set of plasticity and damage constants required for model calibration. Then, tension tests on Bridgman notched specimens were undertaken to study the damage-triaxiality dependence. Three different notch radii generated different levels of triaxiality at the notch. The modeled triaxiality-damage correlation was validated with SEM fracture surface analysis. Stress-strain correlations under different strain rate and temperature testing conditions were also studied. Little influence of the strain rate was observed. A preliminary study in high-porosity LENS materials was later performed, with satisfactory stress-strain correlation at two different temperatures on tension tests. Finally, a multistage fatigue model was used to predict life in AISI 4140 steel. The goal was to create a baseline for future application of these mathematical models into LENS manufactured materials in component design
|
5 |
Using internal state variables to model shear influenced plasticity and damage effects of high velocity impact of ductile materialsPeterson, Luke Andrew 03 May 2019 (has links)
A physically motivated Internal State Variable (ISV) constitutive model is extended to account for shear influenced void evolution for predicting damage behavior in ductile solids. The revised ISV model is calibrated for an aluminum 7085-T711 alloy using a series of microstructure and mechanical property quantification experiments. The calibrated ISV model for the aluminum alloy is implemented in an implicit finite-element code (Abaqus) to simulate the deformation of notch Bridgman tension specimens at a variety of stress states and temperatures. The model revisions and calibrated aluminum ISV model are validated through successful prediction of mechanical and microstructure evolution for structures subjected to a variety of complex stress state conditions. The extended ISV model framework is used to study shear influenced plasticity and damage mechanisms resulting from ballistic impact of metals. A Rolled Homogeneous Armor (RHA) steel alloy is selected for the impact model due to wide availability of documented penetration characteristics and ballistic performance data of RHA steel. Finite Element Analysis (FEA) simulations of ballistic impact of rolled homogeneous armor (RHA) steel projectiles against RHA steel plates are performed using a calibrated ISV constitutive model for RHA steel. An FEA simulation based parametric study is performed to assess the effect of a variety of microstructure and mechanical properties on the ballistic performance of RHA steel targets. FEA simulations are used to predict a transition in ballistic perforation mechanisms for high hardness steel alloys by accounting for variations in microstructure properties qualitatively documented in the literature.
|
6 |
DISPERSION OF CARBON NANOTUBE CLUSTERS VIA THE RAPID VAPORIZATION OF INTERSTITIAL LIQUIDCraig, Glenn R. 11 June 2014 (has links)
No description available.
|
7 |
Informationssäkerhet i verksamheter : begrepp och modeller som stöd för förståelse av informationssäkerhet och dess hantering i verksamheterOscarson, Per January 2001 (has links)
<p>Verksamheters säkerhetsproblem i samband med informationssystem och informationsteknik (IS/IT) är ett område som uppmärksammats kraftigt de senaste åren. Denna avhandling syftar till att ge en ökad förståelse av informationssäkerhet; begreppet i sig, dess hantering i</p><p>verksamheter samt dess betydelse för verksamheter. För att nå en ökad förståelse för informationssäkerhet och dess hantering består avhandlingen till stora delar av konceptuella resonemang. Avhandlingens huvudsakliga kunskapsbidrag är:</p><p>- En kritisk granskning och en revidering av den begreppsapparat som dominerar i Sverige inom området informationssäkerhet och dess hantering.</p><p>- En generisk modell (ISV-modellen) avseende verksamheters hantering av informationssäkerhet.</p><p>ISV-modellen beskriver vilka grundläggande förutsättningar, aktiviteter, resultat och konsekvenser som kan kopplas till hantering av informationssäkerhet i verksamheter. Informationssäkerhetsområdet betraktas utifrån ett perspektiv som har sin grund i Skandinavisk informationssystemforskning. Ett viktigt kännetecken hos detta perspektiv är att IS/IT betraktas i en verksamhetskontext där bl a människors roller och aktiviteter utgör en viktig del.</p><p>Studien bygger på både teoretiska och empiriska studier som har skett parallellt och genom växelverkan. De teoretiska studierna har främst bestått av litteraturstudier och konceptuellt modellerande som har konfronterats med empiriskt material vilket huvudsakligen har hämtats genom en fallstudie på en kommun i Bergslagen.</p>
|
8 |
Sales and Marketing Strategy in the IT Industry - Collaborating with Independent Software VendorsAntvik, Niklas, Bihammar, Patrik January 2005 (has links)
<p>The IT industry is characterised by rapid changes and an increased level of consolidation and competition. Hardware and software developers are moving away from proprietary technologies to open-standards based technology. This makes it more difficult for large hardware vendors, such as Hewlett Packard (HP) and IBM, to lock their customers and partners to proprietary solutions. Therefore, in order to keep and increase its market share, HP needs to improve its collaboration with partners. The partners, especially local and regional independent software vendors (ISV), are important due to their applications focused on solving business problems, their ability to provide industry relevance to HP’s products and their ability to influence what kind of hardware and software platforms the end-customers will choose.</p><p>We have identified key market characteristics, the ISVs’ key needs and challenges, as well as what they consider crucial in order for them to recommend a certain vendor’s hardware platform. Companies in the IT industry face several unique challenges; one is that there often exist conflicting interests between the different industry members, e.g. competitors collaborating with each other. This puts extra pressure on clarifying the rules of engagement between the collaborating parties. The ISVs are generally agnostic to which hardware platform the customers buy as long as their applications run on the specific platform, therefore the ISVs’ vendor preference is often based on more intangible relationship factors. Factors that affect and decide the ISVs’ preference are e.g. their existing vendor relationships, ease of doing business, clear point of contact and clear rules of engagement. Furthermore, many of the ISVs are interested in having joint- business planning and go-to-market strategies with HP. In order to leverage hardware, we recommend that HP tries to tie the ISVs to them and form closer relationships with the ISV community. (HP must however carefully evaluate the value of the individual ISVs and what they can offer.)</p><p>The recommendations consist mainly of how to select the relevant ISVs and, after the selection, how the ISVs should be categorised and managed by utilising HP’s partner portal for developers. This would enable HP to engage more efficiently with key partners, which in turn would lead to increased leverage of HP hardware.</p>
|
9 |
Sales and Marketing Strategy in the IT Industry - Collaborating with Independent Software VendorsAntvik, Niklas, Bihammar, Patrik January 2005 (has links)
The IT industry is characterised by rapid changes and an increased level of consolidation and competition. Hardware and software developers are moving away from proprietary technologies to open-standards based technology. This makes it more difficult for large hardware vendors, such as Hewlett Packard (HP) and IBM, to lock their customers and partners to proprietary solutions. Therefore, in order to keep and increase its market share, HP needs to improve its collaboration with partners. The partners, especially local and regional independent software vendors (ISV), are important due to their applications focused on solving business problems, their ability to provide industry relevance to HP’s products and their ability to influence what kind of hardware and software platforms the end-customers will choose. We have identified key market characteristics, the ISVs’ key needs and challenges, as well as what they consider crucial in order for them to recommend a certain vendor’s hardware platform. Companies in the IT industry face several unique challenges; one is that there often exist conflicting interests between the different industry members, e.g. competitors collaborating with each other. This puts extra pressure on clarifying the rules of engagement between the collaborating parties. The ISVs are generally agnostic to which hardware platform the customers buy as long as their applications run on the specific platform, therefore the ISVs’ vendor preference is often based on more intangible relationship factors. Factors that affect and decide the ISVs’ preference are e.g. their existing vendor relationships, ease of doing business, clear point of contact and clear rules of engagement. Furthermore, many of the ISVs are interested in having joint- business planning and go-to-market strategies with HP. In order to leverage hardware, we recommend that HP tries to tie the ISVs to them and form closer relationships with the ISV community. (HP must however carefully evaluate the value of the individual ISVs and what they can offer.) The recommendations consist mainly of how to select the relevant ISVs and, after the selection, how the ISVs should be categorised and managed by utilising HP’s partner portal for developers. This would enable HP to engage more efficiently with key partners, which in turn would lead to increased leverage of HP hardware.
|
10 |
Intraseasonal Variability Of The Northeast Indian Ocean Circulation In An Ocean ModelSenan, Retish 07 1900 (has links) (PDF)
No description available.
|
Page generated in 0.0266 seconds