Role-based access control for publishsubscribe middleware architectures
Adobe Experience Manager Forms产品概述说明书
Digital self-service is the new normal. Customers expect compelling, convenient digital experiences any time, on any device—and they are demanding the same from the financial services industry,government agencies and other regulated businesses. To meet the demand, these organizations are now making complex, high-value transactions such as mortgage applications, benefits enrollments and more easily accessible onto digital channels—from web or mobile.Creating streamlined, personalized digital enrollment, onboarding and communications significantly accelerates revenue, cost efficiency and client satisfaction. With 70% of FSI executives believing mobile will be a major source of new accounts in the next three years, offering mobile-friendly enrollment to all clients on all devices is now an imperative.1 Digitizing transactions and communications also eliminates paper-based costs. Printing, distribution and storage of paper disappears, while low value manual tasks like data rekeying and document routing can also be streamlined. As the quality of digital experiences increases, so does adoption of more efficient digital channels over costly alternatives such as in-person, mail, or call center based communication. A Deloitte report found that the average in-person transaction costs a government agency almost 17 dollars, while a digital transaction for the same process cost merely 40 cents.2 With digital being over 40 times more cost efficient than in-person processing, it's no surprise that organizations across regulated industries are prioritizing digital self-service as part of their transformation initiatives.1. Digital Trends in Financial Services Industry, eConsultancy & Adobe, 20172. Deloitte Access Economics, Digital Government Transformation, Commissioned by Adobe, 2015Key Capabilities• Author—empower business users to quickly design, approve, and publish centrally-managed forms and communications.• Discover—help users quickly find relevant forms and documents through search, rules, filters, and even geolocation.• Enroll—streamline enrollment with mobile-optimized adaptive forms to reduce abandonment.• Process—digitize and automate onboarding processes through visually-designed workflows.• Communicate—design, generate, and delivery multi-channel,personalized communications to increase engagement and retention.• Secure—protect your valuable documents through customizable role and access policies and encryption, even outside of your organization’s firewall.• Improve—optimize your enrollment experiences with granular analytics and targeted content to personalize the experience to each customer.Adobe Experience Manager FormsStreamline enrollment, onboarding and multi-channel communications with digital forms and documents.Adobe Experience ManagerA state development bank reduced processing times by over 50%.Learn howA global bank increased conversion rates on some applications from 33 to 80%.Learn howAdobe Experience Manager FormsAdobe Experience Manager Forms helps organizations deliver secure, streamlined application enrollment across any device, process submissions efficiently with automated workflows, and enable personalized onboarding and communications for standout customer experience that increases conversion, retention, and client satisfaction.Businesses and government agencies use Experience Manager Forms to:• Accelerate digital enrollment conversion by pre-filling form fields from back-end systems, enabling seamless multidevice interactions and measuring abandonment rates at form field levels.• Lower the cost of processing applications with end-to-end digital workflows and digital signatures.• Deliver multichannel interactive communications with batch and on-demand statements and welcome kits for web, print and PDF channels.• Increase business agility and scale by empowering business users to author, publish, and manage centralized form and document collections through an intuitive, drag & drop user interface.• Increase field agent productivity with offline mobile data capture and back-end data integrations.• Improve regulatory compliance by ensuring secure transmission of personally identifiable information (PII)in forms, generating documents of record for audit trails, encrypting sensitive documents, and aligning with accessibility standards.Key features of Adobe Experience Manager FormsAuthorReach more clients faster by empowering business users to author, publish, and manage responsive and consistent forms and documents across multiple channels without coding.• Use a central repository and business-friendly UI for creating, editing, and managing forms and documents.• Author a form once and render it across multiple screens, channels, and formats, even print.• Drag and drop the standard components you need, such as text fields, pull-down menus, buttons, charts, electronic signature capture, and more.• Leverage out-of-the-box style themes and form and document templates, or create your own.• Create reusable form or document fragments, such as address block fields or standard paragraphs of text, and share and update across many forms or documents.• Add dynamic behavior or web services integrations to forms without coding using a visual rule editor.• Debug forms quickly with built-in development tooling.• Preview how forms and documents will look on different devices and screens before publishing.• Send form and document templates for content and branding review by stakeholders using customizable, automated workflows.• Localize forms and documents by taking advantage of workflows that connect to machine or human translation services.Get offers to market quickly by leveraging themes, templates, drag-and-drop content authoring, and more. DiscoverHelp organizations connect clients with the form they need, streamlining the digital enrollment journey.• Drag and drop a forms portal into your existing websites or ones built with Experience Manager Sites.• Allow clients to search for forms in the portal using keywords, tags, or other properties such as date last modified.• Embed links to abandoned forms via an email campaign delivered using Adobe Campaign to re-targetlost customers.Facilitate form discovery for your customers to accelerate enrollment and decrease customer support costs.EnrollMake easy for customers to complete forms on any device quickly and error-free.• Organize forms into sections that update based on user input to simplify filling on all devices.• Support for accessibility standards including Section 508 and WCAG.• Pre-fill form fields through easy integration with CRM systems, social logins, or use web services to populate fields based on user input.• Reduce keystrokes by taking advantage of device features, such as camera, barcode scanning, or speech-to-text.• Capture secure, legal, and compliant e-signatures using native integration with Adobe Sign.• Validate form fields such as phone and address and offer context-sensitive Help to reduce the possibilityof errors.• Allow clients to save in-progress forms and return later to complete them, even on another device.• Verify submissions with CAPTCHA support.Simplify form filling by using device cameras to read barcodes and fill in information via web services. ProcessProcess submissions quickly by connecting form data with existing back office systems, business rules, workflows and people.• Build digital workflows to process submitted form applications easily with a drag-and-drop interface.• Perform actions such as view assigned tasks, track progress, review, approve, reject, and more.• Use a customizable mobile app that allows mobile workers to securely collect and record data across multiple forms on tablets or smartphones, even when offline.• Speed integration with your back-end and third-party applications with a data integration tool, create a form data model, or leverage out-of-the-box connectors to popular RDBMS and CRM systems.• Support complex e-signature requirements with Adobe Sign, including multiple signers, sequential and parallel signing workflows, anonymous user signing, and verifying signer identity.• Leverage document generation workflows to automatically generate, deliver, and archive branded PDF documents of record.The Experience Manager Forms App allows field workers to securely captureinformation and submit data via forms while on the go—even offline. CommunicateImprove client retention and satisfaction with personalized, interactive and engaging communications and documents. • Create and approve communications letters quickly with a business-user friendly agent interface that allows agents to author letters using templates, preapproved content blocks, business rules, and more—for web, print and PDF channels.• Generate engaging Interactive Communications in responsive documents, including dynamic charts and personalized marketing offers to drive effective upsell and cross-sell.• Connect back-end data sources to automatically personalize communications at scale.• Preview responsive documents for different devices before publishing.• Support on-demand or automated batch document delivery through multiple channels, including web portals, mobile apps, PDF, email, and paper.• Optionally validate content integrity and signer’s identity with digital signatures for PDF documents.• Automatically generate, delivery, and archive branded customer communicationsInteractive Communications features personalize engagement and improve retention.SecureProtect sensitive information contained in PDF and Microsoft Office documents based on business policy, even outside of your organization's firewall.3• Use strong encryption to protect information contained in documents.• Tailor document access and usage rights to the sensitivity of the information, and track its use.• Protect bulk or system-generated documents, such as statements.• Revoke usage rights at any time—even if the document has been distributed outside the organization.• Work in conjunction with strong user authentication systems, including single sign-on (SSO), security assertion markup language (SAML), and public key infrastructure (PKI).• Store protected documents through integration with Experience Manager Assets or ECM systems.• Visually track document usage and detect anomalies with the Data Workbench capability in Adobe Analytics. OptimizeWork with other Adobe Experience Cloud solutions to continually improve customer experiences, maximizing conversion rates and satisfaction.• Understand how users interact with forms and documents using out-of-the-box reports in Adobe Analytics.• Drill down into report details to pinpoint form abandonment at the form field level, generating actionable insights to improve conversion.• Use A/B testing in Adobe Target to test new form or document versions, monitor the test, and automatically publish better performing versions.• Engage customers and increase cross-sell opportunities by inserting personalized and dynamic content into responsive forms and documents with Experience Targeting, powered by Adobe Target.• Accelerate going paperless with Automated Forms Conversion powered by machine learning and Adobe Sensei. Convert legacy PDF forms to responsive forms, extract reusable fragments, and continuously improveform collections.Gain insight into form or document usage with Adobe Analytics reports.3. Requires purchase of Document Security add-onBeyond product innovation: Transform the customer journeyAdobe is committed to developing industry-leading solutions. We also offer essential resources to help you transform your entire organization to deliver better digital experiences. Here are some key resources to help you lead and succeed.Adobe, the Adobe logo, and Acrobat are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries. All other trademarks are the property of their respective owners.© 2018 Adobe Systems Incorporated. All rights reserved.For more information/go/aemAbout Adobe Experience ManagerAdobe Experience Manager allows marketers and developers to create, manage, and deliver customer-facing digital experiences across everychannel—web, mobile, social, video, in-store, and IoT. The solution spans digital experience management including web and mobile, digital asset management, social communities, and forms and documents. Adobe Experience Manager integrates with other Adobe solutions, allowing businesses to use data insights to deliver targeted content to identified segments and transform content into engaging, personalized experiences—optimizing customer engagement and lead generation and accelerating revenue.。
Role-Based Access Control
Figure 11-1(a). Taxonomy of RBAC Models Figure 11-1(b). Taxomony of ARBAC Models (11) NetWare 4 as an Example ofRole-Based Access ControlJeremy Epstein, Cordant, Inc., and Ravi Sandhu, George Mason Universityjepstein@, 11400 Commerce Park Drive, Reston VA 22091sandhu@, Department of Information and Software Systems Engineering,Fairfax, VA 220301.0IntroductionIn [SAND96a], the second author describes a taxonomy of role-basedaccess control (RBAC) models, divided into four classes shown inFigure 11-1(a), Taxonomy of RBAC Models . A complementary set ofmodels is used for administrative role-based access control (ARBAC), asshown in Figure 11-1(b), Taxonomy of ARBAC Models . In this positionpaper, we describe how the RBAC and ARBAC models can be partiallyimplemented using unmodified NetWare 4 servers.2.0NetWare Access Control PoliciesNetWare includes two major types of objects with separate but interrelatedsecurity policies. NetWare Directory Services (NDS) objects representabstractions such as users, roles, groups, and computers, while file systemobjects provide a traditional hierarchical file system. Both file and NDSobjects are supported by sophisticated access control mechanisms thatallow assignment of rights to users, groups, and other entities. In addition,they allow rights assignments to be inherited in a hierarchical fashion.Most importantly, they allow assignment of access rights in a granularfashion: rights to a file or directory can be controlled independently fromThe tree structure does not include anything akin to a “hard” link in a UNIX file system. However, objects of 1class Asias can be used to provide a symbolic link-like capability.Figure 11-2. Sample NDS Structurethe ability to change file or directory access rights. That is, a user can,through a role, be granted the ability to read, write, create, or delete fileswithout having any ability to share those files with others.2.1NDS Object Access Control PolicyNDS is an X.500-like system for managing data that represents anorganization's assets. Every object in NDS has a class, which is defined inthe schema . The schema contains approximately 20 built-in classes (e.g.,User, Organization), and can be extended by authorized users. Dependingon the class of an object, it will have one or more attributes , also known asproperties . Attributes are used to store information about some aspect ofan object. For example, an object of class User has attributes to representthe person's name, home directory, login script, etc. Some attributes aresecurity relevant (e.g., those relating to passwords) while others are not(e.g., the user's telephone number).NDS objects are organized in a tree, much as many file systems organizefiles and directories into a tree . NDS objects are either container objects,1which correspond to directories in a file system, or leaf objects, whichcorrespond to files in a file system. Whether an object is a container orleaf object is determined by its class, as defined in the NDS schema.Figure 11-2, Sample NDS Structure , shows an NDS structure that mightrepresent an organization. Objects are named by their complete path to theroot, starting at the leaf. For example, Sally.Finance.Acme is the completename of the left-most node in the tree.Users log in to NetWare servers by providing the name of their NDS Userobject. When presented with the proper password (and meeting otherrestrictions, such as an unexpired account), the user is logged in, and his or2her security equivalence list, which is used in calculating access rights, iscomputed as follows:All users are security equivalent to the pseudo-object named [Public].Users are security equivalent to all container objects in the path fromtheir User object to the root of the tree, designated [Root], includingboth themselves and [Root].Users are security equivalent to those objects to which they areexplicitly made security equivalent by the administrator.All rights in NDS are passed through security equivalence. Groupmembership is just one example of security equivalence, but does not playany special role (contrary to what is stated in [SCHA94]).Note that users cannot choose a subset of security equivalences to be usedfor a session: they gain all security equivalences. Thus, a given user maybe represented by several NDS User objects to reflect different uses of thesystem (e.g., as an administrator or as an ordinary user). The user wouldselect which NDS User object to use, depending on the task to beaccomplished.While NDS can be configured in many different ways, typicalconfigurations allow administrative users (but not ordinary users) to createand delete NDS objects in one or more containers. Administrative userscan usually modify the attributes of NDS objects that they are responsiblefor. Non-administrative users may be able to modify some of the attributesof their User objects, such as the Login Script or Telephone Numberattributes.2.1.1NDS Object Access Control AlgorithmEvery NDS object has an Access Control List (ACL), which is stored as anattribute of the NDS object. An ACL is a list of triples, where theelements of the triple are as follows:The subject name, which is either the name of an NDS object (e.g., aspecific User, Group, or Organization), or a pseudo-ID such as [Root],[Public], or [Inherited Rights Filter] (abbreviated IRF).Protected attribute, which for NDS object rights calculation is thereserved symbol [Entry Rights].Access rights, which is zero or more of Supervisor, Create, Delete,Rename, and Browse. The Supervisor right implies all other rights.An object O1's rights to object O2 is computed as follows:For each object O' to which O1 is security equivalent, compute therights for O' to O2 by searching from the root of the tree toward O2.2“Security equivalence” is a misnomer. Security equivalences are neither transitive nor reflexive.R, which is initially empty, represents the object rights O' has to O2.For each node N along the path, perform the following steps:-If N's ACL includes an entry with the subject name [InheritedRights Filter] and a protected attribute of [Entry Rights], thenremove all access rights from R except those listed in the IRF.-If N's ACL contains an entry with the subject name of O' and aprotected attribute of [Entry Rights], then set R to the accessrights for the entry.Union the value of R calculated in the first step for each O' together,yielding the rights of O1 to O2.This algorithm allows setting an ACL at one location in the NDS tree andallowing the rights to flow down using inheritance. For example, inFigure 11-1, if Edward.Acme has the Supervisor right to the Acme object,then he will have the Supervisor right (and therefore all rights) to allobjects in the NDS tree (unless they are blocked with an IRF). IfSally.Finance.Acme is made security equivalent to Edward.Acme, then shewill also have the Supervisor right to all objects. An alternate method is toassign Admin.Acme the Supervisor right to Acme, and makeEdward.Acme security equivalent to Admin.Acme. In this case,Sally.Finance.Acme would not gain the Superviso r right to Acme unlessshe is security equivalent to Admin.Acme (i.e., she does not obtain therights transitively through Edward.Acme).Note that groups are simply a particular case of security equivalence in thisscheme: assigning rights to an NDS Group object and making NDS Userobjects security equivalent to the Group object is no different thanassigning rights to any other class of NDS object and establishing securityequivalence of NDS user object to object of that other class.2.1.2NDS Attribute Access Control AlgorithmThe ACL for an NDS object is also used for NDS attributes, with thefollowing changes:The protected attribute can be either the name of a specific attribute(e.g., Home Directory) or the pseudo-attribute [All Properties Rights].The access rights are zero or more of Supervisor, Compare, Add or3Delete Self, Read, and Write. Note that the Supervisor attribute rightis different from the Supervisor object right.An object O1's rights to attribute A of object O2 is computed as follows:1.For each object O' to which O1 is security equivalent, compute therights for O' to all attributes of O2 by searching from the root of thetree toward O2. R, which is initially empty, represents the attributerights O' has to O2. For each node N along the path, perform thefollowing steps:3Add or Delete Self is one right, not two (i.e., the word “or” does not indicate there are two rights).a.If N's ACL includes an entry with the subject name [InheritedRights Filter] and a protected attribute of [All Properties Rights],then remove all access rights from R except those listed in theIRF.b.If N's ACL contains an entry with the subject name of O' and aprotected attribute of [All Properties Rights], then set R to theaccess rights for the entry.2.For node O2 only, perform the following steps:a.If O2's ACL includes an entry with the subject name [InheritedRights Filter] and a protected attribute of A, then remove allaccess rights from R except those listed in the IRF.b.If O2's ACL contains an entry with the subject name of O' and aprotected attribute of A, then set R to the access rights for theentry.3.Union the value of R calculated in steps 1 and 2 for each O' together,yielding the rights of O1 to attribute A of O2.4.For each object O' to which O1 is security equivalent, determinewhether O' has the Supervisor object right to O2 by searching from the root of the tree toward O2. S, which is initially false, representswhether O' has the Supervisor object right to O2. For each node Nalong the path, perform the following steps:a.If N's ACL includes an entry with the subject name [InheritedRights Filter], a protected attribute of [Entry Rights], and the IRFdoes not include the Supervisor right, then clear S.b.If N's ACL contains an entry with the subject name of O', aprotected attribute of [Entry Rights], and the access rights includethe Supervisor right, then set S.5.If the value of S for any of the values of O' computed in step 4 is set,then O1 has all rights to attribute A of O2, regardless of the results of step 3.There are certain attributes, which are flagged in special ways, that are not modified by the ACL. For example, attributes may be marked as Read-Only, which precludes modification to the attribute, even if the user has adequate rights. Other attributes are marked as Public-Read, which is equivalent to the ACL entry <[Public], A, Read> (where A is the name of the attribute). Attributes are marked as Read-Only or Public-Read as part of the attribute definition, and not as part of the ACL for the object.An important aspect of the above policy is that rights to individual attributes are not inherited, but rights to all attributes (as represented by the symbol [All Properties Rights]) are inherited. Thus, a user could be given the Read and Write rights to [All Properties] at the root of the NDS tree, which would provide access to all lower objects (unless modified by IRFs or subsequent trustee assignments), but giving the Read and Write rights to the Telephone Number attribute at the root would only affect access to the attribute of that particular object.There is no “protected attribute” field in a trustee list entry, whereas there is in an NDS ACL entry.4The Access Control right allows changing the trustee list, except to add an entry with the Supervisor right. Note 5that there is no Executive right, because users execute programs on workstations over which the server has no control. Similarly, there is no “setuid” concept as in UNIX for protected subsystems. The IRF for a file cannot block inheritance of the Supervisor right.6 2.2File System Object Access Control PolicyFiles in a NetWare file system are organized in a hierarchical tree, much asany traditional file system. Files are organized into volumes , whichtypically represent disk drives. File system rights rely on many of thesame concepts as NDS rights: security equivalence, inheritance, andinherited rights filters. The file system access control policy is similar, butnot identical, to the NDS object and NDS attribute policy. Every filesystem object (file or directory) may have a trustee list, which is equivalentto an ACL. Elements of a trustee list are pairs , where the first element is4the subject name and the second element is the access rights (zero or moreof Supervisor, Read, Write, Create, Erase, Modify, File Scan, or AccessControl ). Any NDS object with at least one right to a file system object is5called a trustee of the object, indicating that it has (partial) responsibilityfor the data contained in the file or directory. An object O1's rights to afile or directory F is computed as follows:For each object O' to which O1 is security equivalent, compute the rights for O' to F by searching from the root of the volume toward F.R, which is initially empty, represents the object rights O' has to F.For each node N along the path, perform the following steps:-If N's trustee list includes an entry with the subject name[Inherited Rights Filter], then remove all access rights from Rexcept those listed in the IRF .6-If N's ACL contains an entry with the subject name of O', thenset R to the access rights for the entry, unless R already containsthe Supervisor right, in which case R is unchanged. Union the value of R calculated in the first step for each O' together,yielding the rights of O1 to F.Just as inheritance is used to assign rights in a relatively small number oflocations in NDS, so too can it be used in the file system. For example,assigning the single trustee entry <[Public], {Read, File Scan}> to the\PUBLIC directory will allow all users access to all files in that directory(and all subdirectories) without assigning any rights to individual files inthe directory.Note that because of inheritance, rights are typically not assigned at theroot of a volume, because that would provide rights to the whole volume(unless blocked by an IRF).3.0Using NetWare for RBACNetWare 4 can be used to enforce portions of the RBAC0, RBAC1, ARBAC0, and ARBAC1 policies described in [SAND96a]. The objects to be protected for RBAC0 and RBAC1 are files and directories, while the objects to be protected for ARBAC0 and ARBAC1 are NDS objects. We do not believe that NetWare can be used for implementation of role constraints (RBAC2 and ARBAC2) and, therefore, it cannot be used for the consolidated model (RBAC3 and ARBAC3), which presumes the presence of role constraints.3.1RBAC0: Base ModelRBAC0 provides basic RBAC features. The objects we wish to protect using RBAC0 are files and directories in the file system. The users of RBAC0 are equivalent to users in NetWare, and the permissions are the NetWare file rights (Supervisor, Read, Write, Create, Erase, Modify, File Scan, and Access Control). Roles can be implemented using any NDS object, although the Organizational Role object is most suitable for the purpose because of its name.3.1.1What Can be DoneRBAC0 calls for a many-to-many relationship between roles and users and between roles and permissions. In NetWare, users may be security equivalent to an arbitrary number of other objects, and objects may have an arbitrary number of users that are security equivalent to them. This allows us to establish a many-to-many relationship between users and roles. Similarly, the same permission (right) can be assigned to any number of roles and vice versa.The essence of RBAC0 in NetWare is the ability to assign access rights independently from access control rights. That is, a role could have the ability to create, delete, read, and write files in a directory without the ability to grant others access to that directory. This would be done by not assigning the Access Control right to the role. In turn, user’s rights are limited by the roles to which they are security equivalent.3.1.2What Cannot be DoneAs noted above, NetWare has no concept of sessions operating in different roles as called for in RBAC0. Users obtain those rights associated with all objects to which they are security equivalent. Thus, there is no capability for dynamic activation and deactivation of roles during a session; a user must log out from one NetWare User account and log in as a different one to change their role. This is a weakness of NetWare, as it forces users to either have their maximum rights available at all times or to maintain multiple accounts, each of which is used for a different purpose (e.g., user or administrator).A client operating system could maintain a mapping of user identities to roles and transparently log the user in and out as necessary. For example, the user might present a name and a role, and the client would map that to an NDS User object. Similarly, given sufficient client operating system support, users could have multiple windows each of which is logged in to aNetWare server as a different user ID, thus presenting the facade of havingmultiple concurrent sessions. We are unaware of any implementation ofthis mechanism. In addition, maintaining multiple synchronized identitieswould be administratively cumbersome.3.1.3Possible ExtensionsNetWare has no concept of a granularity below files. For example, itmight be desirable to have RBAC to records in a database. This can beaccomplished by extending the NetWare server using NetWare Loadable7Modules (NLMs), which extend the server operating system. Additionalmessages could be defined between clients and servers to provide access todatabase records. Such messages could rely on the authentication servicesprovided by NetWare and could "piggy-back" by using the existing accesscontrols to enforce RBAC on a row or column basis.3.2RBAC1: Role HierarchiesThe purpose of role hierarchies is to allow structuring of rights as they aretypically done in an organization to reflect authority and responsibility.NetWare's rights inheritance coupled with NDS hierarchy works well forsuch a concept. Container objects, which are used for grouping NDSobjects, can be trustees of a file just as any other NDS object. Becauseusers are security equivalent to all containers they are transitivelycontained in, assigning rights to a container assigns those rights to all users(and other NDS objects) in that container.However, NDS containers are inverted with respect to the usualorganizational model that individuals near the top (i.e., root) have moreauthority and responsibility and authority than individuals closer to thebottom (i.e., the leaves).A second difficulty with mapping NetWare access controls to RBAC1 isthe notion of transitivity. [SAND96a] suggests that access controls shouldbe transitive, so a Vice President would obtain not only those rightsassigned to the Department Head role, but also transitively the rightsassociated to the Engineer role. However, security equivalence is nottransitive, so this concept must be implemented administratively (e.g.,either by assigning the Vice President role all of the rights of DepartmentHead and Engineer roles, or by making each instance of a user who is aVice President security equivalent to all three roles). [SAND96a] alsodescribes the notion of inheriting rights from multiple roles. This is doneeasily in NetWare by making a User object security equivalent to anarbitrary number of other NDS objects.NetWare does not meet the proposed requirement of role hierarchies beingpartial orders. Partial orders are reflexive, transitive, and anti-symmetric.NetWare's security equivalence mechanism provides reflexivity and anti-symmetry, but not transitivity.7Commercial database systems (e.g., ORACLE) that run on NetWare use this technology.As with RBAC0, RBAC1 includes the concept of sessions that can be usedfor a role. RBAC1 extends the concept further by requiring that users beable to assume any subset of the roles to which they are authorized, giventhe hierarchical nature of roles. This is impossible in NetWare, short ofcreating a separate user account for each unique combination of roles thata user might wish to exercise.3.3ARBAC0: Administrative Base ModelThe notion of ARBAC0 is identical to that of RBAC0, except that it isconcerned with administrative controls rather than access to files anddirectories. Just as NetWare's file access control policy can be used toprovide roles with access to files and directories, so can the NDS accesscontrol policy be used to provide roles with access to NDS objects andtheir attributes. For example, by providing a role with the Supervisorobject right to a container, individuals security equivalent to that role canadminister objects within the container, subject to access blocked by IRFs.The role-based administrative access can be divided at an arbitrarily fine-grained level. For example, a Telephone-Manager role could be definedthat has the Read and Write rights to the Telephone Number attribute of allNDS objects. However, to do this, the role would have to be listed on theACL for every object in the NDS tree, because attribute-specific rights arenot inherited.3.4ARBAC1: Administrative Role HierarchiesThe relationship of ARBAC1 to RBAC1 is the same as ARBAC0 toRBAC0. Just as hierarchies of users can be established to provide accessto file system objects, so too can hierarchies be used for access to NDSobjects. As with RBAC1, though, the lack of transitivity in the securityequivalence mechanism limits the ability to meet the criteria established in[SAND96a].4.0ExamplesIn this section we provide several examples of how the NetWaremechanisms can be used to implement an RBAC policy.4.1File System ExamplesConsider the NDS structure as shown previously in Figure 11-2 and thefile system structure as shown in Figure 11-3, Sample File SystemStructure.Figure 11-3. Sample File System StructureTable 11-1, Sample File System Trustee Assignments, shows sampletrustee assignments for this configuration. Recall that all users areautomatically security equivalent to each container in which their userobject is located and that users obtain the union of rights available to eachobject to which they are security equivalent. Thus, with no additionalassignments, users Alice and Bob will have File Scan, Create, Read, andWrite rights to all files and directories in \MKTG\EUROPE (by virtue ofbeing security equivalent to Europe.Marketing.Acme, which is a trustee ofthe directory). Similarly, users Cheryl and David will have the File Scan,Create, Read, and Write rights to all files and directories in \MKTG\ASIA(by virtue of being security equivalent to Asia.Marketing.Acme, which is atrustee of the directory). Alice, Bob, Cheryl, and David will all have theFile Scan, Create, Read, and Write rights to all files in\MKTG\COMMON (by virtue of being security equivalent toMarketing.Acme). Note that none of these assignments allow the users topropagate permissions, because no one has the Access Control orSupervisor right. Without any explicit security equivalences, no one hasrights to \MKTG\FORECAST.Table 11-1. Sample File System Trustee AssignmentsNow assume that Bob.Europe.Marketing.Acme is made security equivalent to Mgr.Europe.Marketing.Acme, and similarly .Marketing is made security equivalent to .Marketing.Acme. By this assignment, each will obtain the Access Control right to the respective\MKTG\EUROPE or \MKTG\ASIA directory, and the File Scan, Read, and Write rights to the \MKTG\FORECAST directory. If Bob goes on vacation, Cheryl can be made security equivalent toMgr.Europe.Marketing.Acme and will instantly obtain the rights usually exercised by Bob. Note that it is not sufficient for Cheryl to be made security equivalent to Bob, because Bob is not directly a trustee, and security equivalence is not transitive.By making Edward.Acme security equivalent to Mktg-Mgr.Marketing.Acme, he will obtain the Supervisor right to the marketing portion of the file system. Note that no one has access to the root of the file system tree: because of inheritance, access to the root is rarely granted.In an analogous fashion, we could assign rights to the \FINANCE portion of the file system. There is, of course, no reason why objects in Finance.Acme could not have rights to files in \MKTG, or vice versa.Thus, by using security equivalence and inheritance, a small number of access control assignments are sufficient for controlling a large file system tree. Using Organizational Role and Organizational Unit objects as trustees simplifies the management of the file system, which is a key goal of RBAC.4.2NDS ExamplesAgain consider the NDS structure as shown previously in Figure 11-2. Table 11-2, Sample NDS Trustee Assignments, shows sample ACL assignments for this configuration. With these trustee assignments, all users in Finance.Acme will have the Browse right to the Finance container, while all users in Marketing.Acme will have the Browse right to the Marketing container. The Finance organization has an administrator who has the Supervisor right to that portion of the NDS tree, while the Marketing organization has a less powerful administrator with Create and Delete rights, but not the Supervisor right. In addition, the organization as a whole has an administrator who has the Supervisor right to the entire tree.Table 11-2. Sample NDS Trustee AssignmentsBy making Edward.Acme security equivalent to Admin.Acme, he will obtain the Supervisor right to the whole tree. If Sally.Finance.Acme is made security equivalent to Manager.Finance.Acme, then she will have theSupervisor right to the Finance part of the NDS tree. Using an InheritedRights Filter, Admin.Acme could be blocked from having any rights inFinance.Acme, thus allowing only Sally to administer those portions of thetree.Because of security equivalence, any user can take over administration ofthe tree simply by being made security equivalent to Admin.Acme (orManager.Finance.Acme, for that portion of the tree). As in the file systemexamples, because security equivalence is not transitive, it is not sufficientto make a user security equivalent to Sally, because her rights are notassigned directly, but rather come from security equivalence.Thus, using assignment of rights to Organizational Unit and OrganizationalRole objects, we can configure access rights in the NDS tree with a bareminimum of configuration settings.5.0ConclusionsRBAC can be partially implemented using existing commercial products.The inability to provide some of the features suggested by the [SAND96a]family of models suggests that perhaps a finer-grained distinction offeatures would be desirable, rather than an all-inclusive definition ofmeeting a given set of RBAC criteria. By analogy, this is similar todefining a security target using the ITSEC [ITSEC91] or the proposedCommon Criteria [COMM96] and comparing a product to the target,rather than using a one-size-fits-all approach to security as in the OrangeBook [DOD85].NetWare provides many useful features for implementing RBAC. It wouldbe significantly more useful if it provided the ability for users to selectsessions by selecting at login time what objects they want to be securityequivalent to (as a subset of their authorized set), and transitivity insecurity equivalence.6.0References[COMM96] Common Criteria Editorial Board, Common[SCHA94] M. Schaefer, G. Grossman, and J. Epstein, Criteria for Information Technology Security Evaluation,“Using a Semiformal Model 2C a C2 Better,”Version 1.0, January 1996. Available from: Proceedings of the 17th National Computer Security /nistpubs/cc/read_l.Conference, Baltimore, MD, 11-14 October 1994,153-164.[DOD85] U.S. Department of Defense, Trusted ComputerSystems Evaluation Criteria, DOD 5200.28-STD,Washington, DC, December 1985.[ITSEC91] Information Technology Security EvaluationCriteria (ITSEC), Provisional Harmonised Criteria,Version 1.2, Luxembourg: Office for OfficialPublications of the European Communities, June 1991.[SAND96a] Ravi S. Sandhu, Edward J. Coyne, Hal L.Feinstein, and Charles E. Youman, “Role-Based AccessControl,” IEEE Computer, 29:2, February 1996, 38-47.。
Microsoft Business Solutions-Axapta 3.0 连接性功能说明书
The key word in version 3.0 of Microsoft Business Solutions −Axapta is connectivity .Connectivity is the driving force behind Enterprise Portal, Axapta’s new module and this release’s major new development.Enterprise Portal uses the Internet to connect you to the people you deal with who are normally outside your system. It speeds up interactions and information sharing with customers, vendors and employees by letting them work directly with Axapta via personalised web sites.There are a number of other enhancements in existing modules, notably in Supply Chain Management, the Projects series and Financial Management.Aside from the highlights in this document, there are hundreds of other improvements in Axapta 3.0,throughout all modules. Please contact your Navision Solution Centre for more information.Enterprise PortalEnterprise Portal gives your customers, vendors and employees Web access to ERP data and functionality, resulting in lower information-sharing costs and faster response times. No third-party software is needed. The only thing your customers, vendors and employees need is an Internet connection and a browser. Little or no training is required since the Enterprise Portal user interface and navigation follow familiar Web practices. Only the information and services that users need are presented. You decide what information to share and with whom.ContentsEnterprise Portal: Web access to Microsoft Business Solutions −Axapta data and functionality for customers, vendors and employees (page 1)Commerce Gateway: Send and receive information directly with any other ERP solution, without human interaction (page 4)Projects: Streamlined work in process interface; new validation and pricing functionality (page 4)Human Resource Management: Integration with e-mail and Microsoft Word for fast correspondence with job applicants (page 4)Financial Management: New document sharing facility (XBRL); user-defined exchange rates in intercompany consolidation; improved usability in bills of exchange and promissory notes (page 5)Supply Chain Management: dynamic planning and Gantt charts in master planning; new intercompany trading functionality and inventory dimensions (page 5) Production: improved Gantt charts (page 7)In the loopAll of the knowledge sharing and interaction with Axapta Enterprise Portal takes place via personalised, role-based web sites. Users can view relevant information and reports, publish documents and input data.There are links to relevant web sites, discussion forums and Axapta functionality, as well as shortcuts to tasks and spaces for frequently used documents. Users can even be presented with questionnaires. With the right information always at hand, users experience increased productivity and greater work satisfaction.When, for example, a customer on the other side of the world enters a purchase order in Enterprise Portal, that information is registered immediately in Axapta – eliminating your need to enter it manually. The purchase order is published instantly on the personal web sites of anyone who needs to know about it, allowing them to act fast. Sample functionality:Customers: view product catalogue, get price and delivery quotations, submit and track ordersVendors: track orders, view documents and diagrams, enter prices, change contact informationEmployees: maintain contact details, qualifications, absences, view appraisals and development plans Consultants: submit time reportsSales reps: view customer records, give quotations, submit orders, change prices, track current orders and backorder lines.A personal approachUsers are also presented with several information panels that they can click on and off. For example, they can see corporate news relevant to their role, weather, traffic and stock market reports as well as their Microsoft Outlook calendar and task list. Live reports from the other systems that are connected to Axapta, such as warehouse management, can also be published online.Everything is organised according to personal preferences. Move or hide elements, select the layout, colours and text preferences. Work in any of 31 languages. Vendors and customers can choose different names for items, projects and documents than the ones your company uses.From his home page, Allen Morrison has access to all the functionality and information that is relevant to him, organised just how he likes it. Design optionsFor a portal that matches your corporate image, use the built-in style sheets, images and pre-built graphical themes. Or to create a unique look, there’s an editor that allows you to design your web site from scratch.Setup and administrationCreating and launching a tailored web site takes five minutes:1. Open the Web Application Wizard2. Click the type of web site you want3. Name the site, choose a Web server and click the set of company accounts you want to use4. Select the layout, colour scheme and default language5. Click FinishThe Web site is ready for use. No knowledge of Web programming, HTML or Active Server Pages (ASP) is required. Nor do you need external Web development tools, a consultant or an expensive upgrade. Everything you need is built-in. Commerce GatewayTo exchange information system-to-system there’s Axapta Commerce Gateway. With Commerce Gateway, you can exchange documents electronically – with any company, whatever their system.Connect with a customer’s ERP system so that a purchase order is automatically sent when their stock reaches a certain level. Axapta receives the order without any employee interaction whatsoever and notifies the warehouse, accounting and sales that the interaction has taken place.By reducing the amount of manual work, you’ll cut response times and human error.PROJECTSWork in processFrom the work in process (WIP) project overview, you now have direct access to the actions you can perform. You can view and adjust all related WIP transactions as well as reference all child projects. Work with the project estimates in order to follow up on the financial status of the Fixed Price projects involved.ValidationIt is now possible to define what project tasks each person is allowed to perform. It is also much easier to see who is allowed to do what and where. Employee groups, categories and projects are combined on one screen for easy navigation and data entry. It is also possible to apply validations to journals.PricingProject Pricing is now far more flexible. In addition to Hours, you can apply pricing rules to Costs and Revenues. Two new rules – Contribution Ratio and Miscellaneous Charges Amount – have also been added.HUMAN RESOURCE MANAGEMENTRecruitmentYou can now e-mail standard correspondence, including Microsoft Word attachments, to applicants directly from within Axapta. As each e-mail is sent, Axapta automatically updates the status on each applicant. Bulk mailing is also possible, but you can still view the actual correspondence sent to any individual applicant.FINANCIAL MANAGEMENTXBRL for financial reportingXBRL uses financial reporting standards to exchange financial statements across various technologies, including the Internet. With XBRL, Axapta users need only enter information once, and it can be exported for use in an HTML document, government filings, credit reports, loan documents or other formats.An XBRL-based financial statement is a digitally enhanced version of a paper-based financial statement, and includes the balance sheet, income statement, statement of equity, statement of cash flows, and the notes to the financial statements as well as the accountant's report. XBRL documents can be prepared efficiently, exchanged reliably, published easily, analysed quickly and retrieved simply.Intercompany accounting and consolidationAxapta enables a business with several subsidiaries or distribution centres to set up intercompany journals. An intercompany transaction posted in one subsidiary is automatically updated in designated accounts of the othersubsidiary or distribution centre. Online consolidation of both accounts and budgets can be carried out directly from Axapta. Both full consolidation and pro-rata consolidation are possible. Accounts can also be imported or exported for consolidation purposes.Subsidiary accounts are consolidated using either the subsidiary’s chart of accounts or special consolidation accounts that can be set up on its chart of accounts.Accounts in a foreign currency can be consolidated at special consolidation exchange rates. In Axapta 3.0, you can mark ledger accounts as either monetary or non-monetary and set up separate consolidation exchange rates for both. You can also calculate the exchange rate adjustment directly when consolidating.Bills of exchange and promissory notesGeneral bill of exchange functionality and promissory note functionality are now available in Accounts Receivable and Accounts Payable respectively.SUPPLY CHAIN MANAGEMENTDynamic master planningWith the new dynamic plan in Master Planning, you can quickly see the effect of order changes. Recalculations are carried out only on the areas where you make changes – not on the entire plan. When a customer calls and wants to change a delivery date, for example, you can confirm the change in a few seconds, rather than having to call back later after a full recalculation.Gantt charts in Master PlanningTo give a graphical overview of the sequence and timing of planned production orders, transfer orders and purchase orders, Gantt charts are now included in Master Planning. Each order type can be assigned a different colour to aid understanding. Receipt margins, issue margins and reorder margins can also be illustrated.Intercompany tradingThe new Intercompany solution handles internal trade between your subsidiaries or warehouses in different locations. Sales and purchase orders are transferred automatically using Commerce Gateway.Inventory dimensionsThe Configuration item dimension is now a fully functional item dimension. In addition, two new item dimensions, which you can assign for any purpose, have been added. All are supported throughout Axapta, so, for example, they integrate with price/discount, reports, trade agreements, and sales/purchase orders.The Gantt chart in Master Planning makes it easy to visualise planned productions, transfers and purchases including margins.PRODUCTION Gantt chartsGantt planning in the Production III series now gives you an even clearer view of production jobs and operations. You can assign unique colours to each production job and change the colours for different types of operation. You also get a live graphical view of work centre load, as determined by scheduled jobs and capacity.Contact your partnerShould you wish to find out more about Microsoft Business Solutions—Axapta, please contact our Internal Sales Team on 0870 60 10 100 where they will be pleased to put you in contact with a certified Microsoft Business Solutions Partner. If you are already a Microsoft Business Solutions customer please contact your Certified Microsoft Business Solutions Partner.About Microsoft Business SolutionsMicrosoft Business Solutions, which includes the businesses of Great Plains®, Microsoft bCentral™ and Navision a/s, offers a wide range of business applications designed to help small and midmarket businesses become more connected with customers, employees, partners and suppliers. Microsoft Business Solutions applications automate end-to-end business processes across financials, distribution, project accounting, electronic commerce, human resources and payroll, manufacturing, supply chain management, business intelligence, sales and marketing management and customer service and support. More information about Microsoft Business Solutions can be found at:/uk/businesssolutionsAddress:Microsoft Business SolutionsMicrosoft CampusThames Valley ParkReadingBerkshire RG6 IWG***********07/04/2003© 2003 Microsoft Corporation. All rights reserved.Microsoft Business Solutions includes the business of Great Plains, Microsoft bCentral™ and Navision A/S。
harrypotter英文简介
harrypotter英文简介《哈利·波特》,魔幻散文系列小说,描写年轻的巫师学员哈利·波特在霍格沃茨前后六年的学习生活和冒险故事,下面是裴俊下面大全为你整理的harrypotter英文简介,希望对你有用!《哈利·波特》简介"Harry Potter" (Harry Potter) is the British writer J. K. Rowling (J. K. Rowling) in 2021 to 20xx by the magical literature series of novels, a total of seven. The first sixto Hogwarts School of Witchcraft and Wizardry (HogwartsSchool of Witchcraft and Wizardry) as the main stage, describes the protagonist - young wizard student Harry Potter in Hogwarts six years before and after the study of life and adventure Story; the seventh is described by Harry Potter in the second witch war in the search for the Horcrux anddestroy the story of Voldemort.The series of novels is translated into 73 languages, all versions of the total sales of more than 450 million (asof 20xx), ranked the world's best-selling novel series.British version published by the Bloomsbury Publishing House (Bloomsbury) published, the United States after theintroduction of some amendments by the scholar press (Scholastic) release, simplified Chinese version by the Chinese People's Literature Publishing House, Traditional Chinese version by the Crown Press publishing.US Warner Brothers film company to this 7 set ofnovels into eight movies, the first six episodes of a, andthe seventh set into two. Harry Potter film series is theworld's most popular movie series, the total box office revenue of 7.8 billion US dollars.December 6, 20xx, J K Rowling revealed that during Christmas she would update a series of "Harry Potter" related stories. One of the protagonists will be the original seriesof popular villain Draco Malfoy.July 31, 20xx, in the People's Literature Publishing House hosted the "Kazakhstan fans confluence - Harry Potter15 anniversary cum J · K · Rowling 50 birthday anniversary" activities, the People's Literature Publishing House Shi Guang aed the "Harry Potter" Chinese color illustrations will be at the end of the Chinese book market.《哈利·波特》作品鉴赏Theme of the workRowling added the prejudice of racist and genocidal prejudices in the real world, which was the idea of Voldemort and Death Eaters. Occasionally there are some wizards and magical people ("Muggles") in the book. Rowling said shewrote seven books, one more than a little dark color, with Harry's age, his enemies Voldemort's ability is also growing stronger. After Rowling published the fifth novel, she beganto publish some content on her personal website that implied the future plot. With the development of the series of novels, J · K · Rowling's tone is becoming more sophisticated and mature, coupled with the story of the protagonist HarryPotter continue to grow, both from the content or style, the whole series has been gradually developed to the climax TheThe contradiction between good and evil in Harry Potter's novels is divided into two clues: the first is the opposition of good and evil, represented by Harry and Voldemort. The second is based on Harry's own For the evil of the struggle as a dark line and start. It is because the story is set with Harry's self-protest, but also to make its heroic image more full. In "Harry Potter and the Order of the Phoenix", Harry dreamed that he was a snake, hurt the friend Ron's father, Mr. Weasley. And can be repeatedly perceived Voldemort's thinking trends. The first half of the novel to Harry's forehead on the scar as a link, suggesting that he and Voldemort's close ties, but also indicates that Harry's thinking at any time by Voldemort control, so some evil ideas are invisible hidden in Kazakhstan In the body of the body, the tongues between them make it possible to drive Harry to do evil. And whether it can overcome the self, to overcome the demons is the achievement of "good" or the achievements of "evil." The important difference between Harry finally defeated the demons, and thus return to the self, from the true sense of his complete from the hero to the hero Change. This also shows the author Rowling's view of evil, evil is not entirely born, Voldemort is also not born is a devil, he was also a good student, while Harry though Is a positive image, but some evil thoughts will also be alated over time in their own ideas. How to overcome this idea, do not be malicious domination is Rowling highlights the potential intention of the evil mother.The reality of the novel is also reflected in the thoughts conveyed in the series of novels by Harry Potter, reflecting Ms. Rowling's reflection on the real world. Thenovel will be divided into a master of the Malfoy magician is divided into pure magician, they have a high degree of superiority, and thus look like Hermione such a non-magic family origin of the magician, and ridicule him as "mud kind." Even in the magic world, but also because of theorigin of the humble was unfairly treated. Regardless of Hermione such a magician by virtue of their own efforts, how good, are still being purely shaman shy. Voldemort built the purpose of grinding the world's main purpose is to retain purebred wizards, those who do not purely witch for cruel killings. On the contrary, to the President of Dumbledore and Harry as the representative of the magic world compatible package, they think the origin is not important, the most important is the personal efforts. This is the opposite of the two ideas of origin. In the final battle, the Harry side has achieved a complete victory, Voldemort forces collapsed, which also indicates that the novel for humble origin and etered unequal treatment still exists in the middle of the real world view, which is undoubtedly a progressive thought of. In today's society, the issue of racial discrimination has eased, but it is undeniable that it still exists in some areas. The ideological significance of the work for the real world is alert. And Rowling in the novel to show its profound reflection on this issue, that is, the origin can not determine the fate of a person, the key is to see whether the individual's efforts to succeed and create a brilliant life. The author wants to express the idea is: fate in their own hands. Malfoy had a variety of abuse and oppression of the house elf Dobby, and later liberated Dobby, and encouraged more than the liberation of other domestic elfs, which also reflects the work of slavery strong criticism.Artistic characteristicsThe series of novels is expressed in the third-person model, with Harry Potter as the central figure, in additionto the first, fourth, sixth and seventh minority content, the whole book through Harry's own perspective To express, thisis the reader that read this series of books are one of the reasons for intimacy. (Part 5, Harry Potter through the "thought" to see the story of the Dark Lord, described "he" refers to the Voldemort Dark Lord.) Harry, Hermione, Ron isthe three important figures. The main characters in the book are portrayed deeply and the secondary role is vivid. Thebook also has a lot of moral aspects of the content, with the justice and evil confrontation constantly intense and obvious, some people are facing an important choice, the shadow of human nature has also been shown.While Rowling presents readers with rich stories and compact stories, Harry Potter's novels have also subtly inherited European classical literature. These inheritance is mainly reflected in two aspects, namely the use of the motif and the cultural meaning of the inheritance. The motif is perhaps the most complex concept in the field of literary studies. The so-called motif is referring to the recurrenceof human basic behavior, spiritual phenomena and the conceptof human beings around the world, such as life, death, parting, love, Time, space, season, ocean, mountain, night, etc. These motto are the two sources of European civilization - Greek and Roman myths and legends and the Bible. It can be said that European classical literature is also the source of Ms. Rowling's creation.Rowling in the provision of fairy tale characters, but also used to Xianyihouyang or Yang Yang after the suppression of the way, so that the story is more complicated and confusing. Typical representative for Snape. The novel from the first to show out of Snape's disgusting negative image, many times to show the conflict between Harry and Snape, but at the end of the story, only to express Snape on Harry's sincere protection and Love. This contrast is in sharp contrast. In the second novel, Gidero was described as a rich experienced magician, but at the end of the story, he was timid as a mouse, and no real talent, the same sharp contrast. In the fourth novel, Moody's looks like a good friend, but it is a disguised little Crouch - Voldemort placed in Harry's side against Harry's negative characters, step by step to push Harry to despair. It is with this traditional fairy tale inheritance and sublimation of the artistic approach, the story was able to further promote the development of the fairy tale more colorful.Although the magic world for the children is a magical fantasy, but in such a world at any time to find the shadow of reality. The novel itself is also profoundly realistic. The concrete embodiment of reality in the novel is the reality of the scene. Harry, as the protagonist of the novel, is a symbol of the hero, but Ms. Rowling did not shape Harry as a omnipotent, like a god. Through different scenes, Rowling showed some of his weaknesses with Harry's own tone and thought: Harry did not like to study, and sometimes even lazy when learning, after all, Harry was a growing child This is the kind of problem. The puberty of the puberty has a good impression on Akira, Hermione's liking Ron, which is theprocess that children will experience during adolescence. In the novel Harry has the same ality with the children in the real world, and this ality is also an important factor in the "Harry Potter" series of novels that attracts readers fromall over the world. Through the shaping of the novel, thenovel embodies the human type, that is, the human nature.《哈利·波特》作品评价Comments"The Sunday Times" editor Nicolie Jones: "Harry Potter" series is classic. It makes good use of thechildren's literature tradition, but also makes itself very deep. Whether a child's book is a classic sign is whether it can be attractive to adults. "Harry Potter" series of novels clearly have this feature. Like all the best children's books, Harry Potter offers endless fun for adults who are not innocent. The most important thing is that "Harry Potter" so that readers in an immoral era to see the power of virtue.Writer Chen Danyan: "Harry Potter" is a very literary characteristics of the novel, if only look - this may not see the famous, but if you read the whole, you can see theBritish literature and British history Tradition; and the structure is huge, not "small open small" story. Only with a certain degree of literary literacy and logical ability to be able to write such a work. Critics argue that we should not blindly reject Harry Potter and think about its implications for Chinese writers and literary publishing.ControversyOpposition Criticism "Harry Potter", they are more concerned about the dissemination of works, the impact of the reader and other factors outside the text, in essence, is a kind of globalization, Harry Potter consumption concerns The fear that people are gradually losing themselves in the tide of dification is the rapid response of sensitive cultural pioneers to the aesthetic tendencies of an era. In the highly developed post-industrial era of science and technology, whether it is the spread of literary works or cover the face of any of the times can not and, literary works also walked down the elegant store, a cultural industry dity army, The diversity and autonomy of the post-modern culture, the process of the formation of the classic has become quite complex, the "Harry Potter" argument reflects the commercialization of literature resistance.。
外文翻译--Web环境下基于角色的访问控制
附录A:英文原文Role-Based Access Control for the WebJohn F. Barkley, D. Richard Kuhn, Lynne S. Rosenthal, Mark W. Skall, and AnthonyV. Cincotta,National Institute of Standards and Technology Gaithersburg, Maryland 20899ABSTRACTEstablishing and maintaining a presence on the World Wide Web (Web), once a sideline for U.S. industry, has become a key strategic aspect of marketing and sales. Many companies have demonstrated that a well designed Web site can have a positive effect on their profitability. Enabling customers to answer their own questions by clicking their way through Web pages, instead of dealing with operators and voice response systems, increases the efficiency of the customer interface.One of the most challenging problems in managing large networked systems is the complexity of security administration. This is particularly true for organizations that are attempting to manage security in distributed multimedia environments such as those using World Wide Web services. Today, security administration is costly and prone to error because administrators usually specify access control lists for each user on the system individually.Role-based access control (RBAC) is a technology that is attracting increasing attention, particularly for commercial applications, because of its potential for reducing the complexity and cost of security administration in large networked applications. The concept and design of RBAC is perfectly suited for use on both intranets and internets. It provides a secure and effective way to manage access to an organization’s Web information. This paper describes a research effort to develop RBAC on the Web. The security and software components that provide RBAC fornetworked servers using Web protocols have been implemented and are described in this paper. The RBAC components can be linked with commercially available web servers, and require no modification of the server software.IntroductionEstablishing and maintaining a presence on the World Wide Web (Web), once a sideline for U.S. industry, has become a key strategic aspect of marketing and sales. Many companies have demonstrated that a well-designed Web site can have a positive effect on their profitability. Enabling customers to answer their own questions by clicking their way through Web pages, instead of dealing with operators and voice response systems, increases the efficiency of the customer interface. Companies are seizing the Web as a swift way to streamline - even transform their organizations.More recently companies have begun using web technology to service the public as well as private and internal clients. Web sites are set up to segregate some information from the general public, providing it to only selected or "private" clients. Typically, public internet is cordoned off from the general public by having user accounts and passwords. Additionally, Web sites are now running inside the company often created for and by employees. These internal private nets or "intranets" use the infrastructure and standards of the Internet and the World Wide Web but are cordoned off from the public Internet through firewalls.The Web can be used as an inexpensive yet powerful alternative to other forms of communications. A plethora of corporate information (e.g., procedures, training materials, directories, forms) can be converted to electronic form and made available via the Web. With a single source for these materials the cost of maintenance is significantly reduced, while greatly simplifying the task of ensuring currency. Thus an objective of enterprise computing, creation of a company wide system irrespective of the underlying information technology infrastructure can be fulfilled.Although the internet and intranets can offer great benefits to a company or government agency, security threats remain. To date net enthusiasts tend to focus on how to link people and businesses, not on using the network as a way to run and manage businesses securely. Althoughexisting Web servers can effectively provide all or nothing access to a particular Web site and a number of popular Web servers can even provide fairly fine grained access control, they provide very primitive tools to administer these controls from the perspective of a single enterprise.This paper describes the benefits of RBAC and an implementation of RBAC on the Web (RBAC/Web), and in particular as RBAC applies to an intranet computing environment. This will provide Web administrators with a capability for the first time to centrally administer and regulate user access to information in a manner that is consistent with the current set of laws, regulations, and practices that face their business today. Although this paper focuses on intranets, the benefits, concepts and implementation of RBAC/Web are also applicable to a company’s internet environment where restrictive access to information is desired. RBAC DescriptionRole-based access control (RBAC) [1], [2], [3], [4], [5] is an alternative to traditional discretionary (DAC) and mandatory access control (MAC) policies that is attracting increasing attention [6], particularly for commercial applications. The principal motivation behind RBAC is the desire to specify and enforce enterprise-specific security policies in a way that maps naturally to an organization's structure. Traditionally, managing security has required mapping an organization's security policy to a relatively low-level set of controls, typically access control lists.With RBAC, security is managed at a level that corresponds closely to the organization's structure. Each user is assigned one or more roles, where roles are based on the user's job responsibilities and competencies in the organization. Each role is assigned one or more privileges (e.g., information access, deletion, creation), see Figure 1. It is a user's membership into roles that determine the privileges the user is permitted to perform. Security administration with RBAC consists of determining the operations that must be executed by persons in particular jobs, and assigning employees to the proper roles.The RBAC framework provides for mutually exclusive roles as well as roles having overlapping responsibilities and privileges. For example, some general operations may be allowed by all employees, while otheroperations may be specific to a role. Role hierarchies are a natural way of organizing roles within an organization and defining the relationship and attributes of the roles. Complexities introduced by mutually exclusive roles or role hierarchies as well as regulating who can perform what actions, when, from where, in what order, and in some cases under what relational circumstances, is all handled by the RBAC software. Separation of DutyRBAC mechanisms can be used by a system administrator in enforcing a policy of separation of duties. Separation of duties is considered valuable in deterring fraud since fraud can occur if an opportunity exists for collaboration between various job related capabilities. Separation of duty requires that for particular sets of transactions, no single individual be allowed to execute all transactions within the set. The most commonly used examples are the separate transactions needed to initiate a payment and to authorize a payment. No single individual should be capable of executing both transactions. The system administrator can control access at a level of abstraction that is natural to the way that enterprises typically conduct business. This is achieved by statically and dynamically regulating users' actions through the establishment and definition of roles, role hierarchies, relationships, and constraints.We define static separation of duty to mean that roles which have been specified as mutually exclusive cannot both be included in a user's set of authorized roles. With dynamic separation of duty, users may be authorized for two roles that are mutually exclusive, but cannot have both roles active at the same time. In other words, static separation of duty enforces the mutual exclusion rule at the time an administrator sets up role authorizations, while dynamic separation of duty enforces the rule at the time a user selects roles for a session.Role Administration and VisualizationThe roles are established, manipulated and viewed using the RBAC/Web Admin tool. The Admin tool allows system administrators to create and define roles, role hierarchies, relationships and constraints. Once theRBAC framework is established for the organization, the principal administrative actions are the granting and revoking of users into and out of roles as job assignments dictate. These maintenance tasks are easily performed using the Admin tool.Additionally, the Admin tool is being enhanced to utilize the Virtual Reality Modeling Language (VRML, pronounced 'vermal'). VRML is an interactive, inter-networked, 3D graphics language for the Web. It is used to represent graphics, test, sound, and links to other content as either a static or dynamic picture on the Web. The inclusion of VRML into RBAC lets system administrators use an interactive computer model to check and validate the role structure, relationship, and privileges. Being able to view and interact with complex models, allows the administrator to identify conflicts, eradicate flaws and improve the implementation early in the RBAC setup.The VRML component will enable authorized users to navigate the RBAC database, finding and linking roles, and displaying attributes and graphics associated with those roles. By presenting a 3D model of established roles, the user can easily see which roles are mutually exclusive as well as the hierarchical structure of related roles and conflicts between roles (see Figure 2). VRML's navigational controls allows the user to interactively 'walk-through' and manipulate the view perspective of the 3D model, known as a scene graph. For example, the scene graph can be rotated to show the 'backside' of the graph where role relationships may have been obscured when viewed as a 'flat', 2D graph. To improve readability, clarity and flexibility, the role hierarchy is organized into layers, where each layer contains another level of detail. By 'clicking' on a role, the role opens to reveal the next layer of related roles or information about the role, e.g., the privileges associated with that role or a user membership list.RBAC ExampleConsider the branch office of a bank. In this environment, there are roles such as branch manager, teller, and account representative, as illustrated in Figure 2.The graph structure shows role hierarchy. The role financial_advisor inherits the role account_rep. An individual authorized for the rolefinancial_advisor is permitted to perform all of the operations permitted to an individual authorized for the role account_rep. Thus, an individual in the role of financial_advisor is able to create and remove accounts. Because account representatives, branch managers, internal auditors, and tellers are all employees of the bank, their corresponding roles inherit the employee role.In Figure 2, the role account_rep is highlighted, appearing as a dark sphere, in order to show the other role relationships for account_rep. The roles teller and account_holder are shown as yellow rectangular solids to indicate that these roles have a "Dynamic Separation of Duties" (DSD) relationship with the role account_rep. This relationship is a conflict in interest relationship indicating that an individual acting in the role of account_rep cannot also be acting in either of the roles of account_holder or teller. The policy of the bank is that an account representative, an employee of the bank, can have an account in the bank but such an individual may not simultaneously process their personal account while processing accounts of others. Likewise, because a teller has an open cash drawer that must balance when closed, an individual acting in the role of account_rep and sitting at a desk away from a teller's window is not permitted to simultaneously act in the role of teller even if authorized for that role.The role internal_auditor is shown in a red hexahedron to indicate that this role has a "Static Separation of Duties" (SSD) relationship with the role account_rep. The SSD relationship is also a conflict of interest relationship like the DSD relationship but much stronger. If two roles have a DSD relationship, then they may both be authorized for an individual but that individual may not act in both roles simultaneously. If two roles have a SSD relationship, then they may not even be authorized for the same individual. In this example, the policy of the bank is that there is a fundamental conflict of interest between the roles of internal_auditor and account_rep. Thus, these two roles may never be authorized for the same individual.The new version of the Admin tool using VRML will allow us to represent conflicts of interest and other relationships in a more natural way and view the scene from an infinite number of viewpoints. VRML allows complex3D objects to be created for this purpose. The user can 'enter' a selected role and explore several levels of detail (i.e., information) associated with that role. In addition, the sound capabilities of VRML can be utilized to give audio warnings when roles are used which cause conflicts of interest or other problems, or when improper procedures are used. RBAC for World Wide Web ApplicationsRole Based Access Control (RBAC) for the World Wide Web (RBAC/Web) is an implementation of RBAC for use by World Wide Web (Web) servers. Because RBAC/Web places no requirements on a browser, any browser that can be used with a particular Web server can be used with that server enhanced with RBAC/Web. RBAC/Web is implemented for both UNIX (e.g., for Netscape, NCSA, CERN, or Apache servers) and Windows NT (e.g., for Internet Information Server, WebSite, or Purveyor) environments.Components of RBAC/Web are shown in Table 1. RBAC/Web for UNIX uses all of the components in Table 1. Because built-in NT security mechanisms are closely compatible with RBAC, the NT version uses only the Database, Session Manager, and Admin Tool components. RBAC/Web for NT requires no modification of Web server internals or access to source code. With RBAC/Web for UNIX, there are two ways to use RBAC/Web with a UNIX Web server.The simplest way is by means of the RBAC/Web CGI. The RBAC/Web CGI can be used with any existing UNIX server without modifying its source code. RBAC URLs are passed through the Web server and processed by the RBAC/Web CGI. RBAC/Web configuration files map URLs to file names, while providing access control based on the user's roles. Installation of the RBAC/Web CGI is similar to the installation of the Web server.附录B:中文翻译Web环境下基于角色的访问控制John F. Barkley, D. Richard Kuhn, Lynne S. Rosenthal, Mark W. Skall, 和Anthony V. Cincotta,国家研究院所定规则及盖瑟斯堡技术,马里兰20899摘要建立和维持一个万维网(Web),它作为美国工业的一种附属形式,已经成为了买卖和销售战略中的重点。
浅析《傲慢与偏见》中金钱与婚姻的关系
考研英语(一201)研究生考试2025年自测试卷与参考答案
2025年研究生考试考研英语(一201)自测试卷与参考答案一、完型填空(10分)Section I: Cloze Test (20 points)Directions: Read the following text. Choose the best word(s) for each numbered blank and mark A, B, C, or D on your answer sheet.Passage:In the world of higher education, there is an ongoing debate about the significance of standardized tests, particularly the Graduate Record Examinations (GRE) for those aspiring to pursue graduate studies. The GRE, particularly its English Language Test, known as GRE General Test (Verbal Reasoning), aims to assess a candidate’s ability to comprehend, analyze, and evaluate complex written materials. This section, specifically, the “Verbal Reasoning - Text Completion” segment, exemplifies this objective by presenting a passage with 20 blanks, each requiring a precise word or phrase to maintain the flow and meaning of the text.Text:Academic research is a meticulous process that demands not only a deep understanding of a subject matter but also the (1)_____to questionestablished knowledge and seek new perspectives. Researchers are often(2)_____with vast amounts of data, requiring them to possess excellent(3)_____skills to sift through and organize information effectively. The ability to (4)_____conclusions from such data is crucial, as it forms the basis of scientific discoveries and scholarly contributions.However, the path to research excellence is rarely (5) _____. It is fraught with challenges, including the pressure to publish in high-impact journals, the (6)_____for funding, and the constant need to innovate and stay (7)_____with the latest research trends. Despite these obstacles, researchers persevere, driven by their (8)_____to uncover the truth and make a meaningful impact on their fields.Collaboration is a cornerstone of the research process. Working together, researchers can pool their expertise, share resources, and (9)_____each other’s strengths and weaknesses. This not only accelerates the pace of research but also fosters an environment of (10)_____and mutual respect. In the realm of language and literature, researchers engage in critical analyses of texts, examining their (11)_____meaning, cultural context, and historical significance. The GRE English Test assesses this ability by testing cand idates’ comprehension of complex texts and their capacity to draw (12)_____from them. For instance, candidates may be asked to identify the author’s (13)_____or the tone of a passage, or to infer the implications of a statement made within the text.To excel in this section, candidates must develop a (14)_____vocabulary,enabling them to comprehend a wide range of vocabulary and idiomatic expressions. Additionally, honing their reading comprehension skills, such as identifying the main idea, supporting deta ils, and author’s purpose, is essential. Furthermore, the ability to (15)_____logical connections between ideas and sentences within a text is key to accurate interpretation. While preparing for the GRE, it is important to engage in regular practice, utilizing a variety of resources that mimic the actual test format. This includes working through (16)_____passages, analyzing their structure, and practicing answering questions similar to those found on the test. By doing so, candidates can (17)_____their skills and gain confidence in their abilities.Ultimately, the GRE English Test is a tool that measures a candidate’s readiness for graduate-level studies in the English language and literature. It is not a definitive measure of one’s intellectual capacity bu t rather an indication of one’s ability to navigate and excel in academic environments that prioritize (18)_____and critical thinking. As such, it is important for candidates to approach the test with a mindset focused on demonstrating their strengths and areas of improvement, rather than (19)_____on a single score.In conclusion, the GRE English Test is a challenging yet essential component of the graduate admissions process. By (20)_____a comprehensive preparation strategy that includes regular practice, vocabulary enhancement, and thedevelopment of critical reading skills, candidates can position themselves to succeed on this important milestone in their academic journey. Answers:1.courage2.confronted3.analytical4.draw5.smoothpetition7.current8.passion9.recognize10.collaboration11.literal12.inferences13.perspective14.robust15.establish16.practice17.refine18.research19.fixating20.adopting二、传统阅读理解(本部分有4大题,每大题10分,共40分)Section II: Traditional Reading ComprehensionFirst PassageTitle: The Digital Revolution and Its Impact on EducationIn the past few decades, the world has witnessed an unprecedented digital revolution that has transformed virtually every aspect of our lives. From the way we communicate to the way we access information, technology has played a pivotal role in shaping our societies. This transformation is particularly evident in the field of education, where the integration of digital tools and resources has not only revolutionized teachingmethodologies but also expanded learning opportunities for studentsglobally.The advent of the internet and the subsequent rise of online platforms have made educational resources accessible to millions of people who might not have had access to traditional educational institutions. Online courses, known as massive open online courses (MOOCs), have emerged as a popular mode of learning, offering a wide range of subjects from top universities around the world. These courses are often free or at a minimal cost, making them affordable for students from diverse economic backgrounds.Moreover, the use of digital tools in classrooms has enhanced the learningexperience for students. Interactive whiteboards, tablets, and educational software have made lessons more engaging and dynamic. Teachers can now incorporate multimedia elements such as videos, animations, and simulations into their lessons, making complex concepts easier to understand. Additionally, personalized learning programs, which utilize data analytics to tailor educational co ntent to individual students’ needs and strengths, are becoming increasingly common.However, the digital revolution in education has not been without its challenges. Concerns over digital addiction, privacy issues, and the potential for technological distractions in the classroom have been raised. Furthermore, the digital divide—the unequal distribution of access to technology and the internet—remains a significant barrier to achieving equitable education opportunities for all.Despite these challenges, the benefits of the digital revolution in education are undeniable. It has democratized access to knowledge, improved teaching and learning outcomes, and fostered innovation in educational practices. As technology continues to evolve, it is likely that the future of education will be even more deeply intertwined with digital tools and resources.Questions:1.What is the main topic of the passage?A)The rise of online shoppingB)The impact of the digital revolution on educationC)The history of the internetD)The challenges faced by traditional educational institutions2.Which of the following is NOT mentioned as a benefit of online courses?A)They are accessible to people from diverse economic backgrounds.B)They are taught by the best teachers in the world.C)They offer a wide range of subjects.D)They are often free or at a minimal cost.3.How do digital tools enhance the learning experience for students in classrooms?A)By making lessons less engaging and dynamic.B)By incorporating multimedia elements into lessons.C)By eliminating the need for teachers.D)By making it difficult to understand complex concepts.4.What is a major concern related to the digital revolution in education?A)The high cost of educational software.B)The lack of access to technology and the internet for some students.C)The excessive use of paper in classrooms.D)The decline in the quality of traditional educational institutions.5.What does the author suggest about the future of education in relation to digitaltools and resources?A)They will become less important over time.B)They will continue to play a minor role in educational practices.C)They will be completely replaced by traditional methods.D)They will become even more deeply intertwined with education.Second Section: Traditional Reading ComprehensionPassage:Title: The Impact of Digitalization on the Traditional Book IndustryIn recent years, the digital age has transformed nearly every aspect of our lives, and the book industry is no exception. With the rise of e-books, audiobooks, and digital reading platforms, the traditional paper-based model of book publishing and distribution is facing unprecedented challenges. This transformation has sparked debates among readers, authors, publishers, and librarians alike, as they grapple with the implications of this digital shift.At the heart of the matter lies the convenience offered by digital formats. E-books, for instance, can be accessed instantly on a range of devices, from smartphones to tablets, eliminating the need for physical storage space and allowing for seamless cross-device reading. They are also often cheaper than their physical counterparts, appealing to readers on a budget. Additionally, the advent of cloud storage and online libraries has made it easier than ever to access and share vast collections of books.However, these benefits come at a cost. Many argue that the digitalization of books threatens the cultural significance and physicality of the printed word. Books have traditionally served as tactile objects, conveying a sense of ownership and permanence that cannot be replicated by a screen. Moreover, the disappearance of physical bookstores has had a profound impact on communities, reducing opportunities for social interaction andbrowsing-based discovery.Authors and publishers, too, have been affected. While digital platforms have opened up new avenues for reaching readers worldwide, they have also created a crowded and competitive marketplace where visibility can be difficult to achieve. Furthermore, concerns over piracy and the loss of control over how their work is presented and distributed have led some to question the value of embracing digital formats.Yet, despite these challenges, the book industry is adapting. Publishers are exploring innovative ways to integrate digital elements into physical books, such as augmented reality and interactive features, to enhance the reading experience. Meanwhile, libraries are embracing digital resources while maintaining their physical collections, recognizing the importance of both formats for diverse user needs.Ultimately, the future of the book industry lies in a delicate balance between the traditional and the digital. As readers continue to demand convenience and accessibility, it is essential that the industry evolves to meet these needs while preserving the cultural and physical value of books.Questions:1.What is the main topic of the passage?A)The advantages of e-books over traditional books.B)The impact of digitalization on the book industry.C)The role of libraries in the digital age.D)The future of book publishing.2.What is one benefit of e-books mentioned in the passage?A)They require more physical storage space.B)They are often more expensive than physical books.C)They can be accessed instantly on various devices.D)They cannot be shared easily with others.3.According to the passage, what has been a negative impact of the decline ofphysical bookstores?A)Increased competition among publishers.B)Decreased social interaction opportunities.C)Higher prices for e-books.D)Increased piracy of books.4.How have some publishers responded to the challenges of digitalization?A)By completely abandoning physical books.B)By embracing only digital formats.C)By integrating digital elements into physical books.D)By ignoring the changing market trends.5.What is the author’s overall stance on the future of the book industry?A)It will completely shift to digital formats.B)It will maintain its traditional form without change.C)It requires a balance between the traditional and digital.D)It is impossible to predict its future trajectory.Third Question: Traditional Reading ComprehensionPassage:Title: The Digital Divide: Bridging the Gap in Access to TechnologyIn today’s rapidly evolving digital age, technology has become an integral part of our daily lives, shaping how we communicate, learn, work, and entertain ourselves. However, amidst this technological boom, a significant disparity exists –the digital divide, a term coined to describe the unequal distribution of access to, use of, or impact of information and communication technologies (ICTs) among individuals, households, businesses, and geographic areas.The digital divide manifests itself in various forms, but a primary concern lies in the gap between those who have access to the latest technological advancements and those who are left behind. This disparity can be attributed to several factors, including economic status, education levels, age, gender, and geographical location. In developing countries, the digital divide is often exacerbated by infrastructural limitations and affordability issues, while in developed nations, it may be a result of digital illiteracy or a lack of motivation to adopt new technologies. The consequences of the digital divide are far-reaching and multifaceted. On an individual level, limited access to technology can hinder educational opportunities, limit career prospects, and isolate individuals from social networks. At a societal level, it can exacerbate economic inequalities, widen the achievement gap among students, and stifle innovation and progress.Efforts to bridge the digital divide have been ongoing for years, with governments, non-profit organizations, and private companies working together to provide access to technology for those in need. Initiatives such as e-learning programs, community technology centers, and low-cost devices aim to increase digital literacy and ensure that no one is left behind in the digital age.Despite these efforts, the digital divide remains a persistent challenge. As technology continues to evolve at an unprecedented pace, it is crucial that we remain vigilant in our efforts to ensure equitable access to its benefits. Only by bridging the gap in access to technology can we ensure that everyone has the opportunity to thrive in the digital age. Questions:1.What is the digital divide, and what does it refer to?Answer: The digital divide refers to the unequal distribution of access to, use of, or impact of information and communication technologies (ICTs) among individuals, households, businesses, and geographic areas.2.What are some of the primary factors contributing to the digital divide?Answer: Some of the primary factors contributing to the digital divide include economic status, education levels, age, gender, and geographical location.3.How can limited access to technology hinder educational opportunities?Answer: Limited access to technology can hinder educational opportunities by restricting access to digital resources, such as online courses and educational software, which can be vital for learning and development.4.What are some initiatives aimed at bridging the digital divide?Answer: Some initiatives aimed at bridging the digital divide include e-learning programs, community technology centers, and low-cost devices, which aim to increase digital literacy and ensure equitable access to technology.5.Why is it important to bridge the digital divide?Answer: Bridging the digital divide is important because it ensures that everyone has equal access to the benefits of technology, which can help to reduce economic inequalities, improve educational outcomes, and foster innovation and progress. Section IV: Traditional Reading ComprehensionPassage FourTitle: The Impact of Digital Technology on Reading HabitsIn the digital age, the way we consume information has undergone a profound transformation. From the traditional paper-and-ink books to the sleek electronic screens of tablets and smartphones, the advent of digital technology has reshaped our reading habits in ways that were once unimaginable. This passage delves into the various aspects of how digitalization has influenced our reading experiences, both positively and negatively.The convenience offered by digital devices cannot be overstated. With the tap of a finger, readers can access an endless library of books, articles, and news from anywhere in the world. Gone are the days of trudging to the bookstore or waiting for a book to arrive in the mail. The instant gratification of digital reading appeals to many, especially those with busylifestyles who value time efficiency. Moreover, the ability to customize reading settings such as font size, background color, and brightness levels caters to individual preferences, enhancing the overall reading experience. However, the shift towards digital reading has also raised concerns about its impact on comprehension and retention. Some studies suggest that reading from screens can lead to decreased attention spans and reduced ability to process information deeply. The constant distractions of notifications and social media alerts can further fragment our focus, making it challenging to fully immerse oneself in a book or article. Additionally, the lack of tactile feedback from physical pages and the absence of the traditional smell and feel of a book can diminish the emotional connection readers form with the content.Moreover, the proliferation of digital content has led to an explosion of information, much of which is of questionable quality. The ease of publishing online has democratized access to the written word but has also opened the floodgates to misinformation and clickbait. Navigating through this deluge of content can be overwhelming, and readers must develop critical thinking skills to discern fact from fiction.Despite these challenges, digital technology also presents new opportunities for reading and learning. Interactive e-books, for instance, incorporate multimedia elements like videos, animations, and quizzes that can enrich the learning experience and make complex concepts more accessible.Furthermore, personalized recommendation algorithms can curate tailored reading lists based on an individual’s interests and reading history, fostering a sense of discovery and exploration.In conclusion, the impact of digital technology on reading habits is multifaceted. While it has undeniably brought about convenience and new forms of engagement, it has also raised concerns about comprehension, attention, and the quality of information available. As we continue to navigate this digital landscape, it is essential to strike a balance between embracing the benefits of technology and preserving the essence of reading as a deeply personal and enriching experience.Questions:1.What is the main advantage of digital reading mentioned in the passage?•A) The ability to access an endless library of content instantly. •B) The tactile feedback from physical pages.•C) The lack of distractions from notifications and social media. •D) The improved comprehension and retention of information.2.Which of the following is a concern raised about digital reading?•A) The enhanced emotional connection readers form with the content. •B) The increased attention spans and ability to process information deeply.•C) The decreased attention spans and reduced ability to process information deeply.•D) The limited customization options for reading settings.3.What is the primary issue with the proliferation of digital content mentioned in thepassage?•A) The lack of accessible information for readers.•B) The overabundance of high-quality content.•C) The challenge of navigating through a deluge of information, including misinformation.•D) The ease of publishing traditional books.4.How do interactive e-books contribute to the reading and learning experience?•A) By reducing the emotional connection readers form with the content. •B) By limiting access to multimedia elements like videos and animations. •C) By enriching the learning experience and making complex concepts more accessible.•D) By decreasing the convenience of digital reading.5.What is the overall message of the passage regarding the impact of digitaltechnology on reading habits?•A) Digital technology has only negative impacts on reading habits. •B) Digital technology has completely replaced traditional reading methods.•C) The impact is multifaceted, with both positive and negative aspects that require balance.•D) The benefits of digital technology far outweigh any potential drawbacks.三、阅读理解新题型(10分)Title: The Rise of E-commerce and Its Impact on Traditional RetailIn recent years, the landscape of retail has undergone a dramatictransformation, fueled primarily by the exponential growth of e-commerce.Once a niche market, online shopping has now become an integral part of consu mers’ lives, challenging the dominance of brick-and-mortar stores.This shift has far-reaching implications, reshaping not only the way we shop but also the very fabric of our economic and social structures.The Convenience Factor: At the heart of e-commer ce’s success lies its unparalleled convenience. With just a few clicks, customers can browse through a vast selection of products from the comfort of their homes, compare prices effortlessly, and have their purchases delivered right to their doorsteps. This has not only saved time but also reduced the need for physical travel, making it especially appealing to busy professionals and those living in remote areas.Access to a Global Market: Another significant advantage of e-commerce is its ability to break down geographical barriers. No longer constrained by the limitations of their local markets, businesses can now reach customers worldwide. Similarly, consumers have access to an unprecedented range of products from across the globe, often at more competitive prices than those available locally.Challenges for Traditional Retail: However, this digital revolution has notcome without its challenges for traditional retailers. The rise ofe-commerce has led to a decline in footfall at physical stores, impacting sales and profitability. To stay afloat, many retailers have had to adapt by investing in their online presence, offering click-and-collect services, and enhancing in-store experiences to attract customers.The Future of Retail: The future of retail is likely to be a blend of both online and offline experiences, with retailers leveraging technology to create seamless omnichannel strategies. Augmented reality, virtual try-ons, and personalized recommendations are just a few examples of how technology is reshaping the shopping experience. As consumers continue to embrace digital solutions, retailers must innovate and evolve to meet their changing needs.Questions:1.What is the main driver behind the transformation of the retail landscape in recentyears?A)The increasing popularity of mobile payments.B)The exponential growth of e-commerce.C)The decline of physical infrastructure.D)The introduction of new tax policies.Answer: B2.Which of the following is NOT mentioned as an advantage of e-commerce?A)The ability to compare prices easily.B)The elimination of physical travel for shopping.C)Access to exclusive products not available locally.D)The convenience of shopping from home.Answer: C3.What does the term “omnichannel strategies” refer to in the context of retail?A) A single sales channel used by retailers.B) A blend of online and offline shopping experiences.C) A marketing technique focused on social media.D) A strategy to reduce operating costs.Answer: B4.How has the rise of e-commerce impacted traditional retailers?A)It has led to an increase in their sales and profitability.B)It has made them more competitive in the global market.C)It has caused a decline in footfall at their physical stores.D)It has made them completely obsolete in the retail industry.Answer: C5.Which technology is mentioned as having the potential to reshape the shoppingexperience?A)Artificial Intelligence.B)Augmented Reality.C)Internet of Things.D)Blockchain.Answer: B四、翻译(本大题有5小题,每小题2分,共10分)First QuestionQuestion: Translate the following paragraph into Chinese:The digital era has revolutionized the way we interact with information, making it possible to access vast amounts of knowledge instantly from anywhere in the world. This paradigm shift has not only altered our personal lives but also transformed industries, businesses, and the very fabric of society. As individuals navigate this ever-evolving landscape, it becomes increasingly crucial to develop a strong sense of digital literacy, enabling us to critically evaluate information, protect our privacy, and harness the power of technology for positive outcomes.Answer:数字时代彻底改变了我们与信息互动的方式,使我们能够瞬间从世界任何地方获取大量知识。
2023届高考英语备考一轮复习七选五专题训练题组 (7)
全国百所名校2023年高考英语备考一轮复习资料七选五专练题组汇编(七)姓名:班级:得分:AAlthough Kobe Bryant is no longer with us, his unbreakable will on and off the basketball court lives on. In April 2020, it was announced that the late superstar would be chosen into the Naismith Memorial Basketball Hall of Fame, a prestigious(声誉高的) honor for basketball’s best. ___1___“His fierce competitiveness, work ethic and drive were unmatched,” Jeanie Buss, owner of the Los Angles Lakers, told ESPN(Entertainment and Sports Programs Network). “____2___ And they have now brought him to the Hall of Fame, where he will be remembered with the greatest who have ever played the game. No one deserves it more.”___3___ Indeed, it was his unmatchable commitment to be the best. He was merciless in his pursuit of dominating his opponents. He called it the “mamba mentality” after the black mamba, one of the world’s deadliest snakes—and also after the top killer from the 2003 movie Kill Bill, according to The New Yorker.“Mamba mentality is all about focusing on the process and trusting in the hard work,” he wrote in his book The Mamba Mentality: How I Play. “You could say I encouraged people to be their best selves. ___4_ That’s what leads to introspection(内省) and that’s what leads to improvement.”Though Kobe is gone, ___5_. No one can deny the Kobe’s power to inspire people to be their best selves.A.What made Kobe superior to his peers?B.Many people felt shocked and sad when he died.C.Those qualities helped Kobe lead us to five titles.D.he will never feel sorry for himself.E.I liked challenging people.F.he has left the world valuable spirits of persistence.G.Alongside Kobe, eight others will be chosen at a ceremony in May 2021.BAsk any kid what they dislike the most in their study routine, and they will answer, “homework.” ____1____ Fortunately, applying the following tips, you will help your kid deal with homework faster and more effectively.Setting the right workspaceSetting the perfect working environment is of outmost importance. That’s why you should make sure to separate places for playing and studying to prevent your kid from switching between them.____2____ Besides, ensure there are no things that can distract(分心) them.Once you set a spot, it is time to prepare to do the assignment. Remember: you want your kid to be focused. Therefore, the first thing to do is make everything necessary to complete the task within arm’s reach. Make sure your kid can access any note or textbook without leaving the workspace.____3____Unlike adults, kids are very active. And while the former can remain focused for around half an hour, children’s attention span(时长) is much shorter than that. That’s why it is essential to set up a work schedule to maintain concentration.With that being said, however long your kid’s working time is, remember to include several breaks.____4____Understanding teachers’ expectationsUsually, educators assign tricky and challenging tasks on purpose, because they want students to use and develop their skills.Whether you guide your kid through the writing process, it is important to understand the task before working on it.___5____Homework can be a real pain in the neck. Without the right strategy, you are doomed to spend lots of time completing home tasks. Hopefully, the mentioned tips will help your kid deal with assignments quickly and successfully.A.Drawing out an outlineB.Creating work scheduleC.Pick a quiet spot where your child can learn peacefully.D.Make sure your child knows what is being required from them.E.Dealing with home assignments is a widespread problem among kids.F.This will help restore the child’s attention and maintain their productivity.G.This will force your kid to follow schedule and learn to do their homework for better.CAfter a busy school year, there’s nothing wrong with sleeping late and watching TV or playing video games all day-at least for the first week or two of your summer vacation.____1___ Learn a language to make new friends. There are few things more fun than being able to speak another language. For more fun, choose a language you’ve always been interested in learning.____2___You can learn the basics of a language by downloading a language-learning app and completing all the lessons. You can look for opportunities to experience your new language in your community. For example, if you’re learning French, look through your local free newspaper to find French cultural activities in your area.Take a cooking course to learn culinary(烹饪)skills.___3___Reach community centers in your area to find out about cooking class offerings. During the summer, you may even findcooking courses specifically for teens.___4____Learning an individual sport over the summer is a great way to stay fit, especially if you play team sports during the school year. Even if you don’t normally play sports at school, taking any kind of sports class during the summer can help you get in shape and build up your confidence.Take arts and crafts(手工) classes to feel more creative. Local parks and recreation departments usually publish a list of their summer arts and crafts classes for teens. Library branches, craft stores and local businesses sometimes offer arts and crafts classes for teens during the summer, too. The great thing about arts and crafts classes is that they’re inexpensive.___5__. A.Play a new sport to stay fit.B.Then find learning resources online.C.Consider writing to yourself in a new language.D.They’re also short, so you can take several classes over the summer.E.If this gets boring, it might be time to break out of your comfort zone.F.Nothing surprises and pleases a family more than a teenager who can cook. G.Community centers offer a safe environment for individuals of all backgrounds to serve.DHow similar are language and music?Language is part of our daily lives, no matter where we live in the world. ____1____ Both language and music play a huge role in our culture and here are some of their similarities.Both language and music have a writing system.In English we record language using the alphabet, which is a collection of letters. Similarly, we use notes to keep a record of music. Musicians read notes and create meaning in the form of music. ____2____ By writing pieces of text or music, we are able to share experiences through time. We can read the ideas or hear the composition of someone who lived hundreds of years ago.____3____You can make a good guess at where someone is from by listening to the language he uses. In the same way, we know that styles of music are different around the world, giving us the opportunity to explore many different cultures through their music and providing us with music for every situation.Both share emotion.____4____ Of course you may be able to see it in my face, but you will know for sure through my words. Similarly, music can sound angry, sad or happy. Music can show you exactly how the composer was or is feeling, and allows us to share that emotion. When you feel happy, you might want to sing and dance to a happy song to celebrate your happiness. ____5____ I think we have all used music to express or process our emotions, often combining it with language in the form of song lyrics.A.Both are various with culture.B.Both are expressive around the world.C.How do you know that I am angry?D.We use language to express our thoughts.E.So just as you read English, you can read music.F.Similarly, music is also part of many people’s lives.G.In contrast, you probably also listen to sad music when you are feeling down.ECareer coaches provide a series of services, from helping you figure out what you want to do to exploring chances for career growth. ___1___ To make it all worthwhile, some helpful tips are offered here to help you choose a right coach.Know what type of professional you need to hire. ___2__ In other words, they help you explore your future career possibilities and figure out what is stopping you from advancing in your development.____3___ Go into your coaching relationship with an idea of what you think you need from them, but be willing to think about their guidance on what other measures may make you more successful- for example, Business Value training to make sure you’ll be satisfied in a new job.Try sample lessons to find the right one. Most coaches offer free sample lessons, which help you get to know their styles clearly. You may need a coach with career experiences, or you may need one who offers life advice. If you aren’t sure what you want, ask questions. ____4____ Consider cost, and make contact. Coaching fees are not the same. Some coaches charge more for polishing resumes, while others include that in the overall price. ____5____ Once you’re clear about it, you can make your decision and communicate with the chosen coach.A.Make sure you have a well-designed resume.B.You need to understand what you’re receiving for the expense.C.Career coaches also provide services for your personal training.D.Thus, you can assess whether the coach understands your needs.E.Engaging with a career coach requires an investment of time and money.F.Know which services you need and be open to services you don't know you need. G.Career coaches can help you decide how to make full use of your professional potential.全国百所名校2023年高考英语备考一轮复习资料七选五专练题组汇编答案(七)GCAEF【导语】本文是一篇说明文。
爱思唯尔期刊出版流程介绍
pamphlet #10Produced byLibrary Connect in collaboration with the Global Academic & Customer Relations DepartmentCONTENTSIntroduction PrepublicationProduction and Publication Dissemination and Use AppendicesRecommended Resources, USA , USAWhat’s journal publishing really about? Certainly it’s about a process, a well-established formalized system for communicating research results. But it’s not just about systems and technology. Most importantly, it’s about people and relationships.Journal publishing has stood the test of time since at least the mid-17th century when Denis de Sallo founded the Journal des Sçavans and Henry Oldenburg founded the journal PhilosophicalTransactions . What has made journal publishing truly valuable and enduring is human communication,the comments and ideas exchanged between authors, editors, reviewers and publishers.Ultimately, journal publishing cannot be a purely mechanical exercise. To ensure research articlesdeliver high-quality information and serve as building blocks for intellectual advancement and scientificdiscovery, researchers must submit their work to trusted and reputable journals which bring together experts – editors, advisory boards and reviewers – to see and comment on the work. To ensure we collectively achieve excellence and advancement, authors, reviewers and editors must deliberate and communicate regarding submitted papers and so improve their final versions, and publishers must ensure that high-quality literature is published and preserved for the future.As we publish journals, Elsevier provides the following valuable functions – unchanged since the days of Sallo and Oldenburg:■Registration: Date-stamping the research of a particular author to establish precedence ■Peer review: Employing a wholly independent peer-review process ■Dissemination: Broadcasting authors’ claims to peers and the media ■Archival record: Establishing a permanent record of authors’ findingsWhile providing the four core services traditionally associated with scholarly publishing, Elsevier also offers value-adding services – especially relating to our electronic products. Today these services include helping define new disciplines and providing forums for their debate and discourse; establishing and actively managing editorial boards; and investing in new technologies and partnerships that make new and archived research more accessible to a broad range of users.Whether we’re discussing the core functions or the value-adding services of journal publishing, we can see that people and relationships are at the heart of the enterprise. Through dialog and collaboration, authors, editors and reviewers working with Elsevier help us ensure the integrity of content we publish, encourage and introduce innovation, and guard our collective intellectual heritage.In this fast-changing world, no one can rest on what has been accomplished thus far. Elsevier will continue to listen, learn, test and adapt to meet the changing needs of our customers and the scholarly and scientific communities we serve.If you’re considering publishing with Elsevier, I hope this pamphlet provides useful information. If you’re already among librarians,authors, reviewers and editors working with Elsevier, I thank you for your confidence in our company and invite your input on how we can serve you better.My appreciation to all colleagues who've contributed to this pamphlet.Kind regards,Mayur Amin, Senior Vice President, Global Academic & Customer Relations Department, Elsevier, Oxford, UKMayur AminIntroductory Comments■■■EXPERIMENTCONDUCT RESEARCHASSESS IMPACTSBUILD FAMEIDENTIFY NEW AREASREPORT NEW FINDINGSPEER REVIEWResearchWorkflowconjecture.minds of the public.An independent charitable trust, Sense About Science promotes good science and evidence in public debates. Sense About Science works with scientists to:safe transactions.■■■Through partnerships with Book Aid International and the Sabre4321Archiving PolicyInternal ArchiveDe Facto ArchivesNational ArchivesOfficial ArchivesOfficial Archives。
Informix11主要新特性(从11.10到11.50)
复制数据库的一部分 管理起来比较复杂 非常低的延迟 ER为企业级的数据分布而设计 为企业级的数据分布而设计
3
© 2010 IBM Corporation
Information Management – Informix
共享磁盘辅节点 Shared Disk Secondary (SDS)
突破性的进展 – SDS辅节点
16
© 2010 IBM Corporation
Information Management – Informix
使用RTO策略来管理数据库重启 策略来管理数据库重启 使用
RTO: Recovery Time Objective(目标恢复时间) RTO用于设置IDS重启后从非正常状态中恢复的时间(以秒 为单位) 使用配置参数RTO_SERVER_RESTART来创建RTO策略
Information Management – Informix
监控和分析最近的SQL语句 语句 监控和分析最近的
通过配置SQL语句跟踪参数监控最近执行的SQL语句的性能 提供系统里执行的每一条SQL语句的统计信息 统计信息存储在可配置的环形缓冲区里 缺省情况下,这个特性是关闭的 可以有选择的将某些用户设置为使用这个特性 可更方便的分析SQL语句从而更好的进行性能调优
Informix 11 主要新特性
从11.10到11.50 到
2010年12月22日星期三
© 2010 IBM Corporation
Information Management – Informix
技术概览
高可用性 管理和应用 性能扩展 安全 应用开发 集成解决方案和相关产品
2
© 2010 IBM Corporation
2008年考研英语真题与答案解析
2008年全国硕士研究生招生考试英语(一)试题Section I Use of EnglishDirections:Read the following text. Choose the best word (s) for each numbered blank and mark [A], [B], [C] or [D] on ANSWER SHEET 1. (10 points)The idea that some groups of people may be more intelligent than others is one of those hypotheses that dare not speak its name. But Gregory Cochran is 1 to say it anyway. He is that 2 bird, a scientist who works independently3 any institution. He helped popularize the idea that some diseases not 4thought to have a bacterial cause were actually infections, which aroused much controversy when it was first suggested.5 he, however, might tremble at the6 of what he is about to do. Together with another two scientists, he is publishing a paper which not only7 that one group of humanity is more intelligent than the others, but explains the process that has brought this about. The group in 8are a particularpeople originated from central Europe. The process is natural selection.This group generally do well in IQ test, 9 12-15 points above the 10 value of 100, and have contributed 11 to the intellectual and cultural life of the West, as the 12 of their elites, including several world-renowned scientists, 13 . They also suffer more often than most people from a number of nasty genetic diseases, such as breast cancer. These facts, 14 , have previously been thought unrelated. The former has been 15 to social effects, such as a strong tradition of 16 education. The latter was seen as a (an) 17 of genetic isolation. Dr. Cochran suggests that the intelligence and diseases are intimately 18 . His argument is that the unusual history of these people has19 them to unique evolutionary pressures that have resulted in this 20 state of affairs.1.[A] selected [B] prepared [C] obliged [D] pleased2.[A] unique [B] particular [C] special [D] rare3.[A] of [B] with [C] in [D] against4.[A] subsequently [B] presently [C] previously [D] lately5.[A] Only [B] So [C] Even [D] Hence6.[A] thought [B] sight [C] cost [D] risk7.[A] advises [B] suggests [C] protests [D] objects8.[A] progress [B] fact [C] need [D] question9.[A] attaining [B] scoring [C] reaching [D] calculating10.[A] normal [B] common [C] mean [D] total11.[A] unconsciously[B] disproportionately[C] indefinitely[D] unaccountably12.[A] missions [B] fortunes [C] interests [D] careers13.[A] affirm [B] witness [C] observe [D] approve14.[A] moreover [B] therefore [C] however [D] meanwhile15.[A] given up [B] got over [C] carried on [D] put down16.[A] assessing [B] supervising [C] administering [D] valuing17.[A] development [B] origin [C] consequence [D] instrument18.[A] linked [B] integrated [C] woven [D] combined19.[A] limited [B] subjected [C] converted [D] directed20.[A] paradoxical [B] incompatible [C] inevitable [D] continuousSection II Reading ComprehensionPart ADirections:Read the following four texts. Answer the questions below each text by choosing [A], [B], [C] or [D]. Mark your answers on ANSWER SHEET 1. (40 points)Text 1While still catching up to men in some spheres of modern life, women appear to be way ahead in at least one undesirable category. “Women are particularly susceptible to developing depression and anxiety disorders in response to stress compared to men,” according to Dr. Yehuda, chief psychiatrist at New York’s Veteran’s Administration Hospital.Studies of both animals and humans have shown that sex hormones somehow affect the stress response, causing females under stress to produce more of the trigger chemicals than do males under the same conditions. In several of the studies, when stressed-out female rats had their ovaries (the female reproductive organs) removed, their chemical responsesbecame equal to those of the males.Adding to a woman’s increased dose of stress chemicals, are her increased “opportunities” for stress. “It’s not necessarily that women don’t cope as well. It’s just that they have so much more to cope with,” says Dr. Yehuda. “Their capacity for tolerating stress may even be greater than men’s,” she observes, “it’s just that they’re de aling with so many more things that they become worn out from it more visibly and sooner.”Dr. Yehuda notes another difference between the sexes. “I think that the kinds of things that women are exposed to tend to be in more of a chronic or repeated nature. Men go to war and are exposed to combat stress. Men are exposed to more acts of random physical violence. The kinds of interpersonal violence that women are exposed to tend to be in domestic situations, by, unfortunately, parents or other family members, and they tend not to be one-shot deals. The wear-and-tear that comes from these longer relationships can be quite devastating.”Adeline Alvarez married at 18 and gave birth to a son, but was determined to finish college. “I struggled a lot to get the college degree. I was living in so much frustration that that was my escape, to go to school, and get ahead and do better.” Later, her marriage ended and she became a single mother. “It’s the hardest thing to take care of a teenager, have a job, pay the rent, pay the car payment, and pay the debt.I lived from paycheck to paycheck.”Not everyone experiences the kinds of severe chronic stresses Alvarez describes. But most women today are coping with a lot of obligations, with few breaks, and feeling the strain. A lvarez’s experience demonstrates the importance of finding ways to diffuse stress before it threatens your health and your ability to function.21. Which of the following is true according to the first two paragraphs?[A] Women are biologically more vulnerable to stress.[B] Women are still suffering much stress caused by men.[C] Women are more experienced than men in coping with stress.[D] Men and women show different inclinations when faced with stress.22. Dr. Yehuda’s research suggests that women .[A] need extra doses of chemicals to handle stress[B] have limited capacity for tolerating stress[C] are more capable of avoiding stress[D] are exposed to more stress23. According to Paragraph 4, the stress women confront tends to be .[A] domestic and temporary[B] irregular and violent[C] durable and frequent[D] trivial and random24. The sentence “I lived from paycheck to paycheck.” (Line 5, Para. 5) shows that .[A] Alvarez cared about nothing but making money[B] Alvarez’s salary barely covered h er household expenses[C] Alvarez got paychecks from different jobs[D] Alvarez paid practically everything by check25. Which of the following would be the best title for the text?[A] Strain of Stress: No Way Out?[B] Response to Stress: Gender Difference[C] Stress Analysis: What Chemicals Say?[D] Gender Inequality: Women Under StressText 2It used to be so straightforward. A team of researchers working together in the laboratory would submit the results of their research to a journal. A journal editor would then remove the author’s names and affiliations from the paper and send it to their peers for review. Depending on the comments received, the editor would accept the paper for publication or decline it. Copyright rested with the journal publisher, and researchers seeking knowledge of the results would have to subscribe to the journal.No longer. The Internet—and pressure from funding agencies, who are questioning why commercial publishers are making money fromgovernment–funded research by restricting access to it—is making access to scientific results a reality. The Organization for Economic Co-operation and Development (OECD) has just issued a report describing the far-reaching consequences of this. The report, by John Houghton of Victoria University in Australia and Graham Vickery of the OECD, makes heavy reading for publishers who have, so far, madehandsome profits. But it goes further than that. It signals a change in what has, until now, been a key element of scientific endeavor.The value of knowledge and the return on the public investment in research depends, in part, upon wide distribution and ready access. It is big business. In America, the core scientific publishing market is estimated at between $7 billion and $11 billion. The International Association of Scientific, Technical and Medical Publishers says that there are more than 2,000 publishers worldwide specializing in these subjects. They publish more than 1.2 million articles each year in some 16,000 journals.This is now changing. According to the OECD report, some 75% of scholarly journals are now online. Entirely new business models are emerging; three main ones were identified by the report’s authors. There is theso-called big deal, where institutional subscribers pay for access to a collection of online journal titles through site-licensing agreements. There is open-access publishing, typically supported by asking the author (orhis employer) to pay for the paper to be published. Finally, there are open-access archives, where organizations such as universities or international laboratories support institutional repositories. Other models exist that are hybrids of these three, such as delayed open-access, where journals allow only subscribers to read a paper for the first six months, before making it freely available to everyone who wishes to see it. All this could change the traditional form of the peer-review process, at least for the publication of papers.26. In the first paragraph, the author discusses .[A] the background information of journal editing[B] the publication routine of laboratory reports[C] the relations of authors with journal publishers[D] the traditional process of journal publication27. Which of the following is true of the OECD report?[A] It criticizes government-funded research.[B] It introduces an effective means of publication.[C] It upsets profit-making journal publishers.[D] It benefits scientific research considerably.28. According to the text, online publication is significant in that .[A] it provides an easier access to scientific results[B] it brings huge profits to scientific researchers[C] it emphasizes the crucial role of scientific knowledge[D] it facilitates public investment in scientific research29. With the open-access publishing model, the author of a paper is required to .[A] cover the cost of its publication[B] subscribe to the journal publishing it[C] allow other online journals to use it freely[D] complete the peer-review before submission30. Which of the following best summarizes the text?[A] The Internet is posing a threat to publishers.[B] A new mode of publication is emerging.[C] Authors welcome the new channel for publication.[D] Publication is rendered easily by online service.Text 3In the early 1960s Wilt Chamberlain was one of the only three players in the National Basketball Association (NBA) listed at over seven feet. If he had played last season, however, he would have been one of 42. The bodies playing major professional sports have changed dramatically over the years, and managers have been more than willing to adjust team uniforms to fit the growing numbers of bigger, longer frames.The trend in sports, though, may be obscuring an unrecognized reality: Americans have generally stopped growing. Though typically about two inches taller now than 140 years ago, today’s people—especially those born to families who have lived in the U.S. for many generations—apparently reached their limit in the early 1960s.And they aren’t likely to get any taller. “In the general population to day, at this genetic, environmental level, we’ve pretty much gone as far as we can go,” says anthropologist William Cameron Chumlea of Wright State University. In the case of NBA players, their increase in height appears to result from the increasingly common practice of recruiting players from all over the world.Growth, which rarely continues beyond the age of 20, demands calories and nutrients—notably, protein —to feed expanding tissues. At the start of the 20th century, under-nutrition and childhood infections got in the way. But as diet and health improved, children and adolescents have, on average, increased in height by about an inch and a half every 20 years, a pattern known as the secular trend in height. Yet according to the Centers for Disease Control and Prevention, average height—5'9" for men, 5'4" for women—hasn’t really changed since 1960.Genetically speaking, there are advantages to avoiding substantial height. During childbirth, larger babies have more difficulty passing through the birth canal. Moreover, even though humans have been upright for millions of years, our feet and back continue to struggle with bipedal posture and cannot easily withstand repeated strain imposed by oversize limbs. “There are some real constraints that are set by th e genetic architecture of the individual organism,” says anthropologist William Leonard of Northwestern University.Genetic maximums can change, but don’t expect this to happen soon. Claire C. Gordon, senior anthropologist at the Army Research Center in Natick, Mass., ensures that 90 percent of the uniforms and workstations fit recruits without alteration. She says that, unlike those for basketball, the length of military uniforms has not changed for some time. And if you need to predict human height in the near future to design a piece of equipment, Gordon says that by and large, “you could use today's data and feel fairly confident.”31. Wilt Chamberlain is cited as an example to .[A] illustrate the change of height of NBA players[B] show the popularity of NBA players in the U.S.[C] compare different generations of NBA players[D] assess the achievements of famous NBA players32. Which of the following plays a key role in body growth according to the text?[A] Genetic modification.[B] Natural environment.[C] Living standards.[D] Daily exercise.33. On which of the following statements would the author most probably agree?[A] Non-Americans add to the average height of the nation.[B] Human height is conditioned by the upright posture.[C] Americans are the tallest on average in the world.[D] Larger babies tend to become taller in adulthood.34. We learn from the last paragraph that in the near future .[A] the garment industry will reconsider the uniform size[B] the design of military uniforms will remain unchanged[C] genetic testing will be employed in selecting sportsmen[D] the existing data of human height will still be applicable35. The text intends to tell us that .[A] the change of human height follows a cyclic pattern[B] human height is becoming even more predictable[C] Americans have reached their genetic growth limit[D] the genetic pattern of Americans has alteredText 4In 1784, five years before he became president of the United States, George Washington, 52, was nearly toothless. So he hired a dentist to transplant nine teeth into his jaw—having extracted them from the mouths of his slaves.That’s a far different image from the cherry-tree-chopping George most people remember from their history books. But recently,many historians have begun to focus on the role slavery played in the lives of the founding generation. They have been spurred in part by DNA evidence made available in 1998, which almost certainly proved Thomas Jefferson had fathered at least one child with his slave Sally Hemings. And only over the past 30 years have scholars examined history from the bottom up. Works of several historians reveal the moral compromises made by the nation’s early leaders and the fragile nature of the country’s infancy. More significant, they argue that many of the Founding Fathers knew slavery was wrong—and yet most did little to fight it.More than anything, the historians say, the founders were hampered by the culture of their time. While Washington and Jefferson privately expressed distaste for slavery, they also understood that it was part of the political and economic bedrock of the country they helped to create.For one thing, the South could not afford to part with its slaves. Owning slaves was “like having a large bank account,” says W iencek, author of An Imperfect God: George Washington, His Slaves, and the Creation of America. The southern states would not have signed the Constitution without protections for the “peculiar institution,” including a clause that counted a slave as three fifths of a man for purposes of congressional representation.And the statesmen’s political lives depended on slavery. The three-fifths formula handed Jefferson his narrow victory in the presidential election of 1800 by inflating the votes of the southern states in the Electoral College. Once in office, Jefferson extended slavery with the Louisiana Purchase in 1803; the new land was carved into 13 states, including three slave states.Still, Jefferson freed Hemings’s children—though not Hemings herself or his approximately 150 other slaves. Washington, who had begun to believe that all men were created equal after observing the bravary of the black soldiers during the Revolutionary War, overcame the strong opposition of his relatives to grant his slaves their freedom in his will. Only a decade earlier, such an act would have required legislative approval in Virginia.36. George Washington’s dental surgery is mentioned to .[A] show the primitive medical practice in the past.[B] demonstrate the cruelty of slavery in his days.[C] stress the role of slaves in the U.S. history.[D] reveal some unknown aspect of his life.37. We may infer from the second paragraph that .[A] DNA technology has been widely applied to history research.[B] in its early days the U.S. was confronted with delicate situations.[C] historians deliberately made up some stories of Jefferson’s life.[D] political compromises are easily found throughout the U.S. history.38. What do we learn about Thomas Jefferson?[A] His political view changed his attitude towards slavery.[B] His status as a father made him free the child slaves.[C] His attitude towards slavery was complex.[D] His affair with a slave stained his prestige.39. Which of the following is true according to the text?[A] Some Founding Fathers benefit politically from slavery.[B] Slaves in the old days did not have the right to vote.[C] Slave owners usually had large savings accounts.[D] Slavery was regarded as a peculiar institution.40. Washington’s decision to free sla ves originated from his .[A] moral considerations.[B] military experience.[C] financial conditions.[D] political stand.Part BDirections:In the following text, some segments have been removed. For Questions 41-45, choose the most suitable one from the list A-G to fit into each ofthe numbered blanks. There are two extra choices, which do not fit in any of the blanks. Mark your answers on ANSWER SHEET 1. (10 points)The time for sharpening pencils, arranging your desk, and doing almost anything else instead of writing has ended. The first draft will appear on the page only if you stop avoiding the inevitable and sit, stand up, or lie down to write. (41)_______________.Be flexible. Your outline should smoothly conduct you from one point to the next, but do not permit it to railroad you. If a relevant and important idea occurs to you now, work it into the draft. (42) _______________. Grammar, punctuation, and spelling can wait until you revise. Concentrate on what you are saying. Good writing most often occurs when you are in hot pursuit of an idea rather than in a nervous search for errors.(43) _______________. Your pages will be easier to keep track of that way, and, if you have to clip a paragraph to place it elsewhere, you will not lose any writing on either side.If you are working on a word processor, you can take advantage of its capacity to make additions and deletions as well as move entire paragraphs by making just a few simple keyboard commands. Some software programs can also check spelling and certain grammatical elements in your writing. (44) _______________. These printouts are also easier to read than the screen when you work on revisions.Once you have a first draft on paper, you can delete material that is unrelated to your thesis and add material necessary to illustrate your points and make your paper convincing. The student who wrote “The A&P as a State of Mind” wisely dropped a paragraph that questioned whether Sammy displays chauvinistic attitudes toward women. (45) _______________.Remember that your initial draft is only that. You should go through the paper many times—and then again—working to substantiate and clarify your ideas. You may even end up with several entire versions of the paper. Rewrite. The sentences within each paragraph should be related to a single topic. Transitions should connect one paragraph to the next so that there are no abrupt or confusing shifts. Awkward or wordy phrasing or unclear sentences and paragraphs should be mercilessly poked and prodded into shape.[A] To make revising easier, leave wide margins and extra space between lines so that you can easily add words, sentences andcorrections. Write on only one side of the paper.[B] After you have already and adequately developed the body of your paper, pay particular attention to the introductory and concluding paragraphs. It’s probably best to write the introduction last, after you know precisely what you are introducing. Concluding paragraphs demand equal attention because they leave the reader with a final impression.[C] It’s worth remembering, however, that though a clean copy fresh off a printer may look terrible, it will read only as well as the thinking and writing that have gone into it. Many writers prudently store their data on disks and print their pages each time they finish a draft to avoid losing any material because of power failures or other problems.[D] It makes no difference how you write, just so you do. Now that you have developed a topic into a tentative thesis, you can assemble your notes and begin to flesh out whatever outline you have made.[E] Although this is an interesting issue, it has nothing to do with the thesis, which explains how the setting influences Sammy’s decision to quit his job. Instead of including that paragraph, she added one that described Lengel’s crabbed response to the girls so that she could lead up to the A & P “policy” he enforces.[F] In the final paragraph about the significance of the setting in “A&P” the student brings together the reasons Sammy quit his job by referring to his refusal to accept Lengel’s store policies.[G] By using the first draft as a means of thinking about what you want to say, you will very likely discover more than your notes originally suggested. Plenty of good writers don’t use ou tlines at all but discover ordering principles as they write. Do not attempt to compose a perfectly correct draft the first time around. Part CDirections:Read the following text carefully and then translate the underlined segments into Chinese. Your translation should be written neatly on ANSWER SHEET 2. (10 points)In his autobiography,Darwin himself speaks of his intellectualpowers with extraordinary modesty. He points out that he always experienced much difficulty in expressing himself clearly and concisely, but (46)he believes that this very difficulty may have had the compensating advantage of forcing him to think long and intently about every sentence, and thus enabling him to detect errors in reasoning and in his own observations. He disclaimed the possession of any great quickness of apprehension or wit, such as distinguished Huxley. (47) He asserted, also, that his power to follow a long and purely abstract train of thought was very limited, for which reason he felt certain that he never could have succeeded with mathematics. His memory, too, he described as extensive, but hazy. So poor in one sense was it that he never could remember for more than a few days a single date or a line of poetry. (48) On the other hand, he did not accept as well founded the charge made by some of his critics that, while he was a good observer, he had no power of reasoning. This, he thought, could not be true, because the “Origin of Species” is one long argument from the beginning to the end, and has convinced many able men. No one, he submits, could havewritten it without possessing some power of reasoning. He was willing to assert that “I have a fair share of invention, and of common sense or judgment, such as every fairly successful lawyer or doctor must have, but not, I believe, in any higher degree.” (49)He adds humbly that perhaps he was “superior to the common run of men in noticing things which easily escape attention, and in observing them carefully.”Writing in the last year of his life, he expressed the opinion that in two or three respects his mind had changed during the preceding twenty or thirty years. Up to the age of thirty or beyond it poetry of many kinds gave him great pleasure. Formerly, too, pictures had given him considerable, and music very great, delight. In 1881, however, he said: “Now for many years I cannot endure to read a line of poetry. I have also almost lost my taste for pictures or music.” (50) Darwin was convinced that the loss of these tastes was not only a loss of happiness, but might possibly be injurious to the intellect, and more probably to the moral character.Section III WritingPart A51. Directions:You have just come back from Canada and found a music CDin your luggage that you forgot to return to Bob, your landlord there. Write him a letter to1) make an apology, and2) suggest a solution.You should write about 100 words on ANSWER SHEET 2.Do not sign your own name at the end of the letter. Use “Li Ming” instead.Do not write the address. (10 points)Part B52. Directions:Write an essay of 160-200 words based on the following drawing. In your essay, you should1) describe the drawing briefly,2) explain its intended meaning, and then3) give your comments.You should write neatly on ANSHWER SHEET 2. (20 points)2008年全国硕士研究生招生考试英语(一)答案详解Section I Use of English一、文章总体分析这是一篇议论文。
Polycom OBi302 2线VoIP适配器说明书
DATA SHEETPolycom® OBi3022 line VoIP Adapter connects home and business analog phones to the digital voice communications worldPolycom OBi302 expands your service portfolio by enhancing the communication possibilities of home offices with flexibility in voice, fax and modem applications as they transition to the digital communications world. Home and business offices can maximize their current analog investment by keeping up to two analog phones or fax machines subscribed to up to four independently configurable VoIP services, one OBiTALK peer-to-peer voice service, and one POTS (Plain Old Telephone Service) subscription*. This dedicated device prioritizes phone calls above other internet traffic coming through the LAN port to ensure users clearly hear every important word. Alternatively, with support of the T.38 fax standard, home and business office users can send and/or receive reliable facsimile calls over the Internet.Provide your customers new wireless capabilities with WiFiand BluetoothPolycom OBi302 is never tied to any inconvenient Ethernet port location. It can be placed anywhere within range of a 2.4 GHz or 5 GHz, 802.11ac wireless access point when used with the Polycom USB WiFi adapter. Similarly, the USB Bluetooth adapter pairs a user’s mobile phone or Bluetooth audio headset so they can place and answer calls using their mobile service via analog phones.Simplify deployment and on-going support with OBiTALKPolycom’s OBiTALK device management platform will help you save time and hassle by being able to access the device without the need to get behind the customer’son-site network. With support for the OBi302, Polycom OBiTALK lets you provision the device to meet your customer specifications or update them from any place with a connection to the Internet. Provide best in class support to your customers by quickly identifying issues and remotely troubleshooting devices.The Polycom OBiTALK is a reliable, secure, cloud-based, out-of-band management interface designed for massive scale zero-touch device bootstrapping, configuration customization, and provisioning. Polycom OBiTALK also provides for in-service device management and troubleshooting, with functionality including device logging, packet capture, call QoS and statistics reporting.*Requires Polycom OBiLINE USB FXO adapter Key benefits• Expand your service portfolioby offering flexible voice andfax applications to home and business offices• Easily configure and roll-out services and provide on-going fast support with the Polycom OBiTALK cloud-based management platform • The only VoIP adapter that supports WiFi capabilities through optional adapterl for voice and voice-band data applications• Connect up to a combination of2 analog phones or fax machines to transition voice communicationsto the digital worldProduct requirements• Active Internet Connection• Analog Touch Tone Phone• Access to Internet Via a Switched Ethernet Port on Home or Office Router • (Optional) Active Internet Phone Service Subscription with All Required SIP Credentials to Make & Receive Calls Polycom OBi302 ships with• OBi302 Voice Service Bridge and Telephone Adapter• Power Adapter• 1 x RJ-45 Ethernet Cable(80 inches/203 centimeters)• Quick Start/Installation Guide Warranty• 1 yearProduct dimensions (L x W x H)• 6.9 cm x 6.9 cm x 3.0 cm(2.7 in x 2.7 in x 1.2 in)Unit weight• 198 grams/7 ounces• Shipping weight: 340 grams/12 ounces (Including Power Supply, Ethernet Cable and Packaging)Interface features• Internet (WAN): 2 x 10/100BaseT Ethernet Port (802.3)• Phone: 2 x RJ-11 FXS Analog Phone Port • USB: USB 2.0• Reset Button: Located on Bottom of Case • LEDs: Power/Status, Ethernet Activity (WAN),Phone Port 1, Phone Port 2• LED indications: Power On, Status, upgrade in Progress Status, Packet RX/ TX, Phone Port 1 and 2 Status Telephony features• Call Routing Rules• Automated Attendant with Configurable Answer Delay• PIN Access Control to AA (Up to 4 PINs) • Recursive Digit Map for Call Routing (AA, Phone, Voice Gateways, Trunk Groups) • AA Configurable Outbound Call Routing Rules• SIP Service Configurable Inbound Call Routing Rules• Fax Pass Through (G.711)• T.38 Fax Relay for Fax over IP• Modem Pass Through (G.711)• In-Band DTMF (G.711)• Out of Voice Band DTMF (RFC 2833) • Out of Voice Band DTMF (SIP INFOMethod)• Call Progress Tone Generation• Tone Profile per SIP SP and OBiTALKService• Ring Profile per SIP SP and OBiTALKService• Star Code Profile per SIP SP andOBiTALK Service• Full Duplex Audio• G.165, 168 Echo Cancelation• VAD—Voice Activity Detection• Silence Suppression• Comfort Noise Generation• Three Way Conference Calling withLocal Mixing• Hook Flash Event Signaling• Flash Hook Timer• Caller ID—Name and Number perBellcore, ETSI, DTMF, and NTT• MWI—Message Waiting Indicator• Visual Message Waiting Indication (VMWI)• Daylight Savings Time Support—Worldwide• Caller ID Enable/Disable• Caller ID Number• Caller ID Name (Alphanumeric)• Caller ID Spoofing• Call Waiting• Maximum Session Control• Call Forward—Unconditional• Call Forward on Busy• Call Forward on No Answer (Ring CountConfigurable)• Call Transfer Enable/Disable• Anonymous Call Block• Anonymous Call• Do Not Disturb• Call Return• Repeat DialingData networking• MAC Address (IEEE 802.3)• UDP (RFC 768) in SSL/TLS• TCP (RFC 793) in SSL/TLS• IP version 4, IPv4 (RFC 791)—Static IP andDHCP Support• ICMP (RFC 792)• ARP—Address Resolution Protocol• Domain Name System (DNS) A Records(RFC 1706) and SRV Records (RFC 2782)RTP (RFC 1889, 1890), RFC 5966• RTP/RTCP (RFC 1889), DHCP Client(RFC 2131)• DiffServ (RFC 2475)—IndependentlyConfigured: Service, SIP and Media• ToS (RFC 791, 1349)—IndependentlyConfigured: Service, SIP and Media• VLAN Tagging (802.1p—IndependentlyConfigured: Service, SIP and Media• SNTP (RFC 2030)—Primary andSecondary NTP Servers• LLDP-MEDSecurity• Local Access Interface: IVR Password• Remote Access Interface: User Nameand Password Access via HTTP, TFTP—HTTPS• Device Web Page Standard: HTTP v1.1,XML v1.0• Secure Remote Provisioning: HTTP,HTTPSVoIP features• Four (4) Service Provider ConfigurationProfile Assignments (ITSP 1–4)• Four (4) Service /Trunk SubscriptionProfile Assignments (SP 1–4)• SIPv2 (RFC 3261, 3262, 3263, 3264)• SIP over UDP• SIP over TCP• SIP over TLS• 4 SIP Service Provider ServiceSessions—Concurrent Operation• 1 OBiTALK Service Session• SIP Proxy Redundancy—Local or DNSBased SVR, Primary and SecondaryFallback List Restrict Source IP Address• Maximum Number of Sessions—Independent per Service• 4 Trunk Groups• Voice Gateway—Direct Dialing• G.711 A-Law (64 kbps)• G.711 µ-Law (64 kbps)• G.726 (32 kbps) G.729a (8 kbps) iLBC(13.3, 15.2 kbps) Codec Pre-selectionCode• Voice Processing per SIP Service—TX/RX Audio Gain, Echo Cancellation• Adjustable Audio Frames per Packet• Codec Name Assignment• Codec Profile per SIP SP and OBiTALKService• Dynamic Audio Payload• Packet Loss Concealment• Jitter Buffer (Adaptive)• STUN• ICE• SUBSCRIBE/NOTIFY Framework(RFC 3265)• NOTIFY Dialog, Line Status• SUBSCRIBE Message Summary• VoIP NAT Interworking• DATE Header Support• Remote-Party-ID (RPID)• P-Asserted-Identity (PAID)• RTP Statistics in BYE Message and SIP PUBLISH with MOS ScorePower• Universal Switching with Fixed US, EU, UK Style Plug Prongs (Model Dependent)• AC Input: 100 to 240 Volts 0.3A 50–60Hz (26–34 VA)• DC Input: +12V 1.0 Amp Max Certifications• FCC Part 15 Class B• A-Tick• CE• ICES-003• RoHS• WEEE• UL/cUL—Power Adapter Environmental conditions• Operating temperature: 0º to 45º C(32º to 113º F)• Relative humidity: 10% to 90% Non-condensing• Storage temperature: –25º to 85º C(–13º to 185º F) Management—Configuration• Local Access Interface: IVR, Web Page—Password Protected (Admin and User Level Log-in)• Remote Access Interface: Syslog (Multi-Level Granularity), Invokable via SIP Notify, Web, Provisioning• Device Web Page Standard: HTTP v1.1, XML v1.0• Remote Provisioning: XML via TFTP or HTTP, (TR069/TR104 Parameter Naming Syntax)• Secure Remote Provisioning: HTTPS, Encrypted XML via HTTP or TFTP—Dedicated User Name and Password • Secure Remote Firmware Update: Encrypted Binary File via TFTP or HTTP + Dedicated User Name and Password • Customization: OBi-ZT: Obihai Zero-Touch Automatic Customization and Configuration **• Call History (CDRs): Call Detail Records on OBi Web Page, Export to XML• LED Indications: Power, Device Status, Upgrade Progress Status, Ethernet Activity, PHONE Status • Session Information: SIP Session Status,OBiTALK Status, Phone Port Status• Primary SIP Service Set-Up Wizard:Dedicated Device Web Page for QuickITSP Account Set-Up• System Settings Back-Up/Restore: Saveand Restore Configuration via XML fileto/from a Local FolderRTP Statistics• RTP Transport Type• Audio Codec Type (Tx/Rx)• RTP Packetization—in multiples of 10ms(Tx/Rx)• RTP Packet Count (Tx/Rx)• RTP Byte Count (Tx/Rx)• Packets Out-Of-Order• Packets Interpolated• Packets Late (Dropped)• Packets Lost• Packet Loss Rate %• Packet Drop Rate %• Jitter Buffer Length–ms• Received Interarrival Jitter–ms• Jitter Buffer Underruns• Jitter Buffer OverrunsCall Progress• Configurable Call Progress Tone• Call Progress Tone Profiles (2)• Dial Tone• Busy Tone• Ringback Tone• Reorder Tone• Confirmation Tone• Holding Tone• Second Dial Tone• Stutter Tone• Howling Tone• Prompt Tone• Call Forwarded Tone• Conference Tone• SIT Tones (1–4)• Ringing and Call Waiting ToneConfiguration• Ring Patterns (10)—Configurable• Call Waiting Tone Patterns (10)—Configurable• Call Waiting Tone Pattern Profiles (2)Star Code Configuration• Configurable Star Codes• Star Code Profiles (2)• Redial• Call Return• Activate Block Caller ID• Deactivate Block Caller ID• Block Caller ID Once• Unblock Caller ID Once• Activate Call Forwarding (All Calls)• Deactivate Call Forwarding (All Calls)• Activate Call Forward on Busy• Deactivate Call Forward on Busy• Activate Call Forward on No Answer• Deactivate Call Forward on No Answer• Activate Block Anonymous Calls• Deactivate Block Anonymous Calls• Activate Call Waiting• Deactivate Call Waiting• Activate Do Not Disturb• Deactivate Do Not Disturb• Activate Repeat Dial• Deactivate Repeat DialFXS SLIC (Subscriber Line IntegratedCircuit): Phone Port• Ringer Specifications: Ring Frequency:14Hz–68Hz, Ring Waveform: Trapezoidal,Sinusoidal, Ring Voltage: 55v–85v• Maximum Ring Load: 5 REN (RingerEquivalence Number) per Phone PortFXS (PHONE Port) ConfigurationSettings• Recursive Digit Map and AssociatedOutbound Call Routing• On-Hook Tip Ring Voltage: 30v–52v• Off-Hook Current Max: 15mA–45mA• Impedance: 12 Independent Settings• DTMF Playback Level: –90 dBm–3 dBm• Caller ID Method: Bellcore, ETSI (FSK orDTMF)• Caller ID Trigger (Before/After First Ring,Polarity Reversal)• Channel Tx Gain: –12dB to 6 dB at 1 dBResolution• Channel Rx Gain: 12dB to 6 dB at 1 dBResolution• Silence Detect Sensitivity• Hook Flash Time Max• Hook Flash Time Min• CPC Delay Time• CPC Duration• Idle Polarity• Connect Polarity© 2018 Polycom, Inc. All rights reserved. All Polycom® names and marks associated with Polycom products are trademarks or service marks of Polycom, Inc. and are registered or common law marks in the United States and other countries. All other trademarks are property of their respective owners. No portion hereof may be reproduced or transmitted in any form or by any means, for any purpose other than the recipient’s personal use, without the express written permission of Polycom.33383-0318Polycom, Inc.1.800.POLYCOM Polycom Asia Pacific Pte Ltd +65 6389 9200.sgPolycom EMEA +44 (0)1753 About PolycomPolycom helps organizations unleash the power of human collaboration. More than 400,000 companies and institutionsworldwide defy distance with video, voice and content solutions from Polycom. Polycom and its global partner ecosystem provide flexible collaboration solutions for any environment that deliver the best user experience and unmatched investment protection.Learn moreVisit /voip to learn more about our VoIP products.。
将图书馆和图书馆员融入课堂教学的方式英文版
Approaches for integrating the library and librarians into theteaching/learning processes of the classroomAbstractThe paper discusses the role of the librarian in the life of classrooms. The aim of the discussion is to present ideas that can be applied to support the integration of the librarian and library tools (which are increasingly found online) into the practical and intellectual lives of courses from the elementary school through college. Librarians can be major contributors to courses. In addition to library skills, they are often engaged in other intellectual pursuits that are supportive of courses. Even if librarians may not have specific content knowledge, their broad backgrounds in research, as well as their personal intellectual endeavors and interests, enable them to contribute.Involving librarians as partners and resources is a practice that is gaining currency. Online resources are available but may challenge teachers, and librarians can mediate and help incorporate those resources.Teacher-librarian-class partnerships also make sense in environments in which student expectations continue to rise, and accountability for learning is more exposed to scrutiny. Finally, it is suggested that the librarian’s skill combined with the ubiquity of online tools can createscalable resources that transcend geographical location.IntroductionThis paper discusses approaches to utilizing and integrating the significant skills and resources of librarians within classrooms. The material is intended to serve a broad range of teachers and instructors, and, depending on resources, may be applicable in elementary through college level settings. The writer’s perspective is that of the college level instructor, but the ubiquity of many of the resources discussed here makes the information applicable in courses at nearly all levels.Suggestions here can be considered to be of primary use in core courses, given their importance to any curriculum. Because of that importance, such courses rightfully receive planning attention, and the use of the library and librarians in developing those courses will be of immediate benefit. Lessons learned will naturally apply to other courses in successive iterations.This discussion centers on the activities of a single teacher in a single classroom, working with perhaps one librarian, in creating a working model of integrative activities than will provide visibility and support for subsequent applications in other classes, or perhapsdepartments and schools, or, ideally, institutions.The paper intends to provide a framework that can support greater integration of the library and library staff into the practical and intellectual lives of courses and classrooms.Three types of classrooms are assumed, and one additional opportunity, which is providing training for librarians. One is the traditional face-to-face classroom. Students and the teacher will have access to Internet and Web tools, but they may not be immediately available in the classroom, or may not be widely used in the course.A second type is the face-to-face course that has access to Web tools such that they are be utilized during the course, but may or may not be used in the classroom. At Golden Gate University, () these are called web-enhanced courses. That means that there is an online course shell that houses course information. In this mode, the online shell is not a primary teaching/learning tool, but is used as an information repository.A third mode is the completely online course. At Golden Gate University these courses are housed in what is called Cybercampus (). These are completely online courses that use online lectures, examinations, discussions and homework activities as the primary teaching mode.Additionally, best practices that emerge in practice can be applied in a fourth setting , in planning and delivering online or blended programs that provide training for librarians.The librarian-as-resource and librarian-as-colleague models are assumed here, and the ubiquity of online and related resources can be applied to development for librarians as well as to particular courses and classes.Mediating all of these are World Wide Web/Internet tools, such as file storage,audio/video creation and storage, as well as the now ubiquitous social networking tools such as YouTube, Facebook and LinkedIn. Additionally, users can easily create and publish personal or group weblogs () and wikis ().Taken together these are presenting librarians, teachers and students new opportunities for productive collaboration in ways that can lessen the traditional distance between students’ information needs and in formation resources.In conclusion, the paper further posits that resulting information/resource-sharing models might be used in globally distributed programs and collaborations.Background, settingI am a professor housed in Undergraduate Programs at Golden Gate University in San Francisco, California (). My responsibilities include teaching at all levels from undergraduate through doctorate. As an early adopter of online teaching (from 1991), I’ve also been an active participant in technology-mediated and online teaching/learning, from several perspectives including pedagogy, course design, actual teaching, programdesign for online programs, program/teacher management and assessment.Golden Gate University has traditional degrees and programs featuring face-to-face courses, in addition to a mature online teaching/learning environment, with 15 fully accredited, fully online degrees. The university has a significant history in the San Francisco (USA, California) area as a practitioner-oriented law, business, accounting and tax school.Over time, our university’s library staff has always been highly engaged with us. For some years, the library was considered the best business resource library in San Francisco. With the evolutionary growth of Internet/Web resources over the intervening years, the library has struggled with the role it was to play in the new technology-mediated environment.One outcome of this evolution is that of the library now provides an increasing variety of resource-oriented services, both in terms of the physical library and the role of librarians. We now have more electronic databases, and more online resources, readily available to students and teachers. Many of those resources are available and managed online, although librarians insist on and maintain a highly visible, personal presence. They have taken the responsibility to align themselves with the academic and other disciplines represented in the university, and they are highly proactive in working with instructors and students in any way that is needed (note: a number of annotated web pages from our library website are included at the end of this paper).As a result, our library staff, led by Janice Carter, has changed with the times and has successfully asserted itself as a core intellectual and academic resource in the university.One area of opportunity that remains “under construction” is that of the relationship between librarians, teachers and students. There are still traditional library tours and exhortations fr om the librarians to “come visit us. We’re here for you!”This paper explicates the next step, which is to unite librarians and library resources with the life of specific courses, in such a way that those people and tools can take their rightful place as core resources at the class level, serving both teachers and students.I take an ethnographic-evolving best practices approach to the issues of a progressive library staff and an instructional community in an urban college, as they struggle to utilize online tools and to work together in improving educational outcomes.The Internet/Web dynamicThe dynamic environment of the Internet/Web has created a sea change in how people access and use information, and how people view and manage social interactions. The rapidity of these changes challenge educators to manage, interpret and translate the digital environment, for their students’ educational benefit, as well as for personal and professional survival: teachers have to keep up with the tools students are using.Specific to the educational environment, several phenomena are in play. This change in information availability is driving the evolution of the library from a traditionalpaper-based entity, providing traditional site-based information services, toward the proactive, service-oriented model, characterized by librarians who engage students and teachers by means of a variety of online and in-class tools and interactions, and who actively interpret and use Web tools for both students and teachers.This contin ues to be an “earn while you learn” environment. Instructors simultaneously learn to make effective use of an online teaching/learning environment while integrating Web/Internet tools into courses, in support of content. At the same time, librarians strive to comprehend, interpret, and provide support for use of these tools. In so doing, librarians are outgrowing their traditional passive information provider role, and are poised to become partners in the intellectual life of college classrooms.Social NetworkingSocial networking tools can promote a sense of place in courses, such as online courses that have no physical entity. They can also serve as supplementary tools in face-to-face courses. Having a course Wiki or weblog or perhaps Facebook/LinkedIn page can facilitate interactions between the new triumvirate of librarian, instructor and student. Students are familiar and comfortable with these tools, and already know how to use them. From a course culture perspective, they provide a communicative environment thatcan be complete in and of itself, or that can provide a supplementary (“coffee shop”, or “drop-in lab”) environment, depending on the course structure.Social networking tools in classrooms require purpose and management. It’s easy to se t up a weblog for a course, and have it quickly die from lack of use. A video posted on YouTube may be current for only the length of an assignment, or a course. However, properly managed, such sites can be home to course assignments, meetings and discussions. This characteristic lends itself to something that will be discussed later, that of requiring interactions with librarians as deliverables.Critical ThinkingAn important challenge posed by online resources is the credibility of the informationt hey contain. “Critical Thinking” is a desired skill, in which people come to understand and apply criterion-based thinking in problem solving situations. Nowhere are such skills more important than when using the World Wide Web for information gathering. While the social networking and information tools in themselves are innocuous, their presence tends to level one’s normal senses of discernment. Text that appears on a weblog may be seen as being as credible and meaningful as a well-regarded research article.Given that virtually anyone with computer access can create an attractive presence via a weblog, Wiki or Internet newsletter, one that can be found through the ubiquitous Google search, it is highly important that both students and teachers have some discernment skillsin the use of such content.Web searching was mentioned above. The Web has enabled one of the most fascinating problem/solution environments ever created: online search, epitomized by Google and other search tools. As this is being written in early January 2010, a search for the term “online database” returns 70,800,000 hits. Even with Google’s prioritization algorithms providing a sense of relative importance, those numbers are far above our ability to make sense of all that is available.Similarly, the increasing presence of popular culturally oriented weblogs and business books, many of which are little more than opinion pieces, challenges us to differentiate among these sources for students. So too do the omnipresent video and social networking tools and sites such as YouTube, Facebook, and LinkedIn. While all of these entitles can be uniformly appealing, their content may or may not rise to the level of the credible or even usefulWe teachers, librarians and students now have the interconnected (and real-time) task of unraveling the meaning of “The Internet” and “The World Wide Web” in the intellectual lives of our disciplines and ourselves. It is no longer sufficient to merely assign course projects that have “at least 10 sources”, unless we are able to interpret the notion of credible sources for our students.Here, the librarian’s abilities as mentor, interpreter, content expert and “gateway” cansupport teachers in operationalizing critical thinking skills and activities as people try to navigate the maze of multiple online tools. This function is pedestrian, but necessary.Working with librarians in planning and in real timeIt is said that muddled communication is always a root cause of organizational dysfunction, and is even a characteristic in seemingly healthy organizations. In the new relationships between librarians and teachers, creating new lines of communication is necessary. University-level teachers must be effective communicators by nature, and librarians, too, must be adept at interpreting the needs of students and faculty, and acting on those needs. So the basics of productive communicative relationships can be assumed to exist.Organizational stratification frequently acts against those abilities when it comes time for people to work together. It is hard to overcome the old ways. Teachers still often refer to the library and librarians in their syllabi, and exhort students to visit the library for research and course project assistance, but this traditional approach more often than not results in little or no follow up by any party. But it is at least a basis for further action.Activities that can integrate librarians with the course communityA meaningful step, then, in a “new” relationship is to move past the “one shot” approach, and create co-mingled activities that are integrated into the life of the course. Here areseveral suggestions:* First, the instructor must commit to extending the relationship with the librarian. This is more difficult than it may seem, given that course design is the result of perhaps years of planning and practice. Updating content and changing texts may be seen as far less challenging than inviting another live person into the course.* Continue the practice of inviting librarians to classes, but make that first visit is one of a series.* The librarian should be actively involved in the creation and structuring of course activities and deliverables. This will support the teacher-librarian relationship in the course and enable a productive co-mingling of skills. When this relationship is made visible throughout the course, the librarian becomes a more organic partner.* The availability of video means that such visits can occur in person or online, and that there can be a number of such interactions designed for specific purposes. Here is an instance where a tool such as YouTube can be helpful. Even if your institution is not able to support video use, ad hoc videos can be easily created and made available for institutional and classroom audiences.* The librarian can visit your class for specific purposes and activities, such as to discuss critical thinking and its application in research and research paper formulation, to providevirtual / real library tours, or to be a participant in course panels and presentations.* A second approach is to require evidence of the use of library or other online resources in evaluated course deliverables. For example, it might become a real requirement (that is, points attached) that students interact with librarians in the development of topics, or show evidence of having dialogued with librarians over research processes. If librarians are content experts in some areas, these interactions can supplement a student’s research and learning skills.This approach can be made more substantive if both librarians and the students involved are expected to contribute to a Wiki or weblog on these topics. In this way, theWiki/weblog becomes a knowledge creation and management tool.* Toward the end of the semester, a student(s) can collate and interpret the information from the various course wikis/weblogs and create a report for classmates’ take-away materials.* Assessment activities will involve the teacher and librarian in analyzing any number of factors, depending on need. There is current emphasis on connecting program objectives with course objectives, which are made manifest through various deliverables that can be assessed as learning outcomes. The involved librarian will have played an active role in objectives at the course level, and will be able to contribute in any analysis of student learning outcomes. This is not to say that the librarian’s involvement is limited to specificcourses. Ideally, as a the librarian-teacher-course relationship becomes enculturated, librarians may become involved in design and assessment activities that support programs.These few activities can integrate the librarian into the intellectual life of the course. There is a beginning and end, and beginning/end products that provide takeaways for students, teachers and librarians. A team product based on a common collaborative effort will support the particular course, and can become a model for other teachers and other courses.The next step: using the course model as an exemplar for generating institutional supportCreating large-scale managed change is difficult, and extending the role of the librarian into courses can be an example of such a “disruptive” change. The above discussion has centered on organic approaches that bring together existing people and physical resources in a single course, but with an eye toward applications in other courses.The processes discussed here support scalability. A desirable long-term outcome is that we provide a framework that is implemented by others. A carefully construed use model in a single instance constitutes a type of applied business plan that will be seen as credible to other members of the school community, and that might more easily garner the support of other teachers, managers and administrators.Those who have integrated librarian/library resources in their classrooms can then become faculty development mentors and presenters, interacting with their fellow instructors in applying these approaches into their own classes.ConclusionThis approach has implications for future librarian/instructor/course interactions, as well as for larger entities such as discipline-specific courses, departments and schools.AssessmentAssessment is more naturally supported because of the use of wikis and weblogs as discussion portals and information repositories: the interactions, discussions and materials that comprise the corpus of the class remain available for analysis, revision and re-application.Distance partnershipsLibrarians may have particular skills, and libraries particular resources. Instructors and students will have specific skills that can be complementary in other situations. Given the common electronic framework of Web/Internet tools, it may be that relationships among geographically dispersed courses and people can be supported through the commoninterface of web tools, mediated and modulated by the presence and expertise of librarians who serve the needs of these dispersed entities.As an example, Golden Gate University’s doctoral program is home to students whose interests are business centered. Many of our students are from China, and, like their classmates, they are often interested in business issues from global, Chinese and American perspectives.It might be that in the near future, selected Chinese students, instructors and librarians can be connected with an American counterparts, with activities mediated by video, audio, weblog/Wiki and common document formats such as GoogleDocs. The librarians will be resources in many ways, but two major ones will be as interpreters of local or Chinese culture and as gateways to Chinese or related information resources.Having diverse students, teachers and librarians work together in this way has only recently become possible, and represents a singular opportunity to unite teachers, librarians and instructors in ways that can transcend traditional information and culture boundaries in both local and global settings.Annotated graphicsThe Golden Gate University General Library landing page (). This page is cleanly designed, with clear links to various resources. Note the online catalog, hours, “ask a librarian”, weblog, Facebook, and e-newsletter links at the left, in addition to the library tools found in the center/orange links.Librarian Margot Hanson’s page () demonstrates her work in creating study/research guides for the specific disciplines aligned with her expertise. Note also the information for contacting her, either by chat, phone or email.The Ask-a-Librarian page () provides another venue for communication between clients (alumni are included) and library staff.The Library Weblog () is a venue for general information sharing and dialoguing on topics of interest to the GGU community. Note the subheading, indicating the range of topics modulated “via the GGU university library.”将图书馆和图书馆员融入课堂教学的方法摘要本文讨论了图书馆员在学校教学中的作用。
父母应该监督孩子使用互联网英语作文
父母应该监督孩子使用互联网英语作文全文共3篇示例,供读者参考篇1Parents Should Supervise Their Children's Internet UseThe internet has become an integral part of our lives, and for many of us, it's hard to imagine a world without it. However, as a student, I've come to realize that the internet can be adouble-edged sword, especially for children and teenagers. While it provides endless opportunities for learning, entertainment, and connectivity, it also harbors potential dangers that parents should be aware of and take steps to mitigate.Unrestricted internet access can expose children to inappropriate content, cyberbullying, online predators, and other risks that can have lasting psychological and emotional consequences. As a result, I believe that parents have a responsibility to monitor and supervise their children's internet use to ensure their safety and well-being.One of the primary concerns with children's internet use is the exposure to inappropriate or harmful content. The internet isa vast and largely unregulated space, where anyone can publish or share content, regardless of its suitability for minors. From explicit or violent images and videos to hate speech and misinformation, the potential for stumbling upon harmful material is ever-present.As a teenager, I understand the allure of exploring the internet and satisfying one's curiosity, but I also recognize the potential dangers that come with unrestricted access. I've heard stories from friends who accidentally stumbled upon disturbing or traumatizing content that left them feeling confused, scared, or even scarred.Furthermore, the internet can be a breeding ground for cyberbullying, which can have devastating effects on a child's self-esteem, mental health, and overall well-being. With the anonymity and lack of consequences that the online world can provide, bullies can target victims relentlessly, making it difficult for children to escape the harassment, even in the supposed safety of their own homes.Online predators also pose a significant threat, as they can use the internet to groom and manipulate children, potentially leading to dangerous real-world encounters or exploitation. These predators often use deceptive tactics to gain a child's trust,making it crucial for parents to be vigilant and aware of their children's online activities and interactions.While these risks are concerning, I believe that the solution is not to completely restrict children's internet access, as that would deprive them of the numerous educational and developmental opportunities that the internet provides. Instead, I advocate for parental supervision and guidance, combined with age-appropriate internet safety education.Parents should take an active role in their children's online lives, including setting reasonable limits on screen time, monitoring the websites and apps they use, and having open and honest conversations about online safety. They should also consider using parental control software or internet filtering tools to block inappropriate content and restrict access to potentially harmful websites or apps.However, it's important to strike a balance between supervision and trust. Parents should aim to create an environment where children feel comfortable discussing their online experiences and seeking guidance without fear of punishment or overreaction. This open communication can foster a healthy relationship with technology and help childrendevelop the critical thinking skills necessary to navigate the online world responsibly.In addition to parental supervision, schools and educators have a crucial role to play in teaching internet safety and digital literacy. By incorporating age-appropriate lessons on online safety, cyberbullying prevention, and responsible internet use into the curriculum, students can develop the knowledge and skills necessary to protect themselves and make informed decisions online.As a student, I understand the importance of the internet in our lives and the vast opportunities it offers for learning, communication, and self-expression. However, I also recognize the potential risks and dangers that come with unrestricted access, especially for children and teenagers. It's essential for parents to take an active role in monitoring and guiding their children's internet use, while also fostering open communication and trust.By working together – parents, educators, and students – we can create a safer and more responsible online environment for everyone, allowing us to reap the benefits of the internet while minimizing the potential risks and negative consequences.篇2Parents Need to Monitor Kids' Internet UsageAs a high school student, I can't deny how incredibly useful and valuable the internet is. I rely on it for research, learning, entertainment, connecting with friends, and so much more. The internet has amazing resources and capabilities that make our lives so much easier and more connected than past generations could have imagined.However, as great as the internet is, it also has a darker side filled with dangers, inappropriate content, misinformation, cyberbullies, predators, and bad influences. The internet can be an extremely toxic place, especially for kids and teens whose brains are still developing and who are very impressionable. That's why I firmly believe parents must be actively involved in monitoring and limiting their children's internet usage.I'll be the first to admit that having my internet usage monitored by my parents is really annoying and frustrating at times. I feel like I should have total privacy and freedom online. However, I know my parents only do it because they love me and want to protect me. As much as I may complain, I'm actuallygrateful they care enough to pay attention to what I'm doing and seeing on the internet.If parents don't monitor their kids' internet usage, they are essentially leaving them unsupervised in an extremely dangerous place filled with threats around every corner. The internet is the modern equivalent of dropping your child off alone at a big city filled with criminals, indecent people, misinformation, and twisted ideologies. Would any sane parent ever do that to their child in the physical world? Of course not! So why would they allow their kid to roam the internet world unsupervised? It makes no sense.One of the biggest dangers of the unmonitored internet for children and teens is the rampant exposure to pornography and extremely inappropriate sexual content that can warp sexual development. At my school, most guys my age have easy access to violent porn and many struggle with porn addiction already. This has really messed up their perspectives on women, sex, intimacy, and relationships in general. Girls are exposed to fetishized sexual content from a very young age that creates distorted body images, unrealistic expectations, and lowself-esteem. Easy access to porn on the internet is straight up ruining the current generation's sexual and romanticdevelopment if parents aren't involved in monitoring and limiting it.Beyond porn, the internet also exposes kids to graphic violence, hateful ideologies, disinformation, conspiracy theories, risky trends or challenges, and communities that promoteself-harm or eating disorders. At my age, teens are very impressionable and vulnerable to negative influences online that parents often remain blissfully unaware of. We need guidance, boundaries, and monitoring to protect our developing minds from internet toxicity.Another huge risk is online predators who use the internet to exploit and take advantage of kids sexually, financially, or through human trafficking. There are so many creeps online posing as kids, teenagers, or trusted adults to groom and lure in vulnerable young people through deceiving tactics. No child is immune from falling victim to an expert predator's manipulative grooming process if left alone on the internet unsupervised. Parental monitoring and restrictions are a must to prevent kids from being preyed upon by sexual exploiters.I also believe parents need to monitor their children's social media activity very closely. We've all heard the horror stories of kids being ruthlessly cyberbullied to the point of self-harm orsuicide because parents had no idea what was going on in their child's online social world. Social media is a breeding ground for bullying, toxic comparisons, social anxiety, depression, and intense peer pressure. It may seem innocent to parents, but these platforms can be absolute cesspools of cruelty toward kids if left unmonitored. I've seen it first-hand in my own friend groups. No child deserves to suffer online torment because their parents weren't paying attention.Furthermore, parental monitoring of kids' devices and online activity helps prevent cyber crimes like hacking, identity theft, illegal downloading, or unintentionally sharing private information. We may be tech savvy, but we're still kids who make dumb mistakes that could land us in real trouble without our parents' oversight.At the end of the day, the internet was created by adults for adults. It was never intended to be a safe place for children to navigate alone. Of course kids should be taught digital literacy, internet safety, and given reasonable online access for learning. However, the internet is simply too vast, unregulated, and filled with inappropriate and dangerous content/people for children and teens to traverse unsupervised.We may kick and scream about our parents monitoring our internet usage as infringements on our privacy and freedom, but we need to understand it comes from a place of love, concern for our wellbeing, and acknowledgment that we're still young, naive, and impressionable. The brain's prefrontal cortex that governs decision making isn't fully developed until around age 25. We need our parents' guidance to develop a healthy relationship with the internet and technology.So parents, please stay involved! Use parental controls, monitor our online activities, impose reasonable time limits, block inappropriate sites, and have open conversations with us about our internet usage. Don't just let us run wild in the lawless wasteland of the World Wide Web. We may complain, but we need you to protect us from the darkest corners of the internet until we're old enough to navigate it responsibly as adults. We may not show it, but we're grateful you care enough to monitor our internet usage and shelter us from the web's potential harms. After all, you're just doing your job as a good parent looking out for your child's wellbeing in an increasingly digital world.篇3The Internet: A Vast World of Opportunities and DangersThe internet has become an integral part of our daily lives, offering a wealth of information, entertainment, and connectivity at our fingertips. As students, we are constantly encouraged to embrace technology and leverage the internet for our academic pursuits. However, the online realm is not without its perils, and it is crucial for parents to monitor their children's internet usage to ensure their safety and well-being.The Allure of the Digital WorldFrom an early age, we are drawn to the captivating world of the internet. Its vibrant colors, engaging games, and endless streams of content hold an irresistible charm. As we navigate through our formative years, the internet becomes an essential tool for research, communication, and self-expression. Social media platforms, in particular, offer us a sense of belonging and a way to connect with our peers.However, this digital allure can quickly spiral into an unhealthy obsession, compromising our mental health, social development, and academic performance. The constant bombardment of information and stimuli can lead to decreased attention spans, impaired decision-making abilities, and even addictive behaviors.The Perils of Unrestricted AccessThe internet, while a powerful resource, is also adouble-edged sword. Without proper guidance and supervision, children may inadvertently stumble upon inappropriate or harmful content, such as explicit material, violence, or misinformation. The anonymity of the online world can also expose them to cyberbullying, online predators, and other forms of exploitation.Furthermore, the ease of access to the internet can lead to excessive screen time, sedentary lifestyles, and a neglect of physical activity and face-to-face social interactions, which are crucial for healthy development.The Role of Parental MonitoringAs students, we may not fully comprehend the potential risks associated with unrestricted internet use. This is where parental monitoring plays a vital role. By establishing clear guidelines, setting reasonable time limits, and employing appropriate filtering and monitoring tools, parents can create a safer and more controlled online environment for their children.Effective parental monitoring involves open communication and education. Parents should engage in regular conversations with their children, discussing the potential dangers of the internet and fostering an understanding of responsible onlinebehavior. By fostering a trusting relationship, children are more likely to approach their parents with concerns or questions, allowing for proactive intervention and guidance.Additionally, parents should stay informed about the latest trends, platforms, and potential threats in the online world. Attending workshops or seeking advice from experts can equip them with the knowledge and tools necessary to navigate the ever-evolving digital landscape.Striking a Balance: Fostering Responsible UseIt is important to acknowledge that the internet is not inherently harmful; it is a powerful tool that can enhance our educational experiences and personal growth. The key is to strike a balance between enabling access and enforcing responsible use.Parents should encourage their children to leverage the internet for productive purposes, such as research, online learning, and exploring diverse perspectives. By fostering a healthy relationship with technology, children can develop essential digital literacy skills and critically evaluate the information they encounter online.Moreover, parents can introduce their children toage-appropriate educational resources, reputable websites, and online communities that promote positive values and intellectual growth. By curating a safe and enriching online environment, children can reap the benefits of the internet while minimizing exposure to potential risks.The Role of Schools and EducatorsWhile parental monitoring is crucial, schools and educators also play a significant role in promoting responsible internet use among students. Educational institutions should implement comprehensive digital citizenship programs, teaching students about online safety, cyberbullying prevention, and ethical online behavior.Collaboration between parents and educators is essential. Regular communication channels should be established, allowing for the sharing of concerns, strategies, and best practices regarding internet usage. By working together, parents and educators can create a cohesive and supportive environment that nurtures responsible digital citizens.ConclusionIn the digital age, the internet has become an indispensable part of our lives, offering unparalleled opportunities for learning, exploration, and connection. However, its vast expanse harbors potential dangers that cannot be overlooked. As students, we recognize the importance of parental monitoring in ensuring our safety and well-being online.By fostering open communication, setting clear guidelines, and employing appropriate monitoring tools, parents can create a secure environment for their children to navigate the digital world. Simultaneously, parents should encourage responsible and productive use of the internet, nurturing essential digital literacy skills and fostering intellectual growth.Ultimately, the internet is a powerful tool that, when used responsibly and with proper guidance, can enrich our educational experiences and personal development. It is our collective responsibility – parents, educators, and students alike –to embrace the benefits of the online world while mitigating its risks, paving the way for a safer and more enriching digital future.。
高一文化产业英语阅读理解25题
高一文化产业英语阅读理解25题1<背景文章>The film industry has a long and fascinating history. It began in the late 19th century with the invention of moving pictures. Since then, it has grown into a global powerhouse, entertaining millions of people around the world.In the early days, films were short and simple, often shown in nickelodeons. As technology advanced, so did the film industry. Special effects were introduced, making movies more exciting and immersive. Directors like D.W. Griffith made epic films that changed the way stories were told on screen.The golden age of Hollywood in the 1930s and 1940s saw the rise of iconic stars like Clark Gable and Ingrid Bergman. Studios produced lavish musicals and sweeping dramas that captured the imagination of audiences.However, the film industry also faces challenges. The rise of streaming services has disrupted the traditional business model. Piracy is another major issue, costing the industry billions of dollars every year.Despite these challenges, the future of the film industry looks bright. New technologies like virtual reality and 3D are opening up new possibilities for storytelling. And with a growing global audience, there isno shortage of demand for great movies.1. The film industry began in the _______ century.A. 18thB. 19thC. 20thD. 21st答案:B。
罗克韦尔自动化FactoryTalk VantagePoint EMI使用指南说明书
VantagePoint provides:• Mobile Capabilities: FactoryTalk VantagePoint EMI is enabling frictionless productivity by providing out of the box web-enabled content browsing and display creation. Access your data from any mobile device and create displays with simple drag and drop gestures! • Improved Time to Trend: Configuring your plant historian is as easy as 1-2-3! New mobile based workflows allowyou to browse to your Logix controllers, select tags for data storage, and configure your FactoryTalk HistorianSE sever all through one simple workflow.• Create and publish a wide range ofrole based enterprise reports with our Advanced Reporting options using well known platforms like Microsoft Excel and SQL Server Reporting.• Notifications provide information in time to make productive decisions. Configurenotifications to send reports via email or SMS based on events to ensure that important information is delivered when you need it!• Time-to-value: Pre-configured reports, trends, dashboards, and flexible rapid development tools help save timeand money.• Connect to any common plant floor device or system. Premier connectivity to real-time data via FactoryTalk Live Data (Logix, PLC/SLC™, FactoryTalk View, 3rd-party controllers, etc.) and historical data via FactoryTalk Historian PLUS connectivity to FactoryTalk Metrics, FactoryTalk ProductionCentre, FactoryTalk EnergyMetrix and other real-time and historical data sources.Make more use of the data you already collect.Find new information to improve operations.What if key decision makers had real-time production information in a dashboard, trend, report, or key performance indicator (KPI) on a mobile device or computer web browser updated continually and available any time? And, what if that decision maker was notified when production parameters moved outside their pre-set limits? More informed decisions, utilizing real-time data, on mobile devices or desktops becomes a standard process in your improved operations. Think about the alternative of the time spent preparing simple reports. Hours and days can be spent collecting relevant data from disparate systems, which then needs to be routed and analyzed before production decisions can be made.Only FactoryTalk® VantagePoint EMI organizes, correlates, and normalizes disparate data from your manufacturing and production processes and business systems in a Unified Production Model (UPM). It then enables you to organize and present information in everyday language — tailored to users’ needs on mobile devices or desktops.VantagePoint EMI Enterprise Manufacturing IntelligenceFactoryTalk VantagePoint EMI helps solve many of the delays associated with typical manufacturing reporting. Delays and inaccuracies that can develop as users find and pull relevant data from various manufacturing and production systems, put them into spreadsheets – then rationalizing, correlating and disseminating the results. And by the time anyone gets around to reading these reports, the information is stale.At worst, intended recipients don’t bother and they miss important information – information they need to increase productivity and reduce cost.Problem SolvedBy organizing all data sources in a Unified Production Model, bridges are created between multiple systems, vendorsand data types. Data in the model can be accessed from anywhere, by anyone in real world terminology, not obscure PLC addresses or unknown historian variable names. This data can then be presented as information relevant to the user’s role and responsibility within the organization. For example:• Machine operators can see machine-level information, such as a dashboard that includes OEE gauges, time, fault and part analysis, OEE by hour with a target including a tabular event detail list• Plant managers can view plant-level Key Performance Indicators like a Production Scorecard – replacing a manual production summary that most of them update manually • Operations executives can see enterprise-wide reports,for example a plant-to-plant comparison of real-time production and financial performanceEveryone has access to the information needed to make timely decisions.Take the Cost Out of ConnectivityFactoryTalk VantagePoint EMI takes much of the cost out of the data gathering you are doing now by automating data collection across multiple systems and platforms. Connectors are included for out-of-the-box, direct connections to Rockwell Automation Integrated Architecture sources. Connectors to other systems are available as options. Besides gathering real-time, live data, FactoryTalk VantagePoint EMI can provide trending context by using information from FactoryTalk Historian as well as third-party historians. This helps users get the information they needto recognize the significance of what is happening at the moment against the background of the data over time.FactoryTalk VantagePoint EMI provides optional connectors for virtually all manufacturing systems to provide a single, data source for all your analysis and reporting needs, including:• OPC DA connectivity for adding non-Rockwell Automation real-time data sources• OPC HDA connectivity for non-Rockwell Automation historians, such as Wonderware IndustrialSQL ServerThis means your information is always current. You have “one version of the truth” because all data remains in the original source locations and no separate data warehouse is created. And this all happens automatically, in real time, when users request information they need to do their jobs.The Power of Database IntegrationYour time is valuable. FactoryTalk VantagePoint EMI can provide up to date reports that used to have to be assembled manually from multiple sources. Through integrated access to what’s been previously buried in your production control systems, you can start generating other reportsand dashboards, without having to waste time learning complicated tools and programming languages. As you recognize opportunities for insight and improvement, you can drill-down and gather more detailed information. Sometimes you already have your control system information logged into a database or your business system information is already there, but you need to see that information in context of other production information, well that’s where FactoryTalk VantagePoint EMI connectivity to databases as well as control systems can help. FactoryTalk VantagePoint EMI allows youto connect to these important sources of information in your databases, virtually any database, and put it in context using the Unified Production Model, so it has relavance to the task at hand.Once you have installed FactoryTalk VantagePoint EMI,you will quickly be able to view and use the included,pre-configured web reports, trends and dashboards,such as:• Key performance indicator (KPI) monitoring• Alarm and event reports• Control loop reports• Device and equipment reportsFactoryTalk VantagePoint EMI Mobile CapabilitiesFactoryTalk VantagePoint EMI now includes mobilecapabilities that enable users to create displays andinteract with data across any HTML5-compliant browserand mobile platforms, such as iOS and Android. Userscan now easily log in to the VantagePoint systemand automatically view web-based KPI content thatis responsive to the device they are using – fromsmartphones to tablets to PCs.Trend Report Accessing Tags from FactoryTalk HistorianMobile CapabilitiesFactoryTalk VantagePoint EMI is enabling frictionless productivity by providing out of the box web-enabled content browsing and display creation. Your users will have the ability to browse the Unified Production Model as well as view displays from their PC, tablet, or mobile phone. Through simple drag and drop gestures, your users will have the ability to create displays and save them as favorites from any device. Once they log in, they will have access to content that has been organized and created just for them.Mobile WorkflowsReduce your time to trend and streamline the configuration of your FactoryTalk HistorianSE server with the mobile import workflow. VantagePoint Mobile enables you to browse your FactoryTalk directory, select the tags from your controllers that you’d like to store, and through click of a button VantagePoint will configure FactoryTalk HistorianSE to put those tags on scan. VantagePoint will be automatically updated with the new tags in Historian and once the update process is complete, you’re able to trend or build displays. Now any authorized user can store the data they need and build displays from anywhere!Change HappensFactoryTalk VantagePoint EMI makes it easier to handle changes to your data sources. As you add new components and systems to your existing operations, simply connect the new data sources and re-synchronize the model. You do not need to change the reports themselves, so you can more easily accommodate changes to your mix of equipmentand systems.Eventing/Notification SystemThe Eventing/Notification system triggers actions including generating one or more published reports on a schedule, and sending emails with attached reports, based on intelligent filtering of event streams from FactoryTalk VantagePoint EMI sources. So now you don’t even have to be watching a particular report or dashboard, FactoryTalk VantagePoint EMI can watch for a specific change for you and let you know! Powerful Reporting ComponentsFactoryTalk VantagePoint EMI includes some of the most powerful reporting components in the industry. You may begin by creating an ad hoc report, then when you have it set up the way you want, you can publish it with a simple click of the mouse. The objects are immediately a part of the model and are accessible from the reports list by anyone with a web browser and user permission. You may view the reports directly or via the FactoryTalk VantagePoint EMI Portal.• High-performance links for data-on-demand• Easy resizing and use of pictures• Time-series data management with live updates• Extraordinary transactional data management for items and propertiesUnified Production Model: The Heartof FactoryTalk VantagePoint EMIThe Unified Production Model (UPM) allows plants,equipment, and other resources to be logicallyrepresented along with their real-time and historical data.The UPM provides the context by associating relevantdata from numerous sources, and removes the need tocare where the data physically resides. This informationcan then be populated into analysis layers that can beaccessed via a browser. The model is also flexible enoughso users that have different roles within an organizationcan see the model differently, or see it in multiple waysso users at every level of an enterprise to better managetheir operation in real time.Performance Dashboard with Key Performance Indicators for OEE and other underlying factors affecting production such as down time causes, cycle time, and scrap rate.Trending and PlottingFactoryTalk VantagePoint EMI incorporates two of the most versatile and powerful trending and plotting applications in the world. With drag-and-drop simplicity, you can drop simple tags or complete objects onto the plot. Change time periods, stack traces, switch between historian andreal-time data.Microsoft Excel® Add-InYou can leverage all the capabilities in Excel through VantagePoint EMI and Excel Services in SharePoint to pull information from the Unified Production Model in FactoryTalk VantagePoint EMI to build highly effective reports. Touch it up, format cells and regions to your liking, even create some graphs and charts from the data. Once you have published the report, you no longer need the spreadsheet. It is perfectly preserved for you in the model.And, it is not necessary to have Excel installed on any client to be able to view the report.FactoryTalk VantagePoint EMI PortalView individual published reports by clicking on them in the report list, or invoke the powerful FactoryTalk VantagePoint EMI Portal and view composite reports configured by dragging elements into zones on a portal page. Linking elements to other reports allows you to drill down to get more detail from any given report. Select parameters to reuse a particular report for multiple, similar manufacturing elements and access all these features of the VantagePoint portal from your web browser.Advanced Reporting• Power to create a wide range of enterprise reports from dashboards to tabular reports• Create new reports and use report examples via the Unified Production Model (UPM)• Access a growing library of reports for FactoryTalk VantagePoint EMI• Author and publish reports into the FactoryTalk VantagePoint EMI Portal• Configure full reporting layout control, pagination, headers/footersThis energy dashboard is an example the clear and easy-to-understandthat FactoryTalk VantagePoint EMI provides.Get More InformationContact your local Rockwell Automation sales office or Allen-Bradley distributor.Visit /miAllen-Bradley, Rockwell Software, FactoryTalk, SLC and Integrated Architecture are trademarks or registered trademarks of Rockwell Automation, Inc.Microsoft, Excel and SharePoint are trademarks of Microsoft Corporation. Trademarks not belonging to Rockwell Automation are property of their respective companies.Publication FTALK-PP028I-EN-P – March 2016 Copyright ©2016 Rockwell Automation, Inc. All Rights Reserved. Printed in USA. Supersedes FTALK-PP028H-EN-P – October 2014。
世界上伟大的发明英文小作文6年级500字
世界上伟大的发明英文小作文6年级500字全文共3篇示例,供读者参考篇1Great Inventions in the WorldIn the history of mankind, there have been numerous inventions that have changed the course of human civilization. These inventions have improved the quality of life, enhanced communication, and revolutionized industries. Here are some of the great inventions that have had a remarkable impact on the world:1. Printing PressThe printing press, invented by Johannes Gutenberg in the 15th century, revolutionized the way information was shared. Before the printing press, books were copied by hand, which was a time-consuming and expensive process. The printing press made it possible to produce books quickly and cheaply, making knowledge more accessible to a larger number of people. This invention played a key role in the spread of education and literacy.2. ElectricityThe discovery of electricity paved the way for numerous other inventions and innovations. Electricity powers our homes, businesses, and industries, and has transformed the way we live and work. It enables us to light our homes, power our devices, and communicate over long distances. The development of electricity has led to the creation of many other inventions, such as the light bulb, the telephone, and the internet.3. AutomobileThe invention of the automobile by Karl Benz in the late 19th century revolutionized transportation. Before the automobile, people relied on horses and carriages to travel long distances. The automobile made it possible for people to travel faster and more efficiently, opening up new possibilities for commerce and leisure. The automobile industry has since grown into a massive global industry, shaping economies and societies around the world.4. InternetThe invention of the internet has arguably had the greatest impact on the world in recent history. The internet has connected people from all corners of the globe, enabling them to communicate, share information, and conduct business. It has revolutionized industries such as entertainment, retail, andeducation. The internet has brought the world closer together, allowing for unprecedented levels of collaboration and innovation.5. AntibioticsThe discovery of antibiotics revolutionized medicine and saved countless lives. Before the discovery of antibiotics, infections were often deadly and untreatable. The development of antibiotics such as penicillin made it possible to treat bacterial infections effectively, greatly reducing mortality rates. Antibiotics have since become a cornerstone of modern medicine, helping to combat infectious diseases and improve public health.In conclusion, the world is filled with incredible inventions that have shaped the course of human history. These inventions have improved the quality of life, transformed industries, and connected people in ways never thought possible. As we move forward, it is important to continue to innovate and create new inventions that will benefit future generations. The possibilities are limitless, and the potential for positive change is immense.篇2One of the greatest inventions in the world is the printing press. This revolutionary invention was created by JohannesGutenberg in the 15th century and changed the course of human history forever.Before the printing press was invented, books and other written materials were copied by hand, making them rare and expensive. It was a painstaking process that required scribes to spend countless hours copying texts letter by letter. This limited the spread of knowledge and made books inaccessible to the general population.However, with the invention of the printing press, all of that changed. Gutenberg's invention allowed for books to bemass-produced quickly and cheaply. This meant that knowledge could be easily disseminated to a wider audience, leading to a surge in literacy rates and a democratization of knowledge.The printing press also played a crucial role in the spread of ideas and information. Prior to its invention, information was controlled by those in power, who could restrict access to certain texts or ideas. But with the printing press, anyone with access to a printing press could publish their ideas and distribute them widely.This led to the rapid spread of new ideas, scientific discoveries, and political movements. The printing press played akey role in the Renaissance, the Reformation, and the Enlightenment, shaping the course of Western civilization.Furthermore, the printing press laid the foundation for modern communication and media. It paved the way for newspapers, magazines, and other forms of mass media that we take for granted today. Without the printing press, it is hard to imagine how our modern society would function.In conclusion, the printing press is undoubtedly one of the greatest inventions in human history. It revolutionized the way we share and disseminate knowledge, ideas, and information. Its impact can still be felt today in the way we communicate, educate, and disseminate information. Johannes Gutenberg's invention truly changed the world for the better.篇3The Greatest Inventions in the WorldThroughout history, countless inventions have shaped the world we live in today. From the wheel to the Internet, mankind has continually pushed the boundaries of innovation to create a better and more convenient life for all. In this essay, we will explore some of the greatest inventions in the world and their impact on society.One of the most important inventions in human history is the wheel. The wheel was invented over 5,000 years ago, and it revolutionized transportation and trade. With the invention of the wheel, people were able to travel long distances more quickly and efficiently, enabling the development of complex societies and civilizations. Today, wheels are used in a wide range of applications, from cars and bicycles to industrial machinery and aircraft.Another great invention that has had a profound impact on the world is the printing press. Invented by Johannes Gutenberg in the 15th century, the printing press made it possible to produce books and other printed materials on a large scale. This democratization of knowledge helped to spread ideas and information more widely, leading to the growth of education and the advancement of science and technology.The telephone is another invention that has transformed the way we communicate. Invented by Alexander Graham Bell in 1876, the telephone made it possible for people to talk to each other over long distances. This innovation laid the groundwork for the development of the modern telecommunications industry, including cell phones and the Internet.Speaking of the Internet, this is perhaps the greatest invention of the modern age. The Internet has revolutionized the way we access information, communicate with others, and conduct business. It has connected people from all over the world and made it possible to share ideas and collaborate on a global scale. The Internet has also transformed industries such as entertainment, education, and e-commerce, creating new opportunities and challenges for society.In conclusion, the world is full of amazing inventions that have changed the course of history and shaped the way we live today. From the wheel to the Internet, these innovations have improved our lives in countless ways and opened up new possibilities for the future. As we continue to push the boundaries of technology and innovation, who knows what incredible inventions the future may hold.。
Pearson 认可中心合作伙伴协议说明书
Agreement b y Principal or Chief Executive or Head ofOrganisation/Institution1. These terms and conditions1.1 This document sets out Pearson terms and conditions for approved centres and, together with your centre approval application form, forms our contract with you.1.2 From time to time we may need to amend these terms and conditions. We will inform you when a change has been made, and publish any amended terms and conditions on our website.1.3 These terms and conditions shall be governed by and interpreted in accordance with English law and the parties shall submit to the jurisdiction of the English courts.2. Pearson service levels2.1 Pearson has set out in its Customer Pledge information about the service levels offered by Pearson and the timescales within which centres can expect delivery of the services.The JCQ General Regulations for Approved Centres, published annually on JCQ’s website and linked below at section3.3,also includes information on the services your centre can expect from awarding organisations.3. General requirementsI confirm my centre will:3.1 take all reasonable steps to ensure that Pearson is able to comply with its General Conditions of Recognition as required by the qualifications, examinations and assessments’ regulators for England, Wales and Northern Ireland, and where appropriate with SQA Accreditation’s regulatory requirements.3.2 adhere to all of Pearson’s policies and procedures including those set out in the Pearson information manual as amended from time to time.3.3 adhere to JCQ(and where applicable, Ofqual, SQA, Qualifications Wales, CCEA and,OfS and QAA) policies and procedures as amended from time to time.3.4 cooperate with Pearson in respect of any quality assurance processes, malpractice investigations and the management of complaints.3.5 deliver qualifications in accordance with the law including any relevant safeguarding, diversity, copyright, and data protection laws.3.6 notify Pearson of any issues which might affect my centre’s ability to meet Pearson’s requirements, including any issues which have the potential to harm the interests of any learner; 3.7 deliver Pearson approved qualifications only at the address and in the country notified in the approval application, unless notified to and approved by Pearson;3.8 ensure that its staff and representatives at all times treat Pearson staff and representatives respectfully and without threat of or actual verbal or physical abuse.3.9 take all reasonable steps to protect the interests of learners in the event that my organisation withdraws from qualification delivery for any reason.Pearson Centre Change of Details FormAuthor: International Quality Standards and Operations ManagerAuthorised by Head of Centre Management4. Data Protection and Information Security4.1 My centre will comply with all of its obligations as a Data Controller for the purposes of the Data Protection Act 2018 and General Data Protection Regulations.4.2 Pearson, as an awarding organisation, is also a Data Controller for the purposes of that legislation but relies upon my centre to provide candidates with the appropriate transparency information. My centre will provide candidates with the JCQ document Information for candidates – Privacy Notice, General and Vocational Qualifications, at the point of registration or examination entry.4.3 My centre will share candidate personal data, including name, address, gender, date of birth and academic performance with Pearson so that Pearson can perform its role as an awarding organisation. My centre will also provide Pearson with sensitive personal data such as race and health where it is appropriate.4.4 Pearson will use the personal data supplied by my centre to examine and award qualifications, to main tain a comprehensive archive of candidates’ examination results and may also share that information with educational agencies and regulators such as the Department for Education, local authorities, UCAS and the Education and Skills Funding Agency.4.5 My centre will ensure that only authorised persons who have been trained on and understand their obligations in connection with the processing of personal data shall have access to Pearson services used for the management of learner information.4.6 Pearson and my centre shall each retain the data they hold in accordance with their data retention policies and are each responsible for responding to any requests from an individual in connection with any shared personal data they hold.4.7 As data controllers in common my centre and Pearson shall each be responsible for notifying regulators and affected data subjects in the event of a data security breach in connection with any personal data in their possession which requires notification in accordance with applicable data protection legislation. However, in the event of such a breach affecting shared personal data the centre and Pearson shall also inform each other of that breach as soon as is reasonably practicable.4.8 As controllers in common my centre and Pearson are each responsible to individuals and to regulators for the processing of personal data in their care and shall explain that to any individuals who wish to complain about the handling of personal data or to a regulator if appropriate.5. Marketing5.1 My centre will not undertake any activity or advertising that could bring the name of Pearson into disrepute.5.2 My centre will not use any JCQ (or where applicable Ofqual, SQA, Qualifications Wales, CCEA, OfS or QAA) name or logo without consent from the owner.5.3 My centre will only use logos belonging to and/or licensed to Pearson with Pearson’s written consent or in accordance with Pearson’s branding and marketing guidelines.6. Grant and Withdrawal of Approval6.1 I understand and accept that Pearson is not obliged to grant approval status to my centre and may at its discretion decline to grant centre approval without giving any reason for this. I further understand and accept that there is no right of appeal in respect of any decision by Pearson not to grant approval to my centre.Pearson Centre Change of Details FormAuthor: International Quality Standards and Operations ManagerAuthorised by Head of Centre Management6.2 I understand that Pearson reserves the right to withdraw centre approval and/or qualification approval if Pearson considers, in its absolute discretion, that any of the events set out in Pearson’s Policy on the Removal of Centre and Programme Approval entitling Pearson to withdraw approval from a centre has occurred.6.3 I understand and accept that Pearson might be required to notify other awarding organisations and other parties as necessary such as regulatory authorities of any withdrawal of centre approval.7. Financial Arrangements7.1 Pearson’s fees list is published on Pearson’s website here.7.2 More general information about Pearson fees can be found here.7.3 My centre will comply with Pearson’s terms and conditions for payment of invoices and with any minimum spend requirements Pearson communicates to it from time to time.7.4 Each party’s aggregate liability to the other in respect of any loss or damage suffered by either party arising out of or in connection with the centre approval agreement, whether in contract, tort (including negligence) or in any other way shall not exceed the amount of the fees paid by your centre to Pearson in the twelve months preceding the breach.7.5 Neither party shall be liable for any loss of profits, business or opportunity, loss of goodwill or reputation or any indirect or consequential loss or damage suffered or incurred by the other party or any third party arising out of or in connection with the centre approval agreement.7.6 If VAT is payable on Pearson’s services, this will be chargeable in addition to the fees.8. Vocational Centres OnlyThe following provisions apply exclusively to centres approved to or applying for approval to offer vocational qualifications:I confirm my centre:8.1 is fully committed to employing, training and updating a sufficient number of appropriately qualified staff to ensure appropriate management, delivery, assessment and quality assurance as per qualification requirements;8.2 understands the need to clearly define and allocate the roles, responsibilities, authorities and accountabilities of the assessment and verification team across all sites;8.3 will operate required internal/external assessments in full accordance with Pearson, JCQ and, as applicable, Ofqual, SQA, Qualifications Wales, CCEA, QAA, OfS and other relevant standards setting body policies and procedures;8.4 (a) will retain evidence of learner work for a minimum period of twelve (12) weeks following certification of a learner. Before this end of this 12 week period Pearson may request that centres retain learner work until the next verification cycle8.4 (b) for qualifications that operate under the work-based learning quality assurance model (I.e. operate on a Direct Claims Status system) centres must retain all learner evidence (including assessment and verification documentation) for learners that have been certificated in between standards verifications (in some cases this could be up to a year);8.5 will retain records of assessment and internal verification for a minimum period of three years following certification of the learner;8.6 will monitor the approval and accreditation period for all of the qualifications approved and seek re-approval as and when required;8.7 understands that learners will be informed by Pearson of their registration and certification status.Pearson Centre Change of Details FormAuthor: International Quality Standards and Operations ManagerAuthorised by Head of Centre Management9. Higher National Qualifications OnlyThe following provisions apply exclusively to centres approved to or applying for approval to offer Higher National q ualifications:I confirm my centre will:9.1 complete Pearson’s D istance Learning S elf-Assessment Form a nd submit it to Pearson alongside our completed Declaration if we wish to deliver by way of distance learning;9.2 annually register all active Pearson BTEC Higher National students on HN Global (or other such resources platform as stipulated by Pearson) within the timeframes as set by Pearson;9.3 register all Pearson BTEC Higher National students with Pearson via Edexcel Online;9.4 ensure that all Pearson BTEC Higher National students are registered on the correct mode of study within Edexcel Online;9.5 pay the annual student registration administration fee for each student, from their second year of study, and for each subsequent year whilst the student remains on programme;9.6 comply with the requirements as set out in the Pearson BTEC Higher Nationals Quality Handbook(s);9.7 fully support Pearson’s centre/qualification monitoring process incorporating timely annual completion and submission of Pearson’s BTEC Higher Nationals Annual Programme Monitoring Report (APMR), and including, but not limited to, allowing nominated representatives of Pearson, full access to all relevant records, premises and students, which in exceptional circumstances can include short notice and or unannounced visits;9.8 facilitate the engagement of Pears on BTEC Higher National students in Pearson’s Annual Student Survey;9.9 inform Pearson BTEC Higher National students that they might in some circumstances be able to refer certain complaints that are not resolved by my centre to the Office of the Independent Adjudicator (OIA);9.10 accept that approval to deliver Pearson BTEC Higher Nationals programmes will have a student number cap, be time bound and mode bound.10. International Centres OnlyThe following provisions apply only to all types of c entres located outside the United Kingdom applying for centre or qualification approval or re-approval:10.1 My centre will research the need for and obtain, prior to the delivery of any programme, at its own responsibility and expense, all necessary licences, permissions or other form of authorisation required to operate as a centre in the jurisdiction in which the centre seeks approval. Pearson disclaims all liability in connection with and arising from the need for and procurement of or failure to procure any and all such licences, permissions or authorisations.10.2 I understand that circumstances might arise during the approval application process or during the centre approval itself in respect of economic or political sanctions placed on individuals, companies or countries, or acts or threats of military conflict or terror which make it impossible for Pearson Centre Change of Details FormAuthor: International Quality Standards and Operations ManagerAuthorised by Head of Centre ManagementPearson to grant approval or to continue with the centre approval. In such a case, I understand that Pearson will not be held liable for any harm, losses, costs or damage arising from the need: to suspend or abandon the centre approval application or the approval itself; or, at its discretion, to request that the centre re-apply at a later date.10.3 In some countries there may be a requirement to deduct an amount of tax (often called‘withholding tax’) from payments to overseas jurisdictions.W here my centre is required by law to make a deduction or withholding from a payment to Pearson for any taxes,m y centre will be liable to gross up any amount due as if the withholding were not required. Should my centre require assistance obtaining a standard Pearson c ertificate of residence to provide to the relevant Governmental Authority to support that payments by my centre to Pearson:-are exempt from such deductions or withholding; or-benefit from reduced rates (for example under a double taxation treaty),Pearson shall endeavour to provide such standard Pearson certificate of residence. Should my centre legally require valid documentation over and above a standard Pearson certificate of residence to obtain such exemption or reduction from withholding tax, my centre will be obligated to provide proof of such legal requirements under local legislation.10.4 For the avoidance of doubt, Pearson will not be liable for indirect taxes required by law in jurisdictions outside of the UK; my centre will be liable for compliance with and payments for indirect taxes in such overseas jurisdictions, where applicable. If VAT is payable on Pearson’s services, this will be chargeable in addition to the fees. In the event that you are liable to self assess VAT on Pearson’s fees u nder the reverse charge mechanism, you agree to undertake the necessary calculations and declarations due under local tax laws.Pearson Centre Change of Details FormAuthor: International Quality Standards and Operations Manager。
流行病管理【英文】
Java UI / Java Clients
Web Browser / Web Service
QM LCM JAXR Provider
Xforms
HTTP QM LCM SOAP QM LCM ebXML Registry Thin Client UI XACML PDP
PDF eForms with XML inside, known as the Intelligent Document, makes Adobe Acrobat, Servers, and Reader integral participants in interactive XML workflows such as submitting Form data in XML format directly to an ebXML Registry
●
● ● ● ● ● ●
Jeff Turpin
Hima Mukkamala
-
Cyclone Commerce
Sybase
-
Michael Hausler
Matt MacKenzie Nenad Ivezic Monica Martin Carl Mattocks
-
Ponton Consulting
Adobe NIST – US Govt. Sun Microsystems CheckMi
Purchase Order Request
Sybase
-
Rajesh Pradhan
Jim Rice
-
Iopsis Inc.
Amberpoint
-
Dale Moberg
PowerBI技巧之使用PowerShell将用户添加到Power BI工作区
In this article, I am going to explain how to add users to a Power BI workspace using Power BI PowerShell. As you already know, Power BI is a business intelligence tool from Microsoft, using which we can build graphical reports and dashboards which bring some sense to our data that resides on the database. Power BI also has a web interface known as the Power BI service, which can be used to share and collaborate these reports and dashboards with multiple users within or out of the organization.在本文中,我将解释如何使用Power BI PowerShell将用户添加到Power BI工作区。
如您所知,Power BI是Microsoft的商业智能工具,使用它我们可以构建图形报告和仪表板,从而使驻留在数据库中的数据有一定的意义。
Power BI还具有称为Power BI服务的Web界面,可用于与组织内外的多个用户共享和协作这些报告和仪表板。
In this article, we will try to add users to our Power BI workspaces. Along with this, we will also emphasize the various roles that are available within the new Power BI workspace. This is important to understand before adding the users because each user is assigned a specific role while adding them to a Power BI workspace.在本文中,我们将尝试将用户添加到我们的Power BI工作区中。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Role-Based Access Control for Publish/Subscribe Middleware ArchitecturesAndr´as Belokosztolszki David M.Eyers Peter R.PietzuchJean Bacon Ken MoodyUniversity of Cambridge Computer LaboratoryJJ Thomson AvenueCambridge CB30FD,United Kingdom{fistname}@ABSTRACTResearch into publish/subscribe messaging has so far done little to propose architectures for the support of access con-trol,yet this will be an increasingly critical requirement as systems move to Internet-scale.This paper discusses the general requirements of publish/subscribe systems with access control.We then present our specific integration of OASIS role-based access control into the Hermes pub-lish/subscribe middleware platform.Our system supports many advanced features,such as the ability to work within a network where nodes are attributed different levels of trust, and employs a variety of access restriction methods which balance expressiveness with the content-based routing opti-misations available.We illustrate our achievements by dis-cussing an application scenario in which our system will be of particular use.Keywordspublish/subscribe,role-based access control,restriction of advertisements/subscriptions,broker trust1.INTRODUCTIONThe Opera Research Group at the University of Cam-bridge has worked in both publish/subscribe(pub/sub)mid-dleware[1,7],and in Role-Based Access Control(RBAC)[3, 8].We believe that combining these two technologies would be a useful contribution to pub/sub system research. Publish/subscribe technology has to date focused on event filtering,efficient event routing,delivery semantics,and event composition.Access control has been largely neglected.Ac-cess control is an important requirement when customers are expected to pay for publish/subscribe services.A simplistic Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on thefirst page.To copy otherwise,to republish,to post on servers or to redistribute to lists,requires prior specific permission and/or a fee.Copyright200X ACM X-XXXXX-XX-X/XX/XX...$5.00.approach would be to run the entire pub/sub system over a secure network infrastructure(for example using Netscape’s Secure Socket Layers SSL).However,this does not allow access control policy to be expressed on a subscription or publication basis,and it lacks differential treatment of var-ious nodes in the network by assuming complete trust.It would not be practical for Internet-scale applications with nodes of varying reliability and trust.Further,this approach does not allow the policy governing the privileges of nodes to evolve based on experience.To address these issues,we have extended our pub/sub system to support a form of role-based access control,and use roles as the basis for security-orientedfiltering of both publication and subscription of events within the network. We also support the efficient,dynamic update of pub/sub RBAC policy.To our knowledge,this paper presents thefirst complete architecture for policy-based access control in publish/sub-scribe research.This paper is organised as follows.Section2describes the aims and contributions of our research.Section3intro-duces the fundamental pub/sub and RBAC concepts used. We describe a general architecture for pub/sub access con-trol in Section4.We extend this architecture to include trust management for brokers in Section5.Details of our implementation using the specific OASIS[3]and Hermes[7] technologies are presented in Section6.Some common types of access control policy,based on what we expect to be useful applications,are presented in Section7.Section8describes some of the future research directions we shall pursue.We discuss research closely related to our work in Section9. Finally,Section10concludes this paper,summarising our research contributions.2.RESEARCH GOALSThe traditional goals of security cannot easily be recon-ciled with the philosophy of pub/sub.The conventional use of pub/sub is in the efficient dissemination of information through some network of intermediaries(referred to as event brokers).This communication paradigm allows the publish-ers and the subscribers to be loosely-coupled,thus avoiding the need for them to maintain state about all the other pub-lishers and subscribers with which they might interact.Par-Second International Workshop onDistributed Event-Based Systems(DEBS’03)1c ACMticular registered event types exist regardless of any changes to the number of publishers and subscribers interested in them.Our goal was to design a system in which security is man-aged within the pub/sub middleware.Each registered event type in the system must have a defined owner;we chose to certify them via the public key infrastructure(specifically X.509certificates[5])used within our current OASIS imple-mentation.These owners are trusted,and have control over the policy used to access their event type.They need not be a publisher of that type.Most importantly,we wanted our security considerations to add only a few extra steps for those aiming to publish or subscribe to some particular event type.Indeed,our basic approach allows publishers and subscribers to be completely agnostic with regard to the presence of access control in the pub/sub network.In a standard pub/sub system,publica-tions are of much higher volume than subscription or adver-tisements.We therefore tried to keep the overhead due to access control checks per event publication as low as pos-sible.This is achievable because we trust the event bro-kers in the system(partial trust is explored in Sect.5),and thus access-control state can be distributed throughout the pub/sub middleware.Thus,security checks can be entirely handled by the event brokers directly adjacent to publishers or subscribers.3.BACKGROUNDThis section provides a quick overview of the technology used within our research,including the Hermes publish/-subscribe middleware,and the OASIS role-based access con-trol system.It introduces fundamental concepts that will be used throughout the paper.3.1Publish/SubscribePublish/subscribe systems quantise data transmission into events and disseminate events from producers to interested consumers.A distributed pub/sub system will usually sup-port content-based routing andfiltering,and it consists of a network of subscribers and publishers.3.1.1HermesHermes is an event-based middleware developed within the University of Cambridge.It has strong ties to the earlier Cambridge Event Architecture.A system built using Her-mes[7]consists of two types of components:event brokers and event clients.Event brokers form the overlay broker network using peer-to-peer routing techniques and imple-ment all the pub/sub functionality.Event clients can be either publishers or subscribers.They are light-weight and need to connect to an event broker before using any of the services provided by Hermes.An event broker that main-tains client connections is called a local event broker and can be publisher-hosting,subscriber-hosting,or both.Otherwise it is called an intermediate event broker.Any broker in the system can potentially become a local broker.Hermes supports proper event typing so that every pub-lished event is an instance of an event type.An event type has an event type name,a list of typed event attributes,and an event type owner.All event types are organised in an inheritance hierarchy.Event type definitions are kept in a (logical)event type repository and events are type-checked at publication time by Hermes.The content-based rout-com-ponents.ing algorithm used by Hermes supports type-based subscrip-tions thatfilter events according to their event type only and type-and attribute-based subscriptions that support content-basedfilters over the event attributes as well.In addition to subscriptions,advertisements are sent by publishers to express their desire to publish particular event types.They help to set up routing state in the form of an event dissem-ination tree for the futureflows of events.Advertisements and subscriptions are forced to meet in the network at ded-icated rendezvous nodes that are set up on per event type basis.3.2Role-Based Access ControlRole-Based Access Control(RBAC)introduces roles as an abstraction between principals(users)and privileges.The arc crossed out in Fig.1is intended to symbolise that users are never directly assigned privileges.This grouping eases administration since roles often intuitively collect and relate both users and the protected rights in a system.Moreover the access control policy itself becomes more loosely cou-pled from the software being protected,allowing for policy changes to be made dynamically.There are usually two stages to acquiring privileges in an RBAC system;thefirst is authentication as some user. RBAC systems will then require that you request a role to activate.Note that some RBAC designs introduce the concept of a user session in which to collect currently active roles.Thus sessions relate a set of active roles for a user, and facilitate deactivating all roles in this set simultaneously when the userfinishes their session.As indicated by the reflexive arrow on the‘roles’in Fig.1,RBAC systems may allow the activation of certain roles to be a prerequisite for further role activations.3.2.1OASISThe Open Architecture for Secure Interworking Services (OASIS:[2,3,4]),is an architecture for role-based access control in distributed environments.It supports parame-terised roles,giving the ability to add,and then make de-cisions based on,attributes which are relevant to access control attached to each role instance.For example,the role paidUpSubscriber may have an attribute rate to indicate the level of subscription payment.OASIS provides a simple but expressive policy language based on rules which list the prerequisites for entry into a given role,or acquisition of a privilege.Another OASIS RBAC extension is the concept of appointments;persistent qualifications or capabilities with a session-independent lifetime.Finally,OASIS rules may contain conditions that are monitored throughout the time active roles are dependent on them.These membership con-Second International Workshop onDistributed Event-Based Systems(DEBS’03)2c ACMditions are the basis of our fast revocation;if they becomefalse a user will lose the privileges dependent on them im-mediately.4.PUB/SUB ACCESS CONTROLAs described above,the Hermes pub/sub infrastructure consists of a network of event brokers,which connect pub-lishers to subscribers.This section provides an overview of our architecture,discussing security issues for publishers and subscribers.Note that until Section5we assume that the broker network can be trusted.We employ the following types of OASIS policy:Broker-client connection policy determines accept-able initial authentications of clients to their local brokers. Type management policy specifies via roles which prin-cipal is privileged to create,modify and remove event types from the pub/sub system.Advertisement policy and subscription policy dic-tates who is allowed to send or receive events for each par-ticular event type.4.1Publishers and SubscribersFrom the perspective of our access control,publishers and subscribers are in most ways equivalent,apart from the priv-ileges they are attempting to acquire.In either case,their authentication to their local broker along with their pre-sented credentials will be used to determine what events they are permitted to publish and subscribe to by their lo-cal broker,based on the policy provided by the owner of that particular event type.The design of each application’s access control policy will determine how to minimise the risk of damage to a system by malicious participants.Two broad strategies are pro-vided by OASIS for the authorisation of publishers and sub-scribers to send and receive events,one based on authentica-tion,and the other based on capabilities.OASIS can easily be extended to allow access control decisions to be based on other factors,such as location,if that is relevant to any particular application.Authentication providesfine-grained support for revocation,while capabilities reduce adminis-trative complexity by allowing capability certificates to be distributed without requiring modification of OASIS policy. Of course these approaches are not mutually exclusive.For the rest of this section,we treat both publishers and subscribers as clients of the pub/sub system,noting that the access control state for these clients is maintained in their lo-cal broker.This policy is in the form of OASIS RBAC rules, as specified by the event type owner.We discuss how the pub/sub system allows us to efficiently scale dissemination of access-control policy in Section6.In Figure2the steps of an access controlled advertise-ment are shown.The publisher advertises an event type and at the same time provides its credentials to a local bro-ker.Based on these credentials,access is either granted, thus the advertisement is accepted either fully or partially, or access is denied,thus the advertisement is rejected.If the advertisement is partially accepted then a restriction is created for this publisher and event type.Such a restriction will limit the advertisement,e.g.to a particular sub-type in the event type hierarchy,as discussed in the next section. Note that the small‘R’s represent restrictions.Similarly in the case of a subscription,a subscriber canNewadvertisementFigureSubscribingtoaneventtypeFigurenotify a local broker regarding its interest in an event type. Once again,an access control decision will be made based on the subscriber’s credentials and the broker’s policy.This is illustrated in Figure3.Every time an event is published the event goes through the relevant local broker.If there is a restriction for the publisher,then it will be enforced at this broker.This is shown in Figure4.Note that by default clients will not be aware whether restrictions are applied to them–an alternative,comple-mentary scheme is discussed in Section8.An example pub/sub infrastructure is shown in Figure5. All of the publishers and subscribers sit outside the internal broker network(whose interconnections are shown expanded within the network‘cloud’),connected to their local brokers via the displayed restriction points.Note that intermediate event brokers are not necessarily OASIS-aware,but local event brokers must be,since all policy checks are carried out by them.4.2Policy-based restriction of advertisementsand subscriptionsIt is important to note that the OASIS policy defining ac-cess control for an event type is only employed at the time of a client’s advertisement or subscription.Depending on what roles are activated by this client,the local broker will use OASIS policy to determine whether the client’s adver-tisement or subscription is too powerful and thus exceeds privilege.If so,the local event broker will admit the origi-nal advertisement/subscription only after having limited it using an appropriate restriction.In simple cases,this restriction is a predicate that is based entirely on the event type.There will be an OASIS privi-lege associated with advertisement and one with subscrip-tion for each event type.In more complex cases,access control decisions will be based on predicate evaluation,and may also take into account event attributes.The predicate here will indicate whether any published event should beSecond International Workshop onDistributed Event-Based Systems(DEBS’03)3c ACMP u b l i s h i n g a n e w e v e n tFigure 5:General architecture.blocked.The related OASIS privilege must contain the fol-lowing information:Predicate name.This predicate will return a true or false answer based on the parameters it is given.It could be a simple logical formula,but might involve complex compu-tation,possibly interacting with external services.Event type.All restrictions are associated with an event type.Parameter Binding.We must specify how the predi-cate parameters are bound to attributes of the given event type or constants.Attribute-based event filtering in the pub/sub system also uses predicate computations,but the set of predicates pro-vided is much more limited –each predicate must have well understood semantics suitable for distributed filtering and aggregation throughout the pub/sub network.Thus we can specify three different classes of predicates that can be used for access control in our pub/sub architecture:(1)Generic Non-Optimised Restriction Predicates.The most generic case that we use in our model is when a predicate is handled as a black box .In this case it is not understood by the pub/sub system,however it provides all necessary expressiveness required by our OASIS access con-trol evaluations.Take for example size constraints for event publication.The black box predicate can check constraints placed on the size of published events,even though the events themselves might not contain information about their size.Black box predicates might involve evaluation of external information,for example a predicate for a tennis match event could filter the events that involve only players who are in the top 50of the league table,where the league table is stored in a globally available database.A disadvantage of these predicates is that the event mid-dleware cannot optimise event filtering by distributing their computation throughout the broker network.(2)Publish/Subscribe Restriction Predicates.The second class of restriction occurs when the set of access control restriction predicates is precisely the set supported by the pub/sub system.We can thus take advantage of the support for handling subscriptions in the event-based middleware,at the cost of reduced predicate expressiveness.Restrictions in this class make use of the event type hierar-chy.They may also utilise attribute-based filtering provided by the pub/sub system.If a client attempts to subscribe to a type that they do not have authorisation to access,the sys-tem will check if they are instead authorised to access any of this event’s sub-types.If so,their original subscription is transformed into a potentially different effective subscrip-tion.In the case of attribute-based filtering,the pub/sub system will efficiently filter events by pushing subscriptions as far as possible up the event dissemination tree,closer to the publishers.(3)Hybrid Schemes.The final class involves using information about the predicate itself to compute a subscrip-tion understood by the pub/sub system,as well as operating per-event filtering at the local broker based on the full ex-pressiveness of general predicates.For example,say a subscription restriction prevents a client from receiving any event that has an attribute value other than an even number between 1and 10.The pub/sub sys-tem is capable of filtering attribute values except those from 0to 10.It is not capable of filtering all but even numbers,however.Thus a per-event filter in the manner of the first class above operates in tandem with a pub/sub filter predi-cate.The most efficient policy evaluation will occur when all predicates are understood by the pub/sub system and can be compiled into restricted advertisements and subscriptions.Merely modifying advertisements and subscriptions does not add any overhead to the pub/sub system during event flow,because the logic to manage advertisements and subscrip-tions is already provided by the pub/sub infrastructure in order to make routing decisions.Our access control framework also introduces a new event type for the sake of allowing event type owners to modify the policy related their event types.Policy evolution events are meta-events published by event type owners which must reach any broker that might cache policy for an event type.5.MANAGING BROKER TRUSTIn very large scale peer-to-peer pub/sub networks,it is probably a naive assumption that all brokers,and the paths between them,can be completely trusted.Not only does one have to consider the possibility of malicious brokers,but the network of event brokers may span several different admin-istrative domains.In addition,performance considerations may come into play —some brokers may have more pow-erful computational resources than others.This section ex-plores our proposal for dealing with authorisation of brokers to transport particular event types.Thus,particular event types may employ a broker network which is a sub-graph of the entire pub/sub system.One noteworthy corollary is that the local broker of a given publisher or subscriber will need to be trusted.Generally a client will communicate with several brokers for ing our extended ar-Second International Workshop onDistributed Event-Based Systems (DEBS’03)4cACMFigure6:Trust of brokers.chitecture,wherein brokers have different trustworthiness, will strengthen this requirement—certain brokers may not be permitted to serve certain event types at all.Event type protection comes through the restriction of brokers’authorisation to use the access control policy rules associated with this type.Which brokers are permitted to participate in a given event type’s transport is under the control of the type management policy,probably owned by the event type owner.It is preferable that trust in the brokers is distributed throughout the pub/sub network.Indeed,the event type owner probably,on average,knows little about the brokers in the network.However brokers are likely to have metrics to judge the performance of their neighbouring brokers(e.g. delays or errors in communication).Thus we propose the use of the certificate chains in OASIS appointments to form a web-of-trust that spans the authorised sub-graph in the pub/sub system.For this we again rely on X.509certificates. In Figure6,we have developed the network of Figure5 to indicate two levels of network trustworthiness—only brokers with secure interconnections are permitted to route event type‘A’.We assume that each broker holds an appointment in the form of a unique X.509certificate(this is required by our ex-isting OASIS implementation for the SSL links established between services).The event type owner signs the certifi-cates of those brokers connected to it that it trusts.These brokers can then sign their immediate connections and so forth.Assuming that publishers and subscribers have a trusted root certificate for event type owners(owned by the administrator of the pub/sub system itself),they will be able to verify that a local broker who accepts their adver-tisement is in fact authorised to carry such events.Once the advertisement or subscription has been set up, the actual eventsflowing through the system can be sym-metrically encrypted between brokers,if it is feared that the pub/sub infrastructure itself is at risk of being packet sniffed.Note that the actual allocation of network resources to facilitate inter-broker communication is an implementa-tion decision below our level of interest.Logically we con-sider a separate network channel for each event type,al-though in all likelihood most if not all of these events will be able to travel down,for example,a small number of ac-tual TCP connections,one or two encrypted and the others not.6.IMPLEMENTATIONIn this section,we present the enhanced implementation of Hermes that includes the role-based access control mecha-nisms introduced in this paper.Since our proposed architec-ture makes few assumptions about the internal implementa-tion of the publish/subscribe middleware that it is deployed on,only small parts of the current Hermes system required modification.The major changes were the addition of new parameters to the event broker API and the integration of OASIS with local event brokers for carrying out policy-based access control decisions.An authoritative replica of the sub-scription and advertisement policy is conveniently stored at the rendezvous node(cf.Section3.1.1)for this event type. This allows any local event broker to access policy via Her-mes’peer-to-peer overlay network in a simple and scalable way.In addition,local brokers maintain a policy cache to reduce network load.Other types of policy are kept in a centralised repository.6.1Hermes Broker APIFigure7shows the public API of a Hermes event broker after OASIS integration.For simplicity of exposition,we do not show the exceptions thrown by the calls in case of failure or rejection.All API calls require a client to authenticate itself when invoking a function by providing a set of creden-tials(creds),which will effectively communicate this client’s role in the system(publisher,subscriber,or typeowner). The identity and credentials are then passed to the OASISSecond International Workshop onDistributed Event-Based Systems(DEBS’03)5c ACMconnectPublisherToBroker(publisher,creds) disconnectPublisherFromBroker(publisher,creds) connectSubscriberToBroker(subscriber,creds) disconnectSubscriberFromBroker(publisher,creds) addEventType(typeowner,creds,eventType) removeEventType(typeowner,creds,eventType) subscribeType(subscriber,creds,eventType,callback) unsubscribeType(subscriber,creds,eventType) subscribeTypeAttr(subscriber,creds,eventType,filter,callback)unsubscribeTypeAttr(subscriber,creds,eventType,filter) advertise(publisher,creds,eventType)unadvertise(publisher,creds,eventType)publish(publisher,creds,event)...Figure7:The public API of an OASIS-aware Her-mes event brokerimplementation that performs a policy check in order to de-termine whether the particular operation should be executed by the local event broker.The connect calls are governed by the broker-client connection policy.If a client is not autho-rised to connect to a particular broker,it will not be able to invoke any further API calls and thus consume resources at the broker.The addEventType/removeEventType functions are invoked by an event type owner to manage event types according to the type management policy.As mentioned before,subscriptions in Hermes come in two flavours:type-based(t-based)subscriptions that only specify an event type from the event type hierarchy and type-and attribute-based(t/a-based)subscriptions that additionally include a content-basedfilter over the event type attributes. The two subscribe calls in the API enable clients to cre-ate subscriptions.Following our model,a restriction may have to be imposed on a submitted subscription so that it complies with the subscription policy.The three types of restriction outlined in Section4.2were implemented as fol-lows:(1)Generic Non-Optimised Restriction Predicates. Since a generic restriction predicate can be an arbitrary predicate on the t-based or t/a-based subscription,it can only be evaluated at the local event broker.The content-based routing cannot handle the unbounded expressiveness of these predicates so that the original subscription is prop-agated through the overlay broker network.As a result,all the events received at the publisher-and subscriber-hosting local event brokers arefiltered by the generic restriction be-fore being propagated through the publish/subscribe net-work or before being delivered to the subscriber.(2)Publish/Subscribe Restriction Predicates fol-low the expressiveness of t-based or t/a-based subscriptions in the sense that the result of applying a pub/sub restric-tion function to a subscription is another,more limited sub-scription.This restricted subscription,instead of the orig-inal one,is then propagated through the Hermes network. The original subscription is nevertheless stored in case the pub/sub restriction function changes due to dynamic policy evolution.(3)Hybrid Schemes.These are a hybrid form of(1) and(2).When such a restriction is in place,the originalsubscription is replaced by a more limited version that is then propagated through the pub/sub system.However,all future events that match this limited subscription are also filtered by the restriction predicate at the local broker.Advertisement requests submitted by publishers are han-dled analogously to subscriptions.Again,three variants of restrictions are implemented.However,pub/sub restriction functions can only limit the type within the type hierarchy, since Hermes advertisements cannot include content-based filters.The API call to publish will verify the client identity but will not cause a verification of the published message against the access control policy if pub/sub restriction func-tions specify the advertisement policy.Since Hermes ensures that a published message adheres to a previously submitted advertisement,this is sufficient to prevent the publisher from violating policy.However,for generic restriction predicates, each event message is validated separately.6.2Policy DisseminationAnother major requirement of our implementation is to be able to disseminate access control policies through the pub/sub system automatically.It is natural to use the pub/sub system itself for this.When a particular policy such as a subscription or advertisement policy for an event type needs to evolve,the policy owner(e.g.the event type owner) publishes a policy evolution event.These events never reach publishers and subscribers,but as mentioned earlier,they will reach every broker that might currently be caching pol-icy for this event type.They are passed to each local bro-ker’s OASIS implementation,which then updates its policy repository and handles the policy change.From the per-spective of Hermes,policy meta events are regular events and do not need to be treated specially.Local brokers should maintain the original advertisements and subscriptions from their clients so that the access control restrictions can be recomputed as necessary based on such policy evolution.This approach permits policy to either become more or less restrictive transparently to the clients of a broker;that is,publishers and subscribers do not need to take any action based on changes in access control policy.6.3Broker Trust ManagementIf event brokers are partially trusted and are only allowed to handle certain event types,as explained in Section5, Hermes’content-based routing algorithm must be adjusted to support this.We adopted a simple solution by marking brokers that are not trusted as failed.This has the advan-tage that the content-based routing algorithm will ignore these brokers and automatically attempt to create a valid dissemination tree that involves only brokers that are part of the certificate chain for this event type.In essence,we are creating a separate(trusted)overlay broker network for each event type.If a previously trusted broker becomes un-trusted,a policy change event is published by the event type owner.All brokers which are part of the trusted overlay net-work for this type will subscribe to these events.However, when a broker becomes untrusted,it may prevent the prop-agation of the policy change events to downstream broker in the event dissemination tree.In order to prevent this from happening,trusted event brokers receive periodic,signed timestamp events from the event type owner.Once a bro-ker is untrusted,it will no longer receive these time events 6。