Source: Quantum Computing Wikipedia
“Quantum computing studies theoretical computation systems (quantum computers) that make direct use of quantum-mechanical phenomena, such as superposition and entanglement, to perform operations on data. Quantum computers are different from binary digital electronic computers based on transistors. Whereas common digital computing requires that the data be encoded into binary digits (bits), each of which is always in one of two definite states (0 or 1), quantum computation uses quantum bits, which can be in superpositions of states. A quantum Turing machine is a theoretical model of such a computer, and is also known as the universal quantum computer. The field of quantum computing was initiated by the work of Paul Benioff and Yuri Manin in 1980, Richard Feynman in 1982, and David Deutsch in 1985. A quantum computer with spins as quantum bits was also formulated for use as a quantum spacetime in 1968. Read more…
Authors: Gabriel PETRICA, Ionut – Daniel BARBU, Sabina – Daniela AXINTE, Cristian PASCARIU
Published: ADVANCED TOPICS IN ELECTRICAL ENGINEERING – ATEE 2017
“FTA (Fault Tree Analysis) is one of the most used methods for reliability analysis and to quantify the risks associated with the failures of systems. This method performs analysis of the combination of events that can lead to a critical system failure (called Top Event of the designed Fault Tree) and allows calculating the probability of failure. In this paper, has been built the Fault Tree for a Web server considering failures that may occur at hardware level (the basic components for the considered computer system). After realizing the Fault Tree, were made two types of analysis: qualitative (which led to the identification of minimal cut sets) and quantitative (this allowed the calculation of the probability of occurrence of the considered critical event – <<Web server not operational>>.” Read more…
Source: ADVANCED TOPICS IN ELECTRICAL ENGINEERING – ATEE 2017
Source: Red Hat Satellite Wikipedia
“In computing, Red Hat Satellite is a systems-management product by the company Red Hat which allows system administrators to deploy and manage Red Hat Enterprise Linux (RHEL) hosts. A Satellite server registers with Red Hat Subscription Management, mirrors all relevant software like security errata and bug fixes, and provides this together with locally added software and configuration to the attached servers. The managed hosts register against the local Satellite server and access the provided resources like software packages, patches, configuration, etc. while they also provide information about the current health state of the server to the Satellite. Read more…
Source: IJISC Issue: Volume 3, Issue 2, Year 2014
“With a PhD in Roman Archaeology obtained at the University of Lausanne, a Postdoctoral Research Degree in History and Sociology at the Romanian Academy of Sciences, Cluj-Napoca Branch and an EU Habilitation to direct PhDs in History and related sciences, Laurent Chrzanovski is PhD co-director at the doctoral school of the University Lyon II Lumière and regularly holds postdoctoral courses within several major EU Universities; he is also Invited Professor at the Cluj-Napoca and Sibiu Universities as well as at the Polytechnics Universities of Bucharest and Cluj Napoca. He is the author/editor of 18 books and of more than a hundred scientific articles.” Read more…
Source: IJISC Issue: Volume 4, Issue 2, Year 2015
“Ms. Daria CATALUI is currently dealing with Network and Information Security in Education, stakeholder management and outreach strategies @ENISA. Her work focuses on communicating towards the end user.
Graduate in public policy from the University of Bucharest, further advanced academic qualifications in education: global education, virtual learning, youth studies; security: security studies, information security, data communication; trainer.
Her professional background includes working with the EC and the CoE on youth and educational policies, social entrepreneurship and community development initiatives. During the past years she has been working and learning from skilled professionals @Chelgate consultancy @IER & ANPCDEFP public administrations @CTR & EYF volunteering.
For current work you may consult www.cybersecuritymonth.eu and ENISA’s Education reports.” Read more…