Academic literature on the topic 'Static IP'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Static IP.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Static IP"

1

Lu, Wencheng, and Sartaj Sahni. "Recursively Partitioned Static IP Router Tables." IEEE Transactions on Computers 59, no. 12 (2010): 1683–90. http://dx.doi.org/10.1109/tc.2010.137.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Juwanda, Natali, Fajrillah, and Diansyah T.M. "IMPLEMENTASI STATIC NAT TERHADAP JARINGAN VLAN MENGGUNAKAN IP DYNAMIC HOST CONFIGURATION PROTOCOL (DHCP)." Jurnal Ilmiah Informatika 1, no. 1 (2016): 51–58. https://doi.org/10.5281/zenodo.574449.

Full text
Abstract:
To build a network interconnect Local Area Network (LAN) that will be needed in the form of Virtual groups Local Area Network (LAN). DHCP IP address given by the router to the PC located in the network. NAT (Network Address Translation) is one method that is used as an IP translation to gain entrance into a different network. NAT (Network Address Translation) can allow a host to go into different networks without allowing the host intended to tap into their networks using VLAN With the two different networks into a single switch can be connected. Giving DHCP IP will allow the network administrator to provide the IP address to a PC for IP assigned automatically by the router. An IP host is forwarded in a network with NAT.
APA, Harvard, Vancouver, ISO, and other styles
3

Aslam, J. M., and K. M. Kumar. "Enhancing security of cloud using static IP techniques." Scientific Temper 15, no. 01 (2024): 1790–98. http://dx.doi.org/10.58414/scientifictemper.2024.15.1.30.

Full text
Abstract:
The user authentication and access control procedures for data stored on a cloud server encountered numerous security risks and concerns. Because critical company data should only be accessible by authorized workers, enhancing cloud security with static IP approaches is more beneficial. Even though the cloud providers maintain many security mechanisms, still the level of security should be raised by them due to lot of intruders who want to break their security mechanism. An encryption method is frequently used in most servers’ security mechanisms. In this security mechanism, data in the cloud server may be stolen and misused. Security mechanisms using static IP addresses are another method for data security in cloud security. This paper explains that the static IP address security mechanism is better and more goal-oriented than that of earlier security systems.
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Xinyan, Zhengyu Zhang, Xiaoli Chen, Jing Li, and Junfang Xian. "Value of magnetic resonance imaging including dynamic contrast-enhanced magnetic resonance imaging in differentiation between inverted papilloma and malignant tumors in the nasal cavity." Chinese Medical Journal 127, no. 9 (2014): 1696–701. http://dx.doi.org/10.3760/cma.j.issn.0366-6999.20132409.

Full text
Abstract:
Background Distinguishing inverted papilloma (IP) from malignant tumors in the nasal cavity is difficult in a substantial number of cases, thus hindering the administration of appropriate therapeutic strategies. This study aimed to evaluate whether magnetic resonance imaging (MRI), including dynamic contrast enhanced MRI (DCE-MRI), could improve differentiation between IP and malignant tumors, and to identify which MRI features were the best in discriminating IP from malignant tumors in the nasal cavity. Methods Non-enhanced, static, and dynamic contrast enhanced MRI was performed in 88 patients with an IP or a malignant tumor in the nasal cavity that had been confirmed by histological results. MRI features of IP and malignant tumors including side, margin, T1 signal intensity, T1 homogeneity, T2 signal intensity, T2 homogeneity, lobulation signs, convoluted cerebriform pattern, extra-sinonasal involvement, pattern of enhancement, Tpeak, Tmax, CImax, and TIC type were evaluated and correlated with histological findings. Results There were significant differences between IP and malignant tumors in T2 homogeneity, lobulation signs, convoluted cerebriform pattern, extra-sinonasal involvement, Tpeak, Tmax and TIC types. A convoluted cerebriform pattern had a higher sensitivity and specificity in diagnosis of IP while washout-type TIC had a higher sensitivity and specificity in diagnosis of malignant tumors in the nasal cavity. Non-enhanced combined with static and dynamic enhancement MRI was significantly superior to non-enhanced combined with static enhancement MRI in the differentiation of IP and malignant tumors in the nasal cavity. Multivariate logistic regression analysis identified that the best MRI features were a convoluted cerebriform pattern, extra-sinonasal involvement, and washout-type TIC for both observers (Wang XY and Zhang ZY). Conclusion Non-enhanced and static combined with dynamic contrast-enhanced MRI improves differentiation of IP and malignant tumors in the nasal cavity.
APA, Harvard, Vancouver, ISO, and other styles
5

Natali, Juwanda, Fajrillah Fajrillah, and T. M. Diansyah. "IMPLEMENTASI STATIC NAT TERHADAP JARINGAN VLAN MENGGUNAKAN IP DYNAMIC HOST CONFIGURATION PROTOCOL (DHCP)." Jurnal Ilmiah Informatika 1, no. 1 (2016): 51–58. http://dx.doi.org/10.35316/jimi.v1i1.444.

Full text
Abstract:
To build a network interconnect Local Area Network (LAN) that will be needed in the form of Virtual groups Local Area Network (LAN). DHCP IP address given by the router to the PC located in the network. NAT (Network Address Translation) is one method that is used as an IP translation to gain entrance into a different network. NAT (Network Address Translation) can allow a host to go into different networks without allowing the host intended to tap into their networks using VLAN With the two different networks into a single switch can be connected. Giving DHCP IP will allow the network administrator to provide the IP address to a PC for IP assigned automatically by the router. An IP host is forwarded in a network with NAT.
APA, Harvard, Vancouver, ISO, and other styles
6

Wintolo, Hero, Salam Aryanto, and Muhamad Hafish. "Analisis Pengaruh Konfigurasi Network Address Translator (NAT) Statik Berbasis Web Menggunakan Wire Shark." Jurnal Informatika 8, no. 1 (2021): 93–98. http://dx.doi.org/10.31294/ji.v8i1.10166.

Full text
Abstract:
Konfigurasi peralatan jaringan computer yang digunakan untuk mengelola sebuah jaringan computer banyak yang menggunakan command line atau berbasis teks meski ada beberapa merk dari peralatan jaringan computer sudah menawarkan perangkat lunak untuk konfigurasi yang berbasis Graphical User Interface(GUI) dengan fungsi yang terbatas. Hal ini menjadi inspirasi untuk membuat perangkat lunak berbasis web untuk fungsi konfigurasi NAT statik dan dinamik. Hasil perancangan perangkat lunak diujikan dalam Local Area Network(LAN) dan jaringan internet untuk layanan server. Perangkat lunak yang dibuat pada peneltian ini terbukti dapat bekerja untuk pembuatan NAT statik dan dinamik melalui perangkat lunak wireshark yang memperlihatkan proses penyalinan alamat IP source menjadi alamat IP router yang ada NAT statik dan dinamik sehingga dapat mengakses web server yang ada. Sebanyak 30 komputer dalam LAN dan computer dari jaringan internet 100% dapat mengkases web server melalui NAT static yang dikonfigurasi menggunakan keyboard dan mouse.
APA, Harvard, Vancouver, ISO, and other styles
7

Groebbens, Adelbert, Didier Colle, Sophie De Maesschalck, et al. "Logical topology design for IP rerouting: ASONs versus static OTNs." Photonic Network Communications 21, no. 2 (2010): 170–91. http://dx.doi.org/10.1007/s11107-010-0291-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Muhammad Rifqi Maulana and Abdul Kholiq. "ANALISIS DAN IMPLEMENTASI KEAMANAN JARINGAN MIKROTIK DENGAN METODE IP FILTERING DAN PORT KNOCKIING ( STUDI KASUS BAROKAH.NET )." JURNAL LIMITS 19, no. 02 (2023): 71–80. http://dx.doi.org/10.59134/jlmt.v19i02.199.

Full text
Abstract:
Keamanan jaringan pada server sangat penting, karena server adalah titik utama dalam penyaluran jaringan internet, jika keamanan jaringan lemah maka orang yang tidak berkepentingan dapat dengan mudah melakukan serangan terhadap server, baik untuk mendapatkan internet secara gratis atau merubah sistem pada server. Di Barokah.net sistem keamanan yang digunakan hanya pada login ke akses server dan menggunakan IP Static untuk identitas pada modem client, seiring berjalannya waktu di temukan ip address illegal yang muncul pada daftar IP ARP Mikrotik dan penyerangan menggunakan Brute Force yang terdeteksi pada Log sistem Mikrotik. Berfokus pada masalah tersebut penggunaan metode IP Filtering dan Port Knocking pada server utama merupakan cara yang tepat untuk meningkatkan sistem keamanan jaringan, dimana IP Filtering dan Port Knocking akan memberikan sebuah daftardan autentikasi khusus agar perangkat yang ingin mendapatkan akses ke server dapat di perbolehkan oleh server. Sehingga metode IP Filtering dan Port Knocking dapat meningkatkan keamanan jaringan pada Barokah.net.
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Runhua, Jyh‐An Lee, and Jingwen Liu. "Unwinding NFTs in the shadow of IP law." American Business Law Journal 61, no. 1 (2024): 31–55. http://dx.doi.org/10.1111/ablj.12237.

Full text
Abstract:
AbstractAmid the surge of intellectual property (IP) disputes surrounding non‐fungible tokens (NFTs), some scholars have advocated for the application of personal property or sales law to regulate NFT minting and transactions, contending that IP laws unduly hinder the development of the NFT market. This Article counters these proposals and argues that the existing IP system stands as the most suitable regulatory framework for governing the evolving NFT market. Compared to personal property or sales law, IP laws can more effectively address challenges such as tragedies of the commons and anticommons in the NFT market. NFT communities have also developed their own norms and licensing agreements upon existing IP laws to regulate shared resources. Moreover, the IP regimes, with both static and dynamic institutional designs, can effectively balance various policy concerns, such as innovation, fair competition, and consumer protection, which alternative proposals struggle to provide.
APA, Harvard, Vancouver, ISO, and other styles
10

Miyazawa, S., and F. Nakamura. "New cycloconvertor with static induction transistors." IEE Proceedings B Electric Power Applications 136, no. 6 (1989): 293. http://dx.doi.org/10.1049/ip-b.1989.0038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Static IP"

1

Acerbi, Gabriele <1996&gt. "Mining for vulnerabilities in embedded TCP/IP stacks with a set of static analysis queries." Master's Degree Thesis, Università Ca' Foscari Venezia, 2020. http://hdl.handle.net/10579/18356.

Full text
Abstract:
In this thesis, we focus on helping the process of finding vulnerabilities in software. Even though it is a widely addressed topic, insecure code is still one of the main causes of security issues in in software because a single bug can potentially mine the security of an entire codebase. The goal of this thesis is to provide a solution that supports and ease the manual code auditing performed by a researcher. Our implementation will do so by providing a set of codebase-independent static analysis queries that can be quickly run on a target source code to identify code regions, across a whole codebase or across several projects, that may suffer from a particular vulnerability or weakness, therefore allowing to fix them all at once. We started by going through the available literature in the field as well as the available tools usually employed for this purpose. We then designed and implemented our solution and we finally evaluated it on the source code of seven popular embedded TCP/IP stacks, being able to identify a total of 14 zero-days out of the 46 we found during this research. Keywords — Vulnerabilities, Static Analysis, Variant Analysis, Joern, CWE, Embedded TCP/IP Stacks
APA, Harvard, Vancouver, ISO, and other styles
2

Modrák, Zdeněk. "Webová aplikace zobrazující polohu IP stanic." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-220392.

Full text
Abstract:
Thesis deal with geolocation in internet network. There are described possibilities of geolocation and thesis is mainly focused on passive geolocation methods. Under passive geolocation belongs location databases which there are described as in theoretical way as used in practical part of thesis. In practical part there is created complex system for geolocation in internet environment which used paid and free geolocation databases. Another used database is WHOIS. Data from paid databases is processed and accuracy of databases is evaluated.
APA, Harvard, Vancouver, ISO, and other styles
3

Adugna, Leykun, and Goran Laic. "Kan projekt med öppen källkod användas delvis eller helt för at tuppfylla behoven för routing-applikationer?" Thesis, KTH, Medicinteknik och hälsosystem, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-272732.

Full text
Abstract:
I dagens samhälle är det inte ovanligt för företag och organisationer att hitta bättre och alternativa mjukvaror med öppen källkod för att lösa sina behov. De söker programvaror som har de nödvändiga egenskaperna som krävs för att driva sin verksamhet och eventuellt ersätta egenutvecklad programvara för att spara tid och undvika onödiga kostnader. Denna avhandling har undersökt företagens behov av routing-applikationer och tagit fram ett förslag med hjälp av egenutvecklad testbädd. Den egenutvecklade testbädden kan användas av företag för att avgöra om den önskade öppen källkod programvara är lönsamt att implementera i ens verksamhet. Den routing-applikation som visade sig vara bättre än den befintliga är FRRouting(Free Range Routing). Lösningen som föreslås av studien har givit bevisad effekt genom ett pilotprojekt där öppen källkod har varit framgångsrikt på ett kvalitetsmässigt, funktionellt och kostnadseffektivt sätt att ersätta en befintlig programvara<br>Companies are looking into the open source community in the hope of finding a better alternative software to replace their existing software suit. They are looking for software that has the necessary properties required to run their business and possibly help them avoid unnecessary costs and save time. This thesis has examined the needs of routing application for companies and presented a suggestion by using self-developed testbed. The testbed can be used by companies to decide the beneficial of implementing the desired routing application software. The routing application that gave the best result in this study is FRRouting (Free Range Routing). The solution proposed by the study has been proven to be effective through a pilot project where open source program has been successful by retaining the expected quality, functionality in a cost-effective way.
APA, Harvard, Vancouver, ISO, and other styles
4

Němeček, Ladislav. "Odhad geografické polohy stanic v Internetu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220644.

Full text
Abstract:
This paper deals with methods of stations’ IP geolocation. It’s describes the methods of passive and active geolocation and it’s more focused on active searching methods, which usees measuring the latency in network. The factors causing delays in data transfer are discussed first, followed by discussion of the issue of measuring these delays. After that a brief description of PlanetLab experimental network, which nodes were used for delay measurment. Main topic is practical implementation of method Constraint-based Geolocation in Java programming language. Last but not least the measurement results of CBG algorithm are tested.
APA, Harvard, Vancouver, ISO, and other styles
5

Frid, Matilda, and Malin Aronsson. "Utvärdering av tätningskoncept för aktuator i motorrumsmiljö." Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Maskinteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-30969.

Full text
Abstract:
Examensarbetet har utförts på uppdrag av Kongsberg Automotive AB, en underleverantör inom fordonsindustrin som bland annat tillverkar växelspaksystem till både manuella och automatväxlade fordon. Fordonsbranschen kantas av ständig utveckling med innovativa lösningar, vilket under de senaste åren har resulterat i att elektroniken har fått en större roll i produkterna. Ifall elektroniken skadas kan det få förödande konsekvenser för produktens funktion. Det medför högre krav på säker inkapsling. För att motverka läckage och intrång av skadliga partiklar används ofta någon form av tätning.    Produkten som har studerats i detta examensarbete är en aktuator, vars funktion är att omvandla elektroniska signaler från växelspaken till mekaniska rörelser som interagerar med växellådan. Produkten innehåller tre tätningar som samverkar för att uppfylla inkapslingskraven under fordonets hela livstid. Dessa tre tätningar består av en statisk tätning av typen FIPG, en dynamisk o-ring och en ventil tätning av Gore-Tex membran.  Syftet med examensarbetet är att studera och utvärdera olika tätningskoncept som uppfyller de krav på inkapsling som ställs. Kongsberg önskar att utforska om det finns bättre alternativ till de tätningar som används i nuläget, särskilt vid en framtida ökad produktionsvolym. För att kunna utföra arbetet har en omfattande litteraturstudie genomförts. Den har bestått av faktainsamling, konkurrensanalys, intervjuer och observationer både på och utanför företaget. Detta mynnade ut i en Pughs matris där de olika tätningskoncepten ställdes mot den befintliga lösningen, FIPG och o-ring. Kriterier såsom kostnad, produktionsvänlighet, monteringsvänlighet, arbetsmiljö, processtid, livslängd samt behov av omkonstruktion har tagits fram till matrisen med hjälp av DFX-verktyg och intervjuer. En Pughs matris har utförts för både den statiska och dynamiska tätningen. Samma kriterier användes i båda fallen. Utifrån matrisen utnämndes lasersvetsning som den mest lämpliga metoden för den statiska tätningen. Anledningen till att den rekommenderas är bland annat dess låga kostnad vid höga volymer, den snabba processtiden samt dess långa livslängd. För den dynamiska tätningen rekommenderas Kongsberg Automotive att fortsätta med den befintliga lösningen, o-ringar. Detta på grund av dess låga kostnad för en tillräcklig livslängd. För att implementera den nya statiska tätningen krävs omkonstruktion av produkten. För en lyckad fogning ställs en del krav på flänsarna, bland annat en låg skevningstendens och en viss ytfinhet. Dessutom behöver flänsarna få en ny utformning som möjliggör fogning. Metoden bygger på att en del är lasertransparent och släpper igenom laserstrålen till den undre delen, som är laserabsorbent och smälter materialet vid fogen. Studien leder till ett grundligt underlag för Kongsberg Automotive, som kan underlätta vid beslut gällande tätningskonstruktionen.<br>This thesis is performed in association with Kongsberg Automotive AB, a subcontractor within the automotive industry who specializes in gear shifters for both manual and automatic transmission vehicles. The automotive industry is highly dynamic and constantly searching for innovative improvements. In recent years, this has led to an increase in the importance of electronics within a product. In case of an electronic failure, this can lead to devastating consequences for the function of a product. This leads to higher demands for safe encapsulation. Some sort of sealing is often used to reduce the risk of leakage and penetration of foreign particles. The product that has been studied in this project is an actuator. The function of an actuator is to convert electronic signals from the gear shifter to mechanical movements that interacts with the gearbox. The product consists of three sealing solutions that works together to meet the requirements for encapsulation during the vehicles lifetime. These solutions include a static gasket in form of a FIPG, a dynamic o-ring seal and a Gore-Tex vent membrane. The purpose of this thesis is to study and evaluate different sealing solutions that fulfills the demands of encapsulation according to the specification. Kongsberg Automotive wishes to explore if there are better sealing alternatives than the ones used today, particularly in regards to a potential increase in volume in the near future. In order to perform the project, an extensive literature study has been conducted. It was based on collection of facts, benchmarking, interviews and observations both within and outside of the company. This resulted in a Pugh matrix where the different sealing concepts where evaluated against the current solution, FIPG and dynamic o-rings. Criteria such as cost, production and assembly friendliness, work environment, processing time, life expectancy and the need of redesign were developed based on DFX-tools and interviews. The Pugh matrix were performed for both the static and the dynamic seal, using the same criteria in both cases. Based on the matrix, laser welding were chosen to be the most suitable seal for the static application. A few of the reasons were its low cost for high volume productions, the fast processing time and high function. For the dynamic seal, Kongsberg is recommended to continue using the current o-ring solution due to its low cost. To implement the recommended static sealing, redesign of the product is required. To achieve a successful joint, there are increased requirements for the flange surfaces, such as warpage and surface finish. In addition to this, the flanges needs a new design that enables joining. Laser welding is based on the material properties of the flanges. One part needs to be laser transparent to let the laser beam through, while the other part has to be laser absorbent to melt the material by the joint. This study results in a foundation for Kongsberg Automotive, to facilitate decision-making in regards to sealing design.
APA, Harvard, Vancouver, ISO, and other styles
6

Balej, Jiří. "Aktivní IP geolokace pro verifikaci pozic stanic v Internetu." Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-364608.

Full text
Abstract:
Dissertation thesis deals with methods for finding the location of the device in the Internet, based on knowledge of the IP address. The process is called IP geolocation and is currently solved by geolocation databases or by measurement of network properties to the IP address. The disadvantage of nowadays geolocation databases is an incorrect information about some locations, because they can be in large distance from correct position. The aim of the thesis is to develop a method for verification of a position from geolocation database using delay measurement. Because of it, there is a detail analysis of influence of partial delays on the distance estimation accuracy, calculated using measured delay between the landmark and the target IP address. For the same reason, long-term delay measurement was performed, where the IP geolocation accuracy was compared using calibration data from previous measurements. On this background, Cable Length Based Geolocalisation (CLBG) method is proposed. Principle of this method is built on the properties of partial delays, which depend on the length of transport media. Firstly, the method measures round trip time (rtt), which is subsequently lowered by intermediate devices and end stations delay. The geographical distance is estimated using signal speed in the transport media. Further, the winding media parameter is established, which is used to determine a constraint around the landmark. The intersection of all constraints defines the area, where the target IP is. The IP geolocation using CLBG gives better results than simpler methods (ShortestPing, GeoPing and SOI), in comparison with more advanced methods (CBG and Octant) the accuracy is similar. The disadvantage of the CLBG method is the size of region, where the target lies, but this is due to its purpose. The position found in geolocation database can be checked by evaluation if it lies in the region.
APA, Harvard, Vancouver, ISO, and other styles
7

Sulík, Peter. "Simulace lokalizace IP stanic pomocí algoritmů Vivaldi a GNP." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2011. http://www.nusl.cz/ntk/nusl-219291.

Full text
Abstract:
The work deals with the issues of network coordinate systems. The first chapter is devoted to a brief analysis of this systems and requirements placed on them. Furthermore, it deals with features of Vivaldi algorithm and its three versions: a centralized algorithm, algorithm with constant and adaptive time step. Subsequently it describes the GNP system and eash step of Nelder-Mead method for nodes localization. Next to it a developed simulation library is presented with its own graphical user interface for testing of these algorithms, which is capable of handling RTT responses database amongst individual IP network members. Simulations performed on data from PlanetLab network are evaluated in the conclusion.
APA, Harvard, Vancouver, ISO, and other styles
8

Tropp, Peter. "Lokalizace IP stanic na základě modelu pravděpodobnosti měření zpoždění." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2012. http://www.nusl.cz/ntk/nusl-219791.

Full text
Abstract:
The master thesis is dealing with Internet host localization methods, more exactly with determining geographical position of the unknown Internet host connected to the network using RTT delay measuring. The first part is dealing with description of RTT delays that may occur in the network and tools for their measurement. The next is part of thesis is devoted to description of two kinds of localization methods. Ones that are using existing data to determine the position of Internet host also called passive methods, and others that are using RTT delay measurement, also called active methods. The main part is focused on GeoWeight method which is based on geographical localization estimation of Internet host. It is based on RTT delay measurement using the principles of CBG method, enhanced by introduction of the theory of weights according to the probability of the target Internet host. The last part is describing the application that was made to determine the geographic localization of the target Internet host using GeoWeight method. The application was afterwards tested by measuring RTT delay in PlanetLab experimental network. At the end the final measured results were compared with other localization methods (CBG, Octant, SOI, GeoIP).
APA, Harvard, Vancouver, ISO, and other styles
9

Pokludová, Michaela. "Lokalizace stanic u systému internetové televize." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2010. http://www.nusl.cz/ntk/nusl-218344.

Full text
Abstract:
This thesis deals with locating station in the digital television broadcast over the Internet Protocol. The aim of this thesis was to develop a general model for the location of stations in the system of internet TV. This work deals with the five known methods for locating stations in distributed systems, which compares as many criteria, such as coordinates of computation speed, accuracy of results. Based on the evaluation was selected optimal method, which has been incorporated into the simulation program IPTV and tested. The result of this work is the source code of the implemented methods.
APA, Harvard, Vancouver, ISO, and other styles
10

Dvořák, Filip. "Využití znalosti topologie páteřních sítí pro určování fyzické polohy stanic v síti Internet." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2012. http://www.nusl.cz/ntk/nusl-219422.

Full text
Abstract:
The thesis discusses about modern geolocation methods and it describes the basic principles of their work. The work is divided into 2 parts - the theoretical one and the practical one. The first part of the thesis is focused on the description of these methods and on the explanation of its basic concepts which are used for determining of the physical position of the station according to its IP address. The second more extensive part of the work focuses on the description of the realization of algorithm in the Octant method in the programming language of Java and its use in the experimental net of PlanetLab. One important thing is to create a set of reference points and targets, which are necessary for the testing of the whole algorithm of the Octant Method. The results of estimated accuracy of target location obtained by the Octant method and their comparison with the results obtained by active methods of CBG, SOI and with the passive method of GeoIP are listed at the end of this work.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Static IP"

1

U.S. Dept. of Energy. Characterization, monitoring, and sensor technology integrated program (CMST-IP): Technology summary. U.S. Dept. of Energy, Office of Environmental Management, Office of Technology Development, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

U.S. Dept. of Energy. Characterization, monitoring, and sensor technology integrated program (CMST-IP): Technology summary. U.S. Dept. of Energy, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

McGaughey, William. The Independence Party and the future of third-party politics: Adventures & opinions of an IP Senate candidate. Thistlerose Publications, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kovalenko, Vladimir. Design of information systems. INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/987869.

Full text
Abstract:
The tutorial discusses the design features of information systems (is) involved in the implementation of CALS technologies: MRP/MRPII/ERP systems, e-Commerce systems (B2B), supply chain management (SCM), customer relationship management (CRM), and decision support systems (OLAP). The issues of choosing the design technology, software tools for project development, building functional and information models in the environment of Business Studio, MS Visio, Elma, AllFusion Modeling Suite and Oracle Designer 10g, as well as the development of technical and operational documentation are highlighted. The characteristics of CASE technologies and their implementation in the Oracle Designer 10g environment are considered. A comparative analysis of the standards of the organization of the life cycle of creating and using IP, practical recommendations for the development of standard profiles, examples of the development of an IP project based on a cascading model of the life cycle, including using a process approach in the management and automation of processes. The models of the client — server architecture and the structure of cloud computing are considered. Modern approaches to the selection of ready-made is and their implementation in automated enterprises are studied in detail.&#x0D; Meets the requirements of the Federal state educational standards of higher education of the latest generation.&#x0D; It is intended for students (bachelors and specialists) and masters of higher educational institutions studying in the direction of "Applied Informatics". It is also recommended for teachers and specialists working in the field of information technology.
APA, Harvard, Vancouver, ISO, and other styles
5

United States. Department of Homeland Security. Office of Inspector General. DHS must address Internet Protocol Version 6 challenges. U.S. Dept. of Homeland Security, Office of Inspector General, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dabula, Anelisa. OER Development Models: Opening Post-School Education in South Africa through a Coordinated OER Strategy. African Minds, 2022. http://dx.doi.org/10.47622/9781928502425_p09.

Full text
Abstract:
Given the many challenges facing higher education – such as the massification of the sector, rising student costs, high textbook prices, a growing digital divide and the undersupply of Global South learning materials – open educational resources (OER) have been proposed as one of a number of elements that can help address these challenges. As openly licensed educational resources that can be used, adapted and shared by anyone (Butcher 2010), OER are a versatile innovation that can open up learning by disrupting static intellectual property (IP), publishing and funding regimes. This is especially true in South Africa where, over the last decade, open education advocates have been making the case for greater OER engagement at national higher education institutions (HEIs) (Hodgkinson-Williams &amp; Arinto 2017). They have made the case that OER can reduce education costs for students, increase resource relevance in the South African context and increase collaborative opportunities between educators and students (Masuku et al. 2021).
APA, Harvard, Vancouver, ISO, and other styles
7

Grosse Ruse-Khan, Henning. Intellectual Property and International Investment Agreements. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780199663392.003.0007.

Full text
Abstract:
This chapter examines selected issues on the scope of intellectual property (IP) protection under international investment law and contrasts this with the approach of the international IP system. It first reviews the extent to which IP amounts to a protected investment. The chapter then analyses the operation of national treatment and most favoured nation (MFN) in international investment agreements (IIAs) and international IP treaties. Some of the absolute standards of treatment owed by a host state to a foreign investor under most IIAs are examined in their application to IP rights. Finally, this chapter scrutinises the extent to which obligations from the international IP system can be subject to investor–state dispute settlement (ISDS).
APA, Harvard, Vancouver, ISO, and other styles
8

American Bar Association. Section of Intellectual Property Law, ed. Developing an intellectual property (IP) law practice: Case studies of IP law practitioners who have started an IP law practice. American Bar Association, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Grosse Ruse-Khan, Henning. Conflict Rules and Integration Principles in the International IP System. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780199663392.003.0012.

Full text
Abstract:
This chapter first looks at the (few) formal conflict rules in the international intellectual property (IP) system. It focusses on those found in the Trade Related Aspects of International Property Rights (TRIPS) Agreement. It then assesses those rules and principles that are not about directly allowing other international norms to prevail, but rather indirectly allow states implementing IP treaties and adjudicative bodies interpreting them to take into account external norms and the interests and objectives they protect. Next, the chapter provides an overview of three different areas where the international IP system has either provided specific responses to its intersections with other areas of international law, or where such a response is under negotiation in international IP fora. Finally, this chapter turns to the main horizontal tool in TRIPS and other IP treaties that allows states to take into account other interests and objectives that coincide or conflict with IP protection: the so called ‘three-step-test’.
APA, Harvard, Vancouver, ISO, and other styles
10

Seville, Catherine. The Emergence and Development of Intellectual Property Law in Western Europe. Edited by Rochelle Dreyfuss and Justine Pila. Oxford University Press, 2017. http://dx.doi.org/10.1093/oxfordhb/9780198758457.013.12.

Full text
Abstract:
This chapter surveys the emergence and development of Intellectual Property (IP) law in Continental Europe and Britain. The story begins largely in the middle ages with the grant of territorially-confined inventors’ and printers’ privileges, and traces the development of these privileges into the four main species of IP rights recognized throughout the world today. A key theme is the varied national histories that underpin the development of each IP right even within the geographical confines and relative social and political homogeneity of Western Europe, and the extent of modern IP law’s embeddedness in the industrial and cultural development of individual states. The chapter ends with an account of the emergence of a European perspective on IP, as expressed in the nineteenth-century Paris and Berne Conventions, and its development by general and IP-specific European communities, including the EU, which has established unitary patent, trademark, and design rights for its Member States.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Static IP"

1

Aweya, James. "Static Routes in the Routing Table." In IP Routing Protocols. CRC Press, 2021. http://dx.doi.org/10.1201/9781003149040-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Hui, and Xin Yang. "Prototype of Sovereignty Network and Application of Private Network Based on MIN." In Co-governed Sovereignty Network. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-2670-8_5.

Full text
Abstract:
AbstractMulti-Identifier Network (MIN) is compatible with IP network, and supports naturally and gradually de-IP, which will be promoted by users and the market for its performance gains rather than by compulsively. It is a predictable circumstance that the IP network may still be mainstream at United States of American in the future. But other countries will move away from IP to MIN in order to safeguard their sovereignty over cyberspace, and the connectivity between them and IP network are guaranteed through MIN. In other words, IP network will become the internal network of the United States, while other countries will constitute a multilateral governance network system based on MIN. In brief, the applications scenarios of Co-governed Sovereignty Network based on MIN could be classified into three scales: the small-scale scenarios such as high-security private networks for enterprises, industries, and government departments; the medium-scale scenarios of industrial Internet, private network of Internet of vehicles and smart city; the United Nations of Cyberspace: raplacing the current IP network with the large-scale high-security cyberspace for multilateral condominium and sovereign autonomy.
APA, Harvard, Vancouver, ISO, and other styles
3

Pucher, Krzysztof, and Dariusz Polok. "Analysis of Timings in Networks that Use TCP/IP or UDP/IP Protocols for Communication with Industrial Controllers in Mechatronic Systems." In Solid State Phenomena. Trans Tech Publications Ltd., 2008. http://dx.doi.org/10.4028/3-908451-60-4.94.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bharadwaj, Ashish, Vishwas H. Devaiah, and Indranath Gupta. "SSOs’ Role in Facilitating IP Policy Measures." In Locating Legal Certainty in Patent Licensing. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-15-0181-4_2.

Full text
Abstract:
AbstractGenerally speaking, standards are adopted to reduce transaction costs for several implementers and increase interoperability among devices and platforms. Standards make our lives as consumers easier. For instance, a Wi-Fi-enabled smartphone device will connect to a Wi-Fi connection regardless of the jurisdiction. It has happened because Wi-Fi is a standard, which has been unanimously adopted by all stakeholders. There are technical standards adopted through several standard setting organizations, and there are standards adopted through market demand, which have evolved with time. Standard setting organizations (SSOs) play a crucial role in operationalizing a standard. The stages through which a standard is operationalized are often fraught with uncertainty, and a lot depends on the internal structure of an SSO. The most significant contributor to the entire process is the IPR policies adopted by each of these SSOs. This chapter provides a glimpse of these IPR policies of SSOs in three different jurisdictions, i.e., Europe, the United States, and India. These policies show their diverse nature and often lead to complex end-results.
APA, Harvard, Vancouver, ISO, and other styles
5

Hellum, Rikke, Anders Hammarberg, and Anette Søgaard Nielsen. "Community Reinforcement Approach and Family Training (CRAFT)." In Sustainable Development Goals Series. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-82583-5_19.

Full text
Abstract:
Abstract The aim of Community Reinforcement Approach and Family Training (CRAFT) is to offer addiction-affected family members (AFMs) support and strategies to increase the likelihood that a close one (identified person; IP) reduces alcohol or drug use or gambling and/or seeks treatment, as well as increasing psychological health and quality of life for the AFM. CRAFT applies treatment traditions from Motivational Interviewing and Cognitive Behavioral Therapy. CRAFT is structured but may be adjusted to the needs of the AFM. During sessions themes are introduced together with tools for behavior change that participants practice throughout the intervention. Central CRAFT themes are building up hope for change, improving the mental health and quality of life of the AFM, insight in what drives addictive behavior, prevention of violent behavior, functional analysis of how behaviors are facilitated by context and expectations, positive communication, making use of positive reinforcement, allowing natural negative consequences to occur, and help to initiate treatment for the IP. The efficacy of CRAFT has been investigated, with most studies performed in the United States. CRAFT has been studied in various formats (individual, group, combination of individual and group, self-help, and internet-delivered) and is efficacious in engaging IPs with alcohol or substance use disorder in treatment, compared to active and non-active comparators. Although CRAFT is irrefutably beneficial for many AFMs and IPs, issues regarding the scientific evidence, content, and administration of CRAFT have been raised. For example, the scientific quality of many CRAFT studies has been deemed to be generally low. Also, a large variability in treatment engagement rates for IPs points to the importance of taking contextual factors into account when interpreting the outcomes of CRAFT studies.
APA, Harvard, Vancouver, ISO, and other styles
6

Alvarez León, Luis F. "Assembling the Geographic Information Market in the United States." In Knowledge and Digital Technology. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-39101-9_7.

Full text
Abstract:
AbstractThis chapter examines the construction of the geographic information market in the United States. The focus is on two key building blocks in this process: (1) the development of (legal and technical) interoperability in the collection and dissemination of geographic information, and (2) the construction of Intellectual Property (IP) regimes. These elements are explored in the context of the institutional configuration between government, the private sector, and the public. This configuration, which in the United States bounds the role of government as a producer of geographic information and limits its actions in the market, creates suitable conditions for the continued production of geographic information as input to a growing market, as well as its consumption, circulation, transformation, and use by government agencies, private firms, and the broader public. Lastly, the chapter characterizes the geographic information market in the United States as relying on the legally delimitated role of the Federal Government as a de jure producer of informational inputs that foster the development of secondary applications in addition to fulfilling its primary mission of public information. Understanding the institutional, legal, and technical dimensions of the geographic information market will enable a clearer analysis of the linkages, transactions, and logics between government agencies, private firms, and civil society groups in the production of value through geographic information and other informational resources. More generally, the author argues that identifying the interplay between specific institutional environments, governing legal frameworks, and processes of technological innovation and knowledge generation is essential to studying, governing, and regulating informational markets in the digital economy.
APA, Harvard, Vancouver, ISO, and other styles
7

Herkersdorf, Andreas, Michael Engel, Michael Glaß, et al. "RAP Model—Enabling Cross-Layer Analysis and Optimization for System-on-Chip Resilience." In Dependable Embedded Systems. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-52017-5_1.

Full text
Abstract:
AbstractThe Resilience Articulation Point (RAP) model aims to provision a probabilistic fault abstraction and error propagation concept for various forms of variability related faults in deep sub-micron CMOS technologies at the semiconductor material or device levels. RAP assumes that each of such physical faults will eventually manifest as a single- or multi-bit binary signal inversion or out-of-specification delay in a signal transition between bit values. When probabilistic error functions for specific fault origins are known at the bit or signal level, knowledge about the unit of design and its environment allow the transformation of the bit-related error functions into characteristic higher layer representations, such as error functions for data words, finite state machine (FSM) states, IP macro-interfaces, or software variables. Thus, design concerns can be investigated at higher abstraction layers without the necessity to further consider the full details of lower levels of design. This chapter introduces the ideas of RAP based on examples of particle strike, noise and voltage drop induced bit errors in SRAM cells. Furthermore, we show by different examples how probabilistic bit flips are systematically abstracted and propagated towards instruction and data vulnerability at MPSoC architecture level, and how RAP can be applied for dynamic testing and application-level optimizations in an autonomous robot scenario.
APA, Harvard, Vancouver, ISO, and other styles
8

"Static and dynamic routing." In TCP/IP Essentials. Cambridge University Press, 2004. http://dx.doi.org/10.1017/cbo9781139167246.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

VanGundy, Braxton. "Configuring a Static IP Address." In Setting Up Apache Server on a Raspberry Pi 3. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5848-4_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Upadhyay, Paramesh C., and Sudarshan Tiwari. "Network Layer Mobility Management Schemes for IP-Based Mobile Networks." In Advancing the Next-Generation of Mobile Computing. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0119-2.ch013.

Full text
Abstract:
Mobility is a natural phenomenon in cellular networks. The worldwide popularity of mobile communications and Internet has necessitated the merger of the two fast growing technologies to get their fullest advantages. The Internet protocol (IP) was designed for static hosts only. Therefore, in order to add mobility in Internet, the Internet protocol needs to be redefined. This paper is intended to present an overview of various mobility management schemes, available in literature, for IP-based mobile networks.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Static IP"

1

Miller, D. G., M. D. Wright, G. Cherepakhov, W. A. Monti, and J. O. Parry. "Examination of Corrosion Specimens from the Full Reactor Coolant System Decontamination at Indian Point Unit 2." In CORROSION 1998. NACE International, 1998. https://doi.org/10.5006/c1998-98339.

Full text
Abstract:
Abstract The first full-system chemical decontamination (FSD) of a nuclear power reactor in the United States was performed at Consolidated Edison's Indian Point 2 (IP-2) PWR in March 1995. This National Demonstration of a full reactor coolant system (RCS) decontamination was performed using a five-step decontamination process. To evaluate the effects of the decontamination on materials in the IP-2 RCS, and to ensure the integrity of these materials, several types of corrosion specimens were installed in the decontamination process system (DPS). Corrosion coupons were fabricated from: major RCS materials of construction - Alloy 600, type 304 stainless steel (SS), sensitized 304 SS, 316 SS, 410 SS.Cr- and Ni-plated materials.Co-, Ni- and Fe-based hard-facing alloys.Stressed specimens were included for materials that could possibly be susceptible to inter-granular attack and stress corrosion cracking. The metallographic examination of the corrosion specimens did not reveal any materials compatibility issues that would have an impact on operation of the IP-2 PWR following the FSD. IP-2 was successfully returned to service without problems, and is now into the second cycle of operation following the FSD. A key result from the Scanning Auger Microscopy (SAM) examination of 304 SS and Alloy 600 artifacts from IP-2 was that a thin, Cr-rich film remains on the specimens after the decontamination. The presence of a Cr-rich oxide may serve to passivate surfaces and minimize recontamination rates during subsequent reactor operation. At the conclusion of the FSD in 1995, the radiation fields had been reduced by an average of 87%. Radiation field measurements taken by Consolidated Edison during the 1997 refueling outage (25 months following the FSD) indicated that the radiation fields had increased by less than 10 % across the plant and were 84% lower than the 1995 pre-decontamination levels; recontamination rates are significantly lower than expected.
APA, Harvard, Vancouver, ISO, and other styles
2

Gong, Yi, Yuejun Zhang, Jiangtao Tu, Rongxin Zou, and Liang Wen. "An Efficient Convolutional Neural Network Hardware IP for Epilepsy Detection." In 2024 IEEE 17th International Conference on Solid-State & Integrated Circuit Technology (ICSICT). IEEE, 2024. https://doi.org/10.1109/icsict62049.2024.10831320.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lu, Wencheng, and Sartaj Sahni. "Recursively Partitioned Static IP Router-Tables." In 2007 IEEE Symposium on Computers and Communications. IEEE, 2007. http://dx.doi.org/10.1109/iscc.2007.4381472.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ogura, Y., Y. Kazayama, T. Nishimura, and J. Tanida. "Optical manipulation of microdroplets by use of a spatial light modulator and a static computer generated hologram." In 2011 ICO International Conference on Information Photonics (IP). IEEE, 2011. http://dx.doi.org/10.1109/ico-ip.2011.5953762.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Zhaoxiang, Orlando Arias, Weimin Fu, Yier Jin, and Xiaolong Guo. "Inter-IP Malicious Modification Detection through Static Information Flow Tracking." In 2022 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2022. http://dx.doi.org/10.23919/date54114.2022.9774694.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang Jinyi, Yang Xiaodong, Zhang Dong, and Yang Yi. "Test scheduling of SOC IP interconnect for static and SI faults." In IET International Communication Conference on Wireless Mobile & Computing (CCWMC 2009). IET, 2009. http://dx.doi.org/10.1049/cp.2009.1900.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Xingwei, Chengcheng Tong, and Min Huang. "An Intelligent Static Traffic Grooming Scheme in IP over DWDM Internet." In 2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC). IEEE, 2009. http://dx.doi.org/10.1109/icicic.2009.93.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Al-Hertani, Hussam, Dhamin Al-Khalili, and Come Rozon. "Static leakage current estimation of on-the-fly generated IP logic blocks." In 2009 4th IEEE Conference on Industrial Electronics and Applications (ICIEA). IEEE, 2009. http://dx.doi.org/10.1109/iciea.2009.5138184.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Giacomazzi, Paolo, and Gabriella Saddemi. "Resource allocation and admission control in static priority schedulers with statistical guarantees." In 2008 4th International Telecommunication Networking Workshop on QoS in Multiservice IP Networks (IT-NEWS). IEEE, 2008. http://dx.doi.org/10.1109/itnews.2008.4488138.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Carrozza, Gabriella, Marcello Cinque, Ugo Giordano, Roberto Pietrantuono, and Stefano Russo. "Prioritizing Correction of Static Analysis Infringements for Cost-Effective Code Sanitization." In 2015 IEEE/ACM 2nd International Workshop on Software Engineering Research and Industrial Practice (SER&IP). IEEE, 2015. http://dx.doi.org/10.1109/serip.2015.13.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Static IP"

1

Kaur, Harpreet, Jasmitha Aravind, Chandni Singh, Sreya Ajay, and Prathigna Poonacha. Representing COVID-19 Impacts and Responses on Indigenous People: A Multilingual Media Review in the Nilgiri Biosphere Region, India. Indian Institute for Human Settlements, 2022. http://dx.doi.org/10.24943/nbr12.2022.

Full text
Abstract:
The COVID Observatories project examines the implications of the COVID-19 pandemic on climatic risks and food systems among Indigenous Peoples (IPs) around the world. In India, the focus is on the IPs living in the Nilgiri Biosphere, spread over parts of three states; Tamil Nadu, Kerala, and Karnataka, and includes five national parks and two wildlife sanctuaries (Figure 1). IPs are colloquially called ‘Adivasi’ or tribes and India is not a signatory to the IP declarations laid out by the UN. We use IP in this report to adhere international norms and reflect as media reports that tend to use IP and Adivasi, depending on the media portal.
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Richard. LegalOne hosts an afternoon reception in San Diego. LegalOne Global Limited, 2025. https://doi.org/10.62436/a-1748229424206.

Full text
Abstract:
On Monday, 19th May 2025, LegalOne hosted an engaging afternoon reception at the Gaslamp Lumpia Factory in San Diego, United States of America, creating invaluable networking opportunities for intellectual property professionals and experts. The event was led by Publisher Kim Cheung and Marketing Manager Anita Fung, who warmly welcomed guests. It provided a valuable occasion for attendees to exchange insights and to share industry perspectives, build connections, and explore collaboration opportunities within the global IP community, all in an informal and engaging setting.
APA, Harvard, Vancouver, ISO, and other styles
3

Briscoe, B., T. Moncaster, and M. Menth. Encoding Three Pre-Congestion Notification (PCN) States in the IP Header Using a Single Diffserv Codepoint (DSCP). RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6660.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rosen, E., P. Psenak, and P. Pillay-Esnault. Using a Link State Advertisement (LSA) Options Bit to Prevent Looping in BGP/MPLS IP Virtual Private Networks (VPNs). RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4576.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bergsen, Pepijn, Carolina Caeiro, Harriet Moynihan, Marianne Schneider-Petsinger, and Isabella Wilkinson. Digital trade and digital technical standards. Royal Institute of International Affairs, 2022. http://dx.doi.org/10.55317/9781784135133.

Full text
Abstract:
There is increasing impetus for stronger cooperation between the US, EU and UK on digital technology governance. Drivers of this trend include the economic incentives arising from opportunities for digital trade; the ambition for digital technology governance to be underpinned by shared values, including support for a democratic, open and global internet; and the need to respond to geopolitical competition, especially from China. Two specific areas of governance in which there is concrete potential to collaborate, and in which policymakers have indicated significant ambitions to do so, are digital trade and digital technical standards. - To leverage strategic opportunities for digital trade, the US, EU and UK need to continue identifying and promoting principles based on shared values and agendas, and demonstrate joint leadership at the global level, including in the World Trade Organization (WTO) on e-commerce. - Policy actors in the US, EU and UK should work individually and collectively to build on the latest generation of digital trade agreements. This will help to promote closer alignment on digital rules and standards, and support the establishment of more up-to-date models for innovation and governance. - Collaborating on digital technical standards, particularly those underlying internet governance and emerging technologies, offers the US, EU and UK strategic opportunities to build a vision of digital technology governance rooted in multi-stakeholder participation and democratic values. This can provide a strong alternative to standards proposals such as China’s ‘New IP’ system. - Policy actors should seek to expand strategic cooperation on standards development among the US, EU and UK, among like-minded countries, and among states that are undecided on the direction of their technology governance, including in the Global South. They should also take practical steps to incorporate the views and expertise of the technology industry, the broader private sector, academia and civil society. By promoting best-practice governance models that are anticipatory, dynamic and flexible, transatlantic efforts for cooperation on digital regulation can better account for the rapid pace of technological change. Early evidence of this more forward-looking approach is emerging through the EU’s proposed regulation of digital services and artificial intelligence (AI), and in the UK’s proposed legislation to tackle online harms. The recently launched EU-US Trade and Technology Council is a particularly valuable platform for strengthening cooperation in this arena. But transatlantic efforts to promote a model of digital governance predicated on democratic values would stand an even greater chance of success if the council’s work were more connected to efforts by the UK and other leading democracies
APA, Harvard, Vancouver, ISO, and other styles
6

The Status and Future of Rights-Based Conservation in the Amazon of Colombia and Peru. Rights and Resources Initiative, 2022. http://dx.doi.org/10.53892/gzum7792.

Full text
Abstract:
This report identifies possible pathways towards the integration of a rights-based approach in the legal conservation frameworks of Colombia and Peru. It does so in the context of tenure rights recognition for Indigenous Peoples (IP) and Afro-descendant Peoples (ADP) as an effective strategy for biodiversity protection in the Amazon. With this in mind, it highlights opportunities for implementing a rights-based approach within current and medium-term conservation frameworks and policies in both countries.
APA, Harvard, Vancouver, ISO, and other styles
7

Is Global Funding Reaching Indigenous, Afro-descendant, and Local Community Women? Rights and Resources Initiative, 2024. http://dx.doi.org/10.53892/xxku6665.

Full text
Abstract:
In response to the dearth of data on funding for women and the need to support international advocacy promoting direct funding to IP, ADP, and LC women’s groups and organizations, the Rights and Resources Initiative (RRI) initiated a bottom-up research effort to build a baseline for measuring funding levels reaching community women on the ground and assess the extent to which existing grants and funding mechanisms are considered fit-for-purpose by recipient organizations. For the exploratory phase of this research, RRI invited the Women in Global South Alliance (WiGSA) to contribute and a total of 17 national and regional-level WiGSA member organizations participated. The research consisted of a literature review of over 40 online publications from ODA and philanthropic organizations on funding for climate change, gender equality, and sustainable development; 8 in-depth interviews; a survey of 13 organizations; and a discussion session with 15 WiGSA members. This brief presents the preliminary results of our research. It includes an exploratory analysis of the current state of global data on funding for women’s groups and organizations and an examination of women’s strategies and journeys to acquire funding. The quantitative data presented here is indicative of the trends and key issues needing consideration in a future larger-scale study. The exploratory research phase will be complemented by an in-depth pilot analysis with three WiGSA organizations in 2025.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography