For example, two samite fragments, one featuring a winged horse design and another depicting an ibex, a type of wild goat native to Eurasia, were uncovered at a site in Antinopolis, a Greco-Roman, and later Byzantine, city founded in Egypt in 130 BCE and abandoned in the 10th century CE. Here, the winged horses and ibexes are depicted wearing pearl necklaces and floating ribbons, symbols of the Sasanians (224 -651 CE) of the Iranian Plateau. (...) A similar Sasanian influenced roundel design to the Antinopolis samite
© Metropolitan Museum of Art
Roundel with winged horse, 9th CE. Similar in design to the winged horse samite found in Antinopolis
Previous
Next
See Also
Cross-Cultural Influences Reflected in a Bactrian Ewer Depicting Scenes from Ancient Greek Mythology
Sometimes practical and sometimes a piece of decorative art, ewers are tall thin vessels with a wide base, spout, and handle that have been uncovered from numerous archaeological sites from along the lengths of the Silk Roads.
Language:English
Score: 1610894
-
https://en.unesco.org/silkroad...o-roman-city-antinopolis-egypt
Data Source: un
In
some regions such differences are particularly marked in barrows from the Late Bronze
Age, which contained basic types of arms, horse-harness fittings and artefacts typical of
the time. (...) The
large quantity of horses’ bones inevitably brings to mind Herodotus’ observation that the
only god the Massagetae worshipped was the sun, to which they sacrificed horses (1.216).
(...) Tacitus (VI.37) also noted the ideological significance of the horse image in speak-
ing of the sacrificial slaughter of horses as a Parthian custom; so did Philostratus, who
observed that the Parthian king Vardanes sacrificed a white horse of the best Nisa breed.
Language:English
Score: 1569265.6
-
https://en.unesco.org/silkroad...20western%20central%20asia.pdf
Data Source: un
DSc Eugene Nickolov 39
3. TROJAN HORSES, ROOTKITS, 3. TROJAN HORSES, ROOTKITS, AND BACKDOORS.AND BACKDOORS. 0202
3.1 TROJAN3.1 TROJAN HORSES. (...) This is the technique of the Trojan horse or does. This is the technique of the Trojan horse or trojantrojan..
7-9 Oct 2008, Sofia Prof. (...) DSc Eugene Nickolov 45
3. TROJAN HORSES, ROOTKITS, 3. TROJAN HORSES, ROOTKITS, AND BACKDOORS.AND BACKDOORS. 0202
3.93.9 Crackers typically use backdoors to secure remote Crackers typically use backdoors to secure remote access to a computer, while attempting to remain access to a computer, while attempting to remain hidden from casual inspection.
Language:English
Score: 1436039.55
-
https://www.itu.int/ITU-D/cyb/...modern-trends-sofia-oct-08.pdf
Data Source: un
Image
Bust of the Lan-t'-i…
1973
Roger, Dominique
Image
Vase, Chang period (…
1973
Roger, Dominique
Image
Detail of a vase, Ch…
1973
Roger, Dominique
Image
Door handle, period …
1973
Roger, Dominique
Image
Seated woman, T'Sin …
1973
Roger, Dominique
Image
Seated woman, T'Sin …
1973
Roger, Dominique
Image
Nephrite shroud - Ha…
1973
Roger, Dominique
Image
Nephrite shroud, Han…
1973
Roger, Dominique
Image
Nephrite shroud, Han…
1973
Roger, Dominique
Image
Hitched chariot, lat…
1973
Roger, Dominique
Image
Flying horse, later …
1973
Roger, Dominique
Image
Women's orchestra, S…
1973
Roger, Dominique
Image
Statuette of musicia…
1973
Roger, Dominique
Image
Statuette of a horse…
1973
Roger, Dominique
Image
Public transportatio…
1973
Roger, Dominique
Image
Traffic in Indonesia…
1973
Roger, Dominique
Image
Rick-shaws in Indone…
1973
Roger, Dominique
Image
Public transportatio…
1973
Roger, Dominique
Image
Bus transportation i…
1973
Roger, Dominique
Image
Man washing earthen…
1973
Roger, Dominique
Image
man on the water tra…
1973
Roger, Dominique
Image
Activities in Hong-K…
1973
Roger, Dominique
Image
Agricultural class, …
1973
Roger, Dominique
Image
Rice growing, inform…
1973
Roger, Dominique
Image
Bas-relief on a wall…
1973
Roger, Dominique
Image
_LOST_DATA_
1973
Roger, Dominique
Image
View of everyday lif…
1973
Roger, Dominique
Image
Children playing in …
1973
Roger, Dominique
Image
Vegetable fields, fa…
1973
Roger, Dominique
Image
Agricultural class i…
1973
Roger, Dominique
Image
Agricultural class i…
1973
Roger, Dominique
Image
Agricultural class i…
1973
Roger, Dominique
Image
Agriculture field, p…
1973
Roger, Dominique
Image
Rice growing
1973
Roger, Dominique
Image
Rice growing
1973
Roger, Dominique
Image
Rice growing
1973
Roger, Dominique
Image
Rice growing
1973
Roger, Dominique
Image
Rice growing
1973
Roger, Dominique
Image
Portrait of man with…
1973
Roger, Dominique
Image
Population, family p…
1973
Roger, Dominique
Image
Population, family p…
1973
Roger, Dominique
Image
Population, birth co…
1973
Roger, Dominique
Image
Indonesia, teenagers…
1973
Roger, Dominique
Image
Population, medical …
1973
Roger, Dominique
Image
Unions meeting
1973
Roger, Dominique
Image
Typical market, woma…
1973
Roger, Dominique
Image
Young Chinese childr…
1973
Roger, Dominique
Image
Traditional religiou…
1973
Roger, Dominique
Image
Artistic Education, …
1973
Roger, Dominique
Image
Artistic Education. …
1973
Roger, Dominique
Image
Higher Education, Ja…
1973
Roger, Dominique
Image
Professional trainin…
1973
Roger, Dominique
Image
Professional trainin…
1973
Roger, Dominique
Image
Professional trainin…
1973
Roger, Dominique
Image
Professional trainin…
1973
Roger, Dominique
Image
Professional trainin…
1973
Roger, Dominique
Image
Professional trainin…
1973
Roger, Dominique
Image
Professional trainin…
1973
Roger, Dominique
Image
Professional trainin…
1973
Roger, Dominique
Image
Professional trainin…
1973
Roger, Dominique
Image
Stupas around the ci…
1973
Roger, Dominique
Image
Stupas around the ci…
1973
Roger, Dominique
Image
Town planning, build…
1973
Roger, Dominique
Image
Town planning, citie…
1973
Roger, Dominique
Image
Town planning, citie…
1973
Roger, Dominique
Image
Town planning, citie…
1973
Roger, Dominique
Image
Physical culture, pu…
1973
Roger, Dominique
Image
Primary education, c…
1973
Roger, Dominique
Image
Relief on a buddhist…
1973
Roger, Dominique
Image
Two statues of a bud…
1973
Roger, Dominique
Image
Arid regions, drough…
1973
Roger, Dominique
Image
Arid regions, drough…
1973
Roger, Dominique
Image
Arid regions, drough…
1973
Roger, Dominique
This list was generated on Mon Feb 7 13:23:01 2022 CET .
Language:English
Score: 1419305.5
-
https://en.unesco.org/mediabank/view/date/1973.html
Data Source: un
REPORT OF THE AD HOC WORKING GROUP ON DRAUGHT ANIMAL POWER
For logging, developed countries use horses and Latin American countries cattle.
11. (...) In the developed countries the farmers knew the importance of enere;y, and
draught horses were developed at enormous effort and expense. Even today the
best draught horses are still working in parts of the western world, at a cost
cheaper than current rates of energy.
Language:English
Score: 1373110.4
-
https://daccess-ods.un.org/acc...pen&DS=A/CONF.100/PC/39&Lang=E
Data Source: ods
We don’t need no stinkin badges
Proving you’re you and I’m me
• The X.509 Public-key certificate securely associates — the distinguished name of an entity; and, — the public key of that entity
• The entity has a private key that is securely associated with the public key
• There are functions, typically calling signing, that proves that the entity knows the private key
• One trusts the association of the public key and the name because the certificate is signed by a trusted entity, the Certification Authority (CA)
• One trusts the CA because…well, it’s turtles all the way up
All these names are me
• Certificate can hold one or more names in different name syntaxes — RFC 822 email name — DNS name — X400 name — EDI party name — URI, universal resource identifier — IP address — Registered name, OID
• All the alternate names will be securely associated with one entity
You can add stuff
• X.509 (and the directory protocols also) are extensible • Anyone can add a new extension to a certificate for a new function
— ITU and ISO/IEC extends the certificate by adding new extensions — The IETF has defined extensions
• Relying parties are required to ignore fields they don’t recognize
Unless that extension is marked critical
The standards work
• ITU Rec. X.509 and ISO/IEC 9594-8 first published in 1988 — Fifth edition in 2005; sixth edition coming in 2009 — X.509 specifies public-key certificate and attribute certificate — The X.500 series defines the directory and name structure — Naming & addressing, and Registration authorities are standardized
• ISO/IEC 9834 and ITU X.660 series of Recommendations
• The IETF is a significant contributer — PKIX implementor profile — Additional extensions in the certificate — Protocols to distribute, validate, and determine the status — LDAP directory
Using a certificate — SSL (PG-13)
a modern browser
a modern server
3) browser validates server’s certificate and determines if communicating with correct server
1) browser creates random value and sends to server along with supported cipher methods
2) server creates random value and sends it, its public key certificate(s), and selected cipher method to the browser
Using a certificate — SSL (PG-13)
a modern browser
a modern server
4) browser generates a random value and encrypts it using the server’s public key
6) server uses its private key to decrypt the received value
5) browser sends that encrypted value to server
7) browser and server use that shared secret value and the two publicly exchanged random values to create shared secret values for encryption and integrity
Using a certificate — SSL (PG-13)
a modern browser
a modern server
9) server sends MAC of messages (1, 2, & 5) to browser
8) browser sends MAC of messages (1, 2, & 5) to server
Using a certificate — SSL (PG-13)
a modern browser
a modern server
10) a secure pipe is established
Hoyt L Kesterson II
The lawyers are interested
• Lawyers care about identity • Signing ceremonies authenticate
identities
• Dispute resolution typically requires validated information, including authenticated identification of parties
• Lawyers don’t like ephemeral or ambiguous names
• They can work with descriptive name forms, the John Smith who is not a horse thief
The lawyers have been doing things
• US, Canadian, and EU legal experts worked with Directory and PKI experts
• In the US the American Bar Association produced the Digital Signature Guidelines and the PKI Assessment Guidelines
• Most countries have passed electronic signature laws and regulations
• ABA recently worked with browser implementors to “fix” the issuing of certificates — Browsers downplayed the need to
validate the identity of the web site
— Users clicked through frequent and obscure certificate warnings
Because “they” didn’t get it right the first time
• CAs did not perform due diligence checks on names • Phishing emails lead to spoofed sites and fraud • For extended validation the CAs will do the work they should have
been doing before issuing SSL certificates, e.g. is the organization registered with the Secretary of State’s office
• Browsers will signal the presence of “more trusted” certificates
One of your goals should be to
ensure “they” get it right the first time
Thank you.
Language:English
Score: 1289529.1
-
https://www.itu.int/dms_pub/it.../15/04/T15040000110001PDFE.pdf
Data Source: un
A phantom mare is an object constructed to mimic the size and shape of a real horse. For rabbits, the teaser is typically a female and the AV is affixed at the vulva.
(...) The basic bovine IVF procedures are being fine-tuned for embryo production from buffalo oocytes.
tUGA in the horse. The horse has presented a unique problem for researchers work- ing on assisted reproductive technology. (...) Also, for some as yet unknown reason, typical IVF procedures have not worked consistently in the horse.
Language:English
Score: 1282694.5
-
https://www.fao.org/3/i3017e/i3017e05.pdf
Data Source: un
Now that we have learnt more about the Great Silk Roads , let’s take a look at the Southern Silk Roads…
The “Silk Roads” are often perceived as expansive caravan routes travelled by camels and horses. The routes are thought to have crossed Northern China and Central Asia to the Iranian plateau, India, southern Russia and the Near East.
(...) There was a rising demand for exotic, prestigious and decorative items originating from sophisticated populations of the Mediterranean basin, India, and China. Exotic products typically included spices, and the term, the “Indinization of Southeast Asia”, is rooted in the spice trade.
Language:English
Score: 1256967.2
-
https://en.unesco.org/silkroad...d-you-know-southern-silk-roads
Data Source: un
BIOTECHNOLOGY : AN OVERVIEW OF TECHNIQUES, RESEARCH AND APPLICATIONS / UNITED STATES
In the pre-antibio de era, horse sera of various types were used for the treatment
of pneumonia, diphtheria, tetanus and other serious infectious diseases. From
patients ill with infection, bacteria were isolated, taken to the hospital laboratory
and tested against a large panel of the horse sera available in the laboratory
refrigerator. (...) Patients often had
allergic reactions to the horse serum itself, or had infections for which no horse
antibody could be found.
Language:English
Score: 1256429.3
-
https://daccess-ods.un.org/acc...BWC/CONF.III/VEREX/WP.7&Lang=E
Data Source: ods
Horses | Livestock Systems | Food and Agriculture Organization of the United Nations
FAO.org
العربية
中文
english
français
Русский
Español
Livestock Systems
Global distributions
Production systems
Resources
Buffaloes
Cattle
Chickens
Ducks
Horses
Goats
Pigs
Sheep
Horses
The horse ( Equus ferus caballus ) was domesticated in the Eurasian steppes around 4,000 BC. In early times the horse was an essential form of land transport and traction but also provided meat, hair and leather. They quickly found their use in military operations and were the principle vehicle of warfare up until the end o f the Great War. Horses still fulfill these traditional roles in many parts of South America, Asia, Africa and Eastern Europe.
Language:English
Score: 1242118.5
-
https://www.fao.org/livestock-...lobal-distributions/horses/en/
Data Source: un