Home

Results 71 - 80 of 44,565 for boot footwear. Search took 1.267 seconds.  
Sort by date/Sort by relevance
Kommentare zu: Verletzte Schutzsuchende von überfülltem Boot gerettet Kommentare zu: Verletzte Schutzsuchende von überfülltem Boot gerettet UNHCR in Germany, Austria and Switzerland
Language:English
Score: 1179677.4 - https://www.unhcr.org/dach/de/...elltem-boot-gerettet.html/feed
Data Source: un
Kommentare zu: Verletzte Schutzsuchende von überfülltem Boot gerettet Kommentare zu: Verletzte Schutzsuchende von überfülltem Boot gerettet UNHCR in Germany, Austria and Switzerland
Language:English
Score: 1179677.4 - https://www.unhcr.org/dach/ch-...elltem-boot-gerettet.html/feed
Data Source: un
Kommentare zu: Verletzte Schutzsuchende von überfülltem Boot gerettet Kommentare zu: Verletzte Schutzsuchende von überfülltem Boot gerettet UNHCR in Germany, Austria and Switzerland
Language:English
Score: 1179677.4 - https://www.unhcr.org/dach/at/...elltem-boot-gerettet.html/feed
Data Source: un
The different and complementary skills of each team member were precious, and each team members’ comments allowed us to adequately investigate the diverse aspects and issues related to the challenge. Team Heel of the Boot Following the selection of the features of their model, Heel of the Boot could integrate data sources into a final data set. (...) Credit: UNICC Team Heel of the Boot’s  final presentation , which married their models’ findings and background analyses, produced impressive results. (...) Francesco Russo, Team Heel of the Boot Team Heel of the Boot described their Hackathon experience as a surprising experience for not only the cohesiveness and coherence of a disparate team that yielded impressive results, but also the underlying philosophy in using skills in data for the betterment of lives on an international scale.
Language:English
Score: 1174950.1 - https://www.unicc.org/tag/is-i...o-predict-forced-displacement/
Data Source: un
System Engineer External Use TM TM External Use ‹#› Agenda Introduction Automotive Security Use-Case Security Timeline Standards EVITA SHE HSM TPM Security Modules TM External Use ‹#› 1 Introduction TM External Use ‹#› Security Use Cases In-Vehicle Security Immobilizer / Component Protection Mileage Protection Secure Boot and Chain of Trust Secure Communication DRM - eCars Connected Vehicle Security Application download DRM for content download/streaming Remote ECU firmware update Black-box for due government or insurance Car-to-X communication TM External Use ‹#› Automotive Security - Timeline HIS 1st SHE implementation EVITA Hardware Security Module HIS–HSM Specification CSE2 (CobraC55 / Halo) CSE3 Next Gen. (...) PRNG seed generation via TRNG CSE Core not programmable by customer juergen.frank@freescale.com TM External Use ‹#› CSE2 Enhancements to CSE Introduce new security flag per GPR-keys Increased number of GPR-keys from 10 to 20 Secure Boot result storage in NVM (configurable by customer) Reset Generation on Secure Boot Fail (configurable by customer) juergen.frank@freescale.com TM External Use ‹#› SSCM: System Status Configuration Module PASS: Password And Device Security Module TDM: Tamper Detection Module HSM: Hardware Security Module MPU: Memory Protection Unit DCF: Device Configuration Format Qorivva HSM Security Architecture Features: Device life cycle scheme Unique ID for each device Debugger restrictions Flash Protection OTP read / write & erase diary to log erasing-steps Freescale Production Customer Delivery OEM Production In-Field Failure Analysis TM External Use ‹#› Hardware Security Module (HSM) v1: MPC5746M / MPC5777M & v2: MPC5748G / MPC5746C HSM is free programmable by the customer, additional security algorithm could implemented in software Features: e200z0h core (v1: 100MHz / v2: 80 MHz) 4Kbytes Instruction cache Secure Debugger Interface Cryptographic Modules with AES-128, Random Number Generator, DMA Sensor Interface – monitor for voltage, temperature and clock (v1) Memory SRAM (v1: 40 Kbytes / v2: 32 Kbytes) Flash code: 2 x 64 Kbytes + 1 x 16KBytes data : 2 x 16 Kbytes juergen.frank@freescale.com TM External Use ‹#› MCU Flash Reprograming Security OTP Flash (Configuration) Pass Module Password 1 256 bits Password 2 256 bits Password 3 256 bits Password 0 256 bits 256 bit Challenge Register CPU LifeCycle State n LifeCycle State 0 LifeCycle State 1 Flash Program Enable Write/Erase Flash (Application) Boot code (Password 0) MCAL (Password 1) OEM Code (Password 2) Calibration (Password 3) OEM Code (Password 2) Configuration Debug Enable/Disable Flash Program Enable/Disable TM External Use ‹#› One Time Programable (OTP) definition: A Flash block assigned as OTP cannot be erased. (...) DCF records TDM Flash Controller Erase/Pgm TDM - One Time Programable TM External Use ‹#› i.MX Trust Architecture Features Trusted Execution Isolates execution of critical SW from possible malware TrustZone® Secure & Normal Worlds (processor modes) Hardware firewalls between CPU & DMA masters and memory & peripherals High Assurance Boot Authenticated boot: prevents unauthorized SW execution Encrypted boot: protects SW confidentiality Digital signature checks embedded in on-chip boot ROM Run every time processor is reset HW Cryptographic Accelerators i.MX family dependent Symmetric: AES-128, AES-256, 3DES, ARC4 Message Digest & HMAC: SHA-1, SHA-256, MD-5 TM External Use ‹#› i.MX Trust Architecture Features (continued) Secure Storage Protects data confidentiality and integrity Off-chip: cryptographic protection including device binding On-chip: self-clearing Secure RAM HW-only keys: no SW access HW Random Number Generation Ensures strong keys and protects against protocol replay On-chip entropy generation Cryptographically secure deterministic RNG Secure Clock Provides reliable time source On-chip, separately-powered real-time clock Protection from SW tampering TM External Use ‹#› i.MX Trust Architecture Features (continued) Secure Debug Protects against HW debug (JTAG) exploitation for: Security circumvention Reverse engineering Three security levels + complete JTAG disable Tamper Detection Protects against run-time tampering Monitoring of various alarm sources Debug activation External alarm (e.g. cover seal) SW integrity checks SW alarm flags HW and SW tamper response TM External Use ‹#› Security Standards EVITA- Low HIS-SHE EVITA-Medium (HIS-Medium) EVITA-High Main features UID Crypto engine NVM is mandatory Fix function set Programmable by customer Public Key HASH CSE/CSE2 CSE3 HSM (v1/v2) next generation security module* CSE, HSM and the Security Standards *feature set, still in discussion TM External Use ‹#› Freescale Devices with Security Freescale Security Solution for Automotive products Device Platform Module MCU ( internal flash) MPC564xB/C Power Architecture® e200 CSE MPC5746M / MPC5777M HSMv1 MPC5748G / MPC5746C HSMv2 MPC5777C CSE2 MPU (flash-less) Vybrid ARM® Controller Solutions ARM® Cortex®-Ax/Mx & ARM9/11 TrustZone® + Sahara / CAAM i.Mx ARM® 2x / 3x / 5x / 6x / 7x Automotive Consumer juergen.frank@freescale.com no automotive standards available TM External Use ‹#› Summary Accepted Specifiction(s) for all regions (EMEA, US and ASIA) Actual, no international standards Actual, no public standards Specification of the cryptographic functions Functions & Algorithm Performance (bandwidth, latency) Additional security requirements e.g. protection schemes required TM External Use ‹#› TM © 2014 Freescale Semiconductor, Inc. | External Use www.Freescale.com 24 XBAR-IFIP SkyBlue-IF CSE Core AES XBAR Peripheral Bridge BIU FLASH RAM SRAM CSE Block Sec.
Language:English
Score: 1174950.1 - https://www.itu.int/en/ITU-T/s...motiveSecurityStandardsV2.pptx
Data Source: un
UNICEF launched an artistic video with international music producer Moon Boots and vocalist Black Gatsby to join global efforts to fight against child marriage and to promote schooling for girls in Niger. (...) Working with artists and partners such as Moon Boots and Black Gatsby, UNICEF finds new alliances to fight to the persistence of child marriage worldwide’ said Félicité Tchibindat, UNICEF Representative in Niger. (...) The music video was filmed in the desert of Agadez, Niger, and was produced in partnership with UNICEF Niger, Moon Boots and Black Gatsby, and directed by South Africa’s Rooftop Productions.
Language:English
Score: 1170644.8 - https://www.unicef.org/niger/stories/music-girls-rights
Data Source: un
INS technology for girls' boot camp was a practical workshop on chosen topics in technology. Led by subject matter experts(female volunteers), the boot camp offered the girls the chance to learn something new or finesse existing skills while mingling with peers, forming new relationships and networking with women professional from Vodafone foundation and Huawei. (...) Module 1: Website development Tools - HTML5, CSS3 Coach/Mentor: Habiba Osman The coach introduced the girls to basic concepts, terminologies and techniques on how to design and create a simple website using HTML (Hypertext Markup Language) and CSS (Cascading Style Sheet). At the end of the boot camp the girls were able to plan and develop a simple multi-page's website.
Language:English
Score: 1169849.7 - https://www.itu.int/en/ITU-D/D.../2016/Africa/Kenya-2016-2.aspx
Data Source: un
Durante este tiempo se organizarán tres boot camps en un país seleccionado. En cada uno de los boot camps, los participantes recibirán formación y tutoría para crear un prototipo en base a su(s) solución(es). A lo largo de todo el proceso, los participantes se comunicarán, informarán y compartirán documentos y retroalimentación a través de un laboratorio virtual. Boot camp 1: Afinar la solución Durante el primer boot camp, los expertos de la OIT y sus socios trabajarán con el innovador en el terreno para desarrollar y perfeccionar su idea y solución. Boot camp 2: Crear un prototipo Durante el segundo bootcamp, el innovador recibirá apoyo técnico y facilidades para desarrollar un prototipo o una versión de prueba de su solución.
Language:English
Score: 1169282.5 - https://www.ilo.org/skills/pro...vation-labs/lang--es/index.htm
Data Source: un
Tout au long du processus, les participants communiqueront, débrieferont et partageront des documents et des commentaires par le biais d'un laboratoire virtuel. Boot camp 1 : Approfondir la solution Au cours du premier boot camp, les experts et les partenaires de l'OIT travailleront avec les innovateurs sur le terrain pour développer et affiner leurs idées et solutions. Boot camp 2 : Créer un prototype Au cours du deuxième boot camp, les innovateurs recevront un soutien technique et une aide pour développer un prototype ou une version d'essai de leur solution. Boot camp 3 : Plan d'action À la fin du processus, les innovateurs élaboreront un rapport final du prototype, y compris un plan d'action et/ou un plan d'affaires pour leur innovation.
Language:English
Score: 1169282.5 - https://www.ilo.org/skills/pro...vation-labs/lang--fr/index.htm
Data Source: un