Aromatische Amine: eine Arbeitshilfe in Berufskrankheiten-Festellungsverfahren : Report der Unfallversicherungsträger und des IFA
In: BK-Report 2011, 2
1371 Ergebnisse
Sortierung:
In: BK-Report 2011, 2
In: Schriftenreihe / Rechenzentrum, Universität Münster no. 9
In: Ecotoxicology and environmental safety: EES ; official journal of the International Society of Ecotoxicology and Environmental safety, Band 254, S. 114741
ISSN: 1090-2414
Similar to open source software, the open source hardware (OSHW) movement is seen as a technology driver which can enable developing economies to leapfrog their industries. While machine tools are a subset of OSHW, they have received relatively little academic attention compared to electronic OSHW. This study applies an explorative research approach and analyses open source designs for machine tools freely available on the internet. By coining, the term open source machine tools (OSMT), it determines their applicability in low resource contexts and identifies the potential of OSMTs in democratizing manufacturing technologies. OSMTs thereby encourage diversification, entrepreneurship, and inclusive industrial development, thus contributing to the implementation of Sustainable Development Goal no. 8 which aims to promote inclusive and sustainable economic growth. Specific areas for OSMT application in low-resource contexts and factors and barriers affecting their success are singled out.
BASE
International audience ; This article presents an overview and analysis of the key cybersecurity problems, challenges and requirements to be addressed in the future, which we derived through 63 interviews with European stakeholders from security-critical sectors including Open Banking, Supply Chain, Privacy-preserving Identity Management, Security Incident Reporting, Maritime Transport, Medical Data Exchange, and Smart Cities. We show that common problems, challenges and requirements across these sectors exist in relation to building trust, implementing privacy and identity management including secure and useable authentication, building resilient systems, standardisation and certification, achieving security and privacy by design, secure and privacy-compliant data and information sharing, and government regulations. Our results also indicate cybersecurity trends and allow to derive directions for future research and innovation activities that will be of high importance for Europe.
BASE
International audience ; This article presents an overview and analysis of the key cybersecurity problems, challenges and requirements to be addressed in the future, which we derived through 63 interviews with European stakeholders from security-critical sectors including Open Banking, Supply Chain, Privacy-preserving Identity Management, Security Incident Reporting, Maritime Transport, Medical Data Exchange, and Smart Cities. We show that common problems, challenges and requirements across these sectors exist in relation to building trust, implementing privacy and identity management including secure and useable authentication, building resilient systems, standardisation and certification, achieving security and privacy by design, secure and privacy-compliant data and information sharing, and government regulations. Our results also indicate cybersecurity trends and allow to derive directions for future research and innovation activities that will be of high importance for Europe.
BASE
International audience ; This article presents an overview and analysis of the key cybersecurity problems, challenges and requirements to be addressed in the future, which we derived through 63 interviews with European stakeholders from security-critical sectors including Open Banking, Supply Chain, Privacy-preserving Identity Management, Security Incident Reporting, Maritime Transport, Medical Data Exchange, and Smart Cities. We show that common problems, challenges and requirements across these sectors exist in relation to building trust, implementing privacy and identity management including secure and useable authentication, building resilient systems, standardisation and certification, achieving security and privacy by design, secure and privacy-compliant data and information sharing, and government regulations. Our results also indicate cybersecurity trends and allow to derive directions for future research and innovation activities that will be of high importance for Europe.
BASE
In: Semina: revista cultural e científica da Universidade Estadual de Londrina. Ciências agrárias, Band 28, Heft 2, S. 269
ISSN: 1679-0359
In: Verhandlungen des Deutschen Bundestages / Stenografischer Bericht, Band 14, Heft 233, S. 23244-23253
World Affairs Online
SSRN
In: http://hdl.handle.net/2027/wu.89017057167
"Die Verhandlungen des Verfassungsausschusses der deutschen Nationalversammlung. Zweiter Teil": p. [109]-674. ; I. Schriftwechsel zweischen Droysen und der provisorishen REgierung der Herzogtümer Schleswig-Holstein -- II. Die Verfassungsveratungen der siebzehn ertrauensmänner -- III. Die Verhandlungen des Verfassungsausschusses der Deutschen Nationalversammlung. ; Mode of access: Internet.
BASE