• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 4
  • 3
  • 1
  • Tagged with
  • 10
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

DATA SECURITY IN SOLID STATE DISKS

Fitzgerald, Alan 10 1900 (has links)
ITC/USA 2005 Conference Proceedings / The Forty-First Annual International Telemetering Conference and Technical Exhibition / October 24-27, 2005 / Riviera Hotel & Convention Center, Las Vegas, Nevada / Solid state disk characteristics make them ideal for data collection in both harsh environments and secure telemetry application. In comparison to their magnetic counterparts, solid state disks are faster, more reliable, extremely durable and, with changing economies and geometries, more affordable and available in higher capacities than ever before. This paper will discuss solid state disk storage, access controls, and data elimination in relation to various telemetry scenarios. The reader will be introduced to the operational considerations of solid state disk data security and the underlying technical concepts of how these are implemented.
2

Data Protection and Data Elimination

Budd, Chris 10 1900 (has links)
ITC/USA 2015 Conference Proceedings / The Fifty-First Annual International Telemetering Conference and Technical Exhibition / October 26-29, 2015 / Bally's Hotel & Convention Center, Las Vegas, NV / Data security is becoming increasingly important in all areas of storage. The news services frequently have stories about lost or stolen storage devices and the panic it causes. Data security in an SSD usually involves two components: data protection and data elimination. Data protection includes passwords to protect against unauthorized access and encryption to protect against recovering data from the flash chips. Data elimination includes erasing the encryption key and erasing the flash. Telemetry applications frequently add requirements such as write protection, external erase triggers, and overwriting the flash after the erase. This presentation will review these data security features.
3

Erasure: An Additive and Subtractive Act

Davids, Margaret 01 January 2019 (has links)
MOTIVATION In the simplest form, a pencil mark on a page is removed by a traditional rubber eraser. However, the marks are often never fully removed, and the paper thins with each attempt to rub out an old idea. But how does one erase a chair? A pilaster? A room? A building?... More importantly, how does the subtractive act of erasing become an additive one? The historical fabric of a building is important; it is also imperative that it does not remain stagnant. Erasing is an opportunity to design an interior environment that both acknowledges the traces of the pencil marks and the eraser. It is an opportunity to learn from historic design strategies and thoughtfully transition into the present to create a living, breathing palimpsest (Plesch, 2015). PROBLEM Current preservation policies and landmarking tactics arguably contradict preservationists’ claims of promoting environmental, economic, and social growth within communities by exempting historical buildings from complying with codes and regulations which consequently use property that could be more sustainably employed. Historical preservation is largely based in social constructs; therefore, present policies should be reflective of societal changes. At times, the act of preserving often removes these buildings from the possibility of a relevant and functional future by attempting to keep them wedged within historical restraints (Avrami, 2016). METHOD Research of precedent incidents of erasure with applications to concepts involving historical preservation and restoration in the fields interior design and architecture will influence the design approach. These precedent studies will include works by Carlo Scarpa, Peter Zumthor, and David Chipperfield. To supplement these studies, other artistic disciplines and artists, including Robert Rauschenberg, will be researched to holistically comprehend approaches to the concept of erasing. The execution of explorations of erasing different objects and media to better understand the process of erasure will also be imperative. These experimentations will include the strategic erasing of pencil sketches and common objects to investigate how to best represent an object that has been erased. PRELIMINARY RESULTS The approach to erasing the historical fabric of a building is largely dependent on the building itself. This is evident in Scarpa’s attention to the physical and metaphorical joinery of new and existing structures in his design of Palazzo Abatellis, Zumthor’s weaving of old and new brickwork at Kolumba, and Chipperfield’s use of exposed ruins in his design strategy for the Neues Museum (McCarter, 2013; Carrington, 2008; RYKWERT, 2009). The process of erasure within the realm of preservation is a constant and demonstrates how the act of erasing allows opportunities for the existence of something new (Katz, 2006). CONCLUSION Choosing to re-program and systematically erase a section of a historically significant but outdated medical tower as a collective art studio space would introduce the opportunity to design an “erased space “as an environment for post-graduate art students to produce creative work. This space would strengthen the growing bond between a school of the arts and a historic medical school while contributing to the culture of the surrounding neighborhoods and contribute to the rich tradition of art within the city.
4

Data Remanence : Secure Deletion of Data in SSDs

Homaidi, Omar Al January 2009 (has links)
The ongoing fast pace research in hardware and software technology has resulted in memory devices efficient and faster than ever before. However, the issue of security of the contained data is rarely discussed. There is an evident capability of these devices to retain data even when it is erased. In this thesis, a study is conducted to qualitatively analyze the extent to which data deletion is important and why secure deletion should be applied. Afterwards, following the sequential exploratory procedure, this paper presents an analysis of methods used to recover the data after being deleted in addition to the techniques used to securely delete this data. Based on this study, some recommendations are made to ensure the safety of data.
5

The implementation of the electronic whiteboard in a private hospital: challenges experienced by nurses in Gauteng

Hwindingwi, Praxedis Paidamoyo 22 July 2014 (has links)
The purpose of this study was to investigate challenges experienced by nurses in the use of electronic whiteboards at one private hospital in the Gauteng province in South Africa. The researcher had observed a continuation of use of the manual dry-erase patient whiteboards in parallel to the use of new the electronic whiteboards in a ward, yet the electronic whiteboard had been implemented to replace the manual system in order to improve service delivery. A descriptive, quantitative study design was used for the study, with n=83 participants being voluntarily surveyed at the hospital over a one month period. The major findings were that the new electronic whiteboards were not always online which necessitated a parallel manual system as backup. Secondly, 47.5% of the respondents requested more training on the whiteboards. A needs assessment to determine training requirements and further investigation into the frequent unavailability of the electronic whiteboards is recommended / Health Studies / M.A. (Public Health - with specialisation in Medical Informatics)
6

The implementation of the electronic whiteboard in a private hospital : challenges experienced by nurses in Gauteng

Hwindingwi, Praxedis Paidamoyo 22 July 2014 (has links)
The purpose of this study was to investigate challenges experienced by nurses in the use of electronic whiteboards at one private hospital in the Gauteng province in South Africa. The researcher had observed a continuation of use of the manual dry-erase patient whiteboards in parallel to the use of new the electronic whiteboards in a ward, yet the electronic whiteboard had been implemented to replace the manual system in order to improve service delivery. A descriptive, quantitative study design was used for the study, with n=83 participants being voluntarily surveyed at the hospital over a one month period. The major findings were that the new electronic whiteboards were not always online which necessitated a parallel manual system as backup. Secondly, 47.5% of the respondents requested more training on the whiteboards. A needs assessment to determine training requirements and further investigation into the frequent unavailability of the electronic whiteboards is recommended / Health Studies / M.A. (Public Health - with specialisation in Medical Informatics)
7

Dismemory: On history, the Southern imaginary, and abusing the visual record

Shelton, Matthew Pendleton 24 April 2012 (has links)
Using the literary device of a fictional interview between the artist and a sympathetic intellectual, I explore concepts relating to subjectivity, pedagogy, memory, “Southernness,” whiteness, the deceptive nature of images, social justice, and 20th century art as they relate to a contemporary artistic practice.
8

Faculty Senate Minutes March 5, 2012

University of Arizona Faculty Senate 05 March 2012 (has links)
This item contains the agenda, minutes, and attachments for the Faculty Senate meeting on this date. There may be additional materials from the meeting available at the Faculty Center.
9

Synthesis and modification of abiotic sequence-defined poly(phosphodiester)s / Synthèse et modification de poly(phosphodiester)s non-biologiques contenant des séquences codées de monomères

König, Niklas Felix 03 September 2018 (has links)
Récemment, la chimie des phosphoramidites s’est montrée efficace et polyvalente en tant que plateforme pour accéder à des poly(phosphodiester)s à séquence définies abiotiques. Grâce à cette stratégie, les monomères peuvent être placés dans la chaîne à des positions choisies, ouvrant la voie à de nombreuses possibilités pour la préparation de macromolécules fonctionnelles. Ici, la méthode phosphoramidite a été explorée pour la synthèse de polymères dits numériques, qui contiennent des séquences de monomères encodées binairement. Des polymères dont les longueurs de chaînes et les séquences numériques sont contrôlées ont été préparés en utilisant une stratégie phosphoramidite classique impliquant des groupements protecteurs diméthoxytrityles, ou bien un procédé photocontrôlé faisant intervenir des groupements nitrophénylpropyloxycarbonyles clivables à la lumière. En outre, plusieurs stratégies pour modifier l’information contenue dans les chaînes latérales ont été étudiées dans cette thèse. Une modification binaire post-polymérisation à travers deux cycloadditions alcyne-azoture catalysées par le cuivre(I) consécutives a été examinée pour optimiser les chaînes latérales des poly(phosphodiester)s à séquences définies. De plus, la libération photocontrôlée de différents motifs éthers ortho-nitrobenzyliques latéraux a été étudiée. Ces fonctions ont permis la conception d’oligo(phosphodiester)s numériques dont les séquences d’information peuvent être effacées ou révélées grâce à la lumière. / Phosphoramidite chemistry has recently been evidenced to be an efficient and versatile platform to access sequence-defined abiotic poly(phosphodiester)s. Using this strategy, monomers can be placed at defined positions positions in a chain, thus opening up wide possibilities for the preparation of functional macromolecules.Here, the phosphoramidite platform was explored to synthesize so-called digital polymers, which contain monomer-coded binary sequences. Polymers with controlled chain lengths and digital sequences were prepared using either a standard phosphoramidite strategy involving dimethoxytrityl protective groups or a photo-controlled process involving light-cleavable nitrophenylpropyloxycarbonyl protective groups. Additionally, several strategies to modify the side chain information were investigated in this thesis. A binary post-polymerization modification by means of sequential copper(I)-catalyzed alkyne-azide cycloadditions was investigated for tuning the side chain functionality of sequence-defined poly(phosphodiester)s. Moreover, the photo-controlled release of several ortho-nitrobenzylic ether side chain motifs was studied. These moieties allowed the design of digital oligo(phosphodiester)s whose sequence information can be erased or revealed with light as a trigger.
10

Sanitization of embedded network devices : Investigation of vendor’s factory reset procedure

Larsson, Magnus January 2015 (has links)
Embedded devices such as routers, switches, and firewalls commonly have sensitive information stored on them such as passwords, cryptographic keys, and information about the network around them and services that these device(s) provide. When disposing of or reselling this equipment in the secondary market it is crucial to erase this sensitive information. However, there is an important question that must be asked: Do the erase commands and routines offered by the device manufacturers actually erase the sensitive data? This thesis investigates methods and tools to determine the completeness of this erasure in some common network devices. These methods are used on a sample of networking equipment found to still contain sensitive information after being erased according to vendor recommendations. A computer program was developed to show how this information can be removed. The information in this document is useful for equipment owners, brokers and others looking to remarket their current equipment; all of whom want to minimize the risk of leaking sensitive data to other parties. / Nätverksutrustning såsom routrar, switchar och brandväggar har ofta känslig information lagrad internt, som lösenord, kryptografiska nycklar, information om nätverket runt dem samt tjänster de tillhandahåller. Om denna utrustning ska säljas på andrahandsmarkanden eller på annat sätt byta ägare är det viktigt att all känslig information raderas.  Men kan man lita på att raderings rutiner och metoder som tillhandahålls av tillverkaren verkligen raderar känslig data? Denna avhandling undersöker lämpliga verktyg och metoder för att granska vilken information som minnen i inbyggda system innehåller. Dessa metoder testas praktiskt på några system som visar sig ha kvar känslig information efter att de raderats enligt tillverkarens rekommendationer. Ett datorprogram som demonstrerar hur denna information kan undersökas och raderas finns med som en del av avhandlingen. Informationen i detta dokument är användbar för ägare av datakomutrustning, mäklare av sådana samt andra som vill minimera risken för att läcka känslig information vid återförsäljning av sin begagnade utrustning.

Page generated in 0.4381 seconds