Home

Results 111 - 120 of 72,642 for client's tips. Search took 8.238 seconds.  
Sort by date/Sort by relevance
DEVELOPMENT OF DIGITAL ARABIC CONTENT: INCUBATION REQUIREMENTS AND TRAINING NEEDS
e-Government: Empowering citizens and serving public services clients; fostering quality and efficiency of information exchange and communication services in governmental and public administrative processes; strengthening participation of citizens in information society decision making. (...) Yet, quality needs to be assessed: users need to know what they get or buy, clients need to order according to certain standards, producers and designers need to have best practice models and quality comparisons. (...) It defines communications between client side content and a host system called the run- time environment (commonly a function of a learning management system).
Language:English
Score: 1008818.4 - https://daccess-ods.un.org/acc.../2010/TECHNICAL PAPER.3&Lang=E
Data Source: ods
Supercomputers Distributed Computing Systems BOINC – Used for SETI@Home, Atomic Physics People agree to donate spare computing resources Botnets: A special case of Distributed Computing Without the consent of the computers’ owners More computing power than a supercomputer – for free 3October 2007 The Botnet Economy Virus Writers, Botherders, Clients Virus writer writes malware, infects computers to create a botnet Botherder operates the botnet’s “command and control” (C&C) Clients hire botnets to use for Spam, DDoS, Identity Theft Highly developed underground economy Underground channels of communication “Secret” forums and chat rooms that frequently shift location Access shared on a need to know basis, new entrants may need to be vouched for by an existing participant Botherders offer support contracts to clients Guaranteed replacement of botnet in case antivirus researchers release a fix for the malware, or the botnet is taken down Organized crime involved in all stages of the economy Employ virus writers to create malware Carry out spam campaigns, espionage, ID theft, cyber attacks Launder money stolen from victims 4October 2007 Evolution of Botnets C&C centers harder to trace Originally hosted on public IRC channels Now encrypted, access restricted C&C software C&C centers may be hosted on botnets Increased redundancy Makes takedown harder New “headless” single use botnets No centralized control or C&C required Instructions embedded into the malware New malware and botnet created for a new task Cannot stop botnet by taking down its C&C 5October 2007 Evolution of Malware Malware is Self Propagating Infected hosts infect other hosts Infection vectors include email, P2P networks, open shared network folders, visiting an infected website Newer malware spreads faster than older generations of malware Its spread resembles that of a global pandemic (SARS, Bird Flu) Similar threat models and mitigation mechanisms can be applied Malware is becoming increasingly sophisticated Earlier, mostly spread through infected floppy disks Spreads much faster over the internet Email, IM, compromised websites, P2P, network shared folders) Principles of software engineering evident in recent malware Analysis, Detection and Removal more difficult Self destruct mechanisms to destroy data if the malware is removed “Droppers” download more malware onto a compromised host Encryption and Debugger / VM traps to prevent forensic analysis 6October 2007 What can you do with a Botnet? Spam The most visible use of botnets Botnets can host an entire spam campaign DNS servers, website hosting, spam sending Content can change location from PC to PC, country to country, in minutes “Take” from a spam run can be reused 419 scam artists now buying lists of compromised accounts from botherders, using these to spam Spam is just the tip of the iceberg. 7October 2007 What else can you do with a botnet?
Language:English
Score: 1007946.4 - https://www.itu.int/ITU-D/cyb/...roject-buenos-aires-oct-07.pdf
Data Source: un
“Blind sweeps” – e.g. of “red-light” districts or ‘hot spots’ where all sex workers are rounded up and detained – should be replaced with “smart raids” – intelligence-based and focused interventions that target known cases of TiP.[footnoteRef:8] Where possible, these interventions should be carried out in consultation with sex workers and their communities and organisations. [8: US Department of State (2010): “Blind sweeps and smart raids” in: The 2010 Trafficking in persons report (p40). https://www.state.gov/j/tip/rls/tiprpt/2010/ ] Anti-trafficking efforts should not justify or result in criminal prosecution or other coercive measures against adults who engage in sex work on a consensual basis, either as sex workers or clients. (...) The Global Network of Sex Work Projects (NSWP)[footnoteRef:13] calls for greater dialogue and partnership with the sex worker community, to simultaneously reduce TiP and address sex workers’ human rights concerns. To this end, NSWP has sought to further engage with the Interagency Coalition Against Trafficking in Persons (ICAT). [11: Durbar Mahila Samanwaya Committee, Anti-trafficking: Durbar is building a Chinese wall https://durbar.org/html/anti_trafficking.html .] [12: DMSC, UNFPA (2019) “An innovative model anti-trafficking program with the inclusion of survivors of trafficking” Submission to the 2019 Thematic Report of OHCHR UN Special Rapporteur on TiP, on innovative and transformative models of social inclusion for victims of trafficking.] [13: See: Global Network of Sex Work Projects (NSWP),https://www.nswp.org/ https://www.nswp.org/resource/sex-work-not-trafficking https://www.nswp.org/resource/policy-brief-the-impact-anti-trafficking-legislation-and-initiatives-sex-workers ] In the 2018 Supplement, the Global Commission on HIV and the Law pointed out that 258 million migrants, including 28.5 million refugees and asylum seekers, are now in search of safety and hope.
Language:English
Score: 1006958 - https://www.ohchr.org/sites/de...ficking/UNAIDS_UNDP_UNFPA.docx
Data Source: un
UNICEF EVALUATION OFFICE - THEMATIC SYSTESIS REPORT ON EVALUATION OF HUMANITAR
What they do not articulate, however, is whether these evaluations are useful to clients — or, more importantly, whether clients are using them to make meaningful improvements. (...) Poor rainfall, combined with a complex array of other factors, provided the tipping point that led to crop failure and a serious loss of livestock in the Sahel belt of Western Africa in 2011. (...) The capacity gap extends to the client side as well. As noted in internal consultations, clients rightly view their own engagement as critical to evaluation uptake.
Language:English
Score: 1006947.1 - daccess-ods.un.org/acce...?open&DS=E/ICEF/2013/15&Lang=E
Data Source: ods
The internet and digital platforms offer traffickers numerous tools to recruit, exploit, and control victims; organize their transport and accommodation; advertise victims and reach out to potential clients; communicate among perpetrators; and hide criminal proceeds – and all that with greater speed, cost-effectiveness and anonymity. (...) Source:  UNODC Human Trafficking FAQs How to stay safe online Human traffickers have become adept at using internet platforms, including social media channels, online marketplace sites, and free-standing webpages to recruit victims and attract clients. Follow these safety tips to protect yourself and your loved ones against human trafficking.
Language:English
Score: 1005645.3 - https://www.un.org/en/observances/end-human-trafficking-day
Data Source: un
Contact us Get Involved Get Involved External human rights resources Library Share Navigation Blocks Library Overview Access and hours Clients and services Training UN human rights materials External human rights resources Electronic resources (OHCHR staff only) Select Select Navigation Blocks Library Overview Access and hours Clients and services Training UN human rights materials External human rights resources Electronic resources (OHCHR staff only) Human rights collections & indexes The following links refer to other specialized human rights collections. (...) Focuses on electronic sources but includes general research tips for locating documents and other materials.
Language:English
Score: 1005645.3 - https://www.ohchr.org/en/libra...xternal-human-rights-resources
Data Source: un
The internet and digital platforms offer traffickers numerous tools to recruit, exploit, and control victims; organize their transport and accommodation; advertise victims and reach out to potential clients; communicate among perpetrators; and hide criminal proceeds – and all that with greater speed, cost-effectiveness and anonymity. (...) Source:  UNODC Human Trafficking FAQs How to stay safe online Human traffickers have become adept at using internet platforms, including social media channels, online marketplace sites, and free-standing webpages to recruit victims and attract clients. Follow these safety tips to protect yourself and your loved ones against human trafficking.
Language:English
Score: 1005645.3 - https://www.un.org/en/node/87446
Data Source: un
Export markets allow for clients to recognize and prize social initiative such as his cooperative's "Happiness Houses", set up to support social integration of youth at risk, he said. (...) The guide aims to provide basic operational blueprints on the goods trade, tips on how to take it  across borders and ways to generate sustainable international sales, and tools for selecting appropriate export market targets.
Language:English
Score: 1005015 - https://www.fao.org/newsroom/d...ll-to-the-rest-of-the-World/en
Data Source: un
REPORTS SUBMITTED BY STATES PARTIES UNDER ARTICLE 9 OF THE CONVENTION : INTERNATIONAL CONVENTION ON THE ELIMINATION OF ALL FORMS OF RACIAL DISCRIMINATION : 20TH, 21ST AND 22ND PERIODIC REPORTS OF STATES PARTIES DUE IN 2011 : FINLAND
One objective of the Participative Integration in Finland Project, initiated by the new Integration Act, is to improve the efficiency of integration training by testing new client oriented contents of the training. When the project is completed at the end of 2013, the authorities will evaluate the impact and cost efficiency of the tested alternative models in comparison with the current integration training system. (...) The training focused on the identification of discrimination and on intervention in it, on principles of good governance as well as on how to take into account the needs and situations of clients or workers representing different minorities in the planning of activities and services of the authorities.
Language:English
Score: 998007 - daccess-ods.un.org/acce...pen&DS=CERD/C/FIN/20-22&Lang=E
Data Source: ods
Bottled natural spring water is the safest option throughout your stay.   Bargaining and Tips   Bargaining is traditional practice at the market, with taxi drivers (given the fact they are not equipped with a meter), rickshaw pullers and when one is requesting a service. (...) In hotels, restaurants and sites, leaving a tip and deciding on its amount is left to the client’s appreciation.    
Language:English
Score: 996404.9 - https://www.icao.int/Meetings/...ges/Practical-Information.aspx
Data Source: un