Home

Results 1 - 10 of 39,657 for typical horse. Search took 2.211 seconds.  
Sort by date/Sort by relevance
For example, two samite fragments, one featuring a winged horse design and another depicting an ibex, a type of wild goat native to Eurasia, were uncovered at a site in Antinopolis, a Greco-Roman, and later Byzantine, city founded in Egypt in 130 BCE and abandoned in the 10th century CE. Here, the winged horses and ibexes are depicted wearing pearl necklaces and floating ribbons, symbols of the Sasanians (224 -651 CE) of the Iranian Plateau. (...) A similar Sasanian influenced roundel design to the Antinopolis samite © Metropolitan Museum of Art Roundel with winged horse, 9th CE. Similar in design to the winged horse samite found in Antinopolis Previous Next See Also Cross-Cultural Influences Reflected in a Bactrian Ewer Depicting Scenes from Ancient Greek Mythology Sometimes practical and sometimes a piece of decorative art, ewers are tall thin vessels with a wide base, spout, and handle that have been uncovered from numerous archaeological sites from along the lengths of the Silk Roads.
Language:English
Score: 1610894 - https://en.unesco.org/silkroad...o-roman-city-antinopolis-egypt
Data Source: un
In some regions such differences are particularly marked in barrows from the Late Bronze Age, which contained basic types of arms, horse-harness fittings and artefacts typical of the time. (...) The large quantity of horses’ bones inevitably brings to mind Herodotus’ observation that the only god the Massagetae worshipped was the sun, to which they sacrificed horses (1.216). (...) Tacitus (VI.37) also noted the ideological significance of the horse image in speak- ing of the sacrificial slaughter of horses as a Parthian custom; so did Philostratus, who observed that the Parthian king Vardanes sacrificed a white horse of the best Nisa breed.
Language:English
Score: 1569265.6 - https://en.unesco.org/silkroad...20western%20central%20asia.pdf
Data Source: un
DSc Eugene Nickolov 39 3. TROJAN HORSES, ROOTKITS, 3. TROJAN HORSES, ROOTKITS,  AND BACKDOORS.AND BACKDOORS. 0202 3.1 TROJAN3.1 TROJAN HORSES. (...) This is the technique of the Trojan horse or does. This is the technique of the Trojan horse or trojantrojan.. 7-9 Oct 2008, Sofia Prof. (...) DSc Eugene Nickolov 45 3. TROJAN HORSES, ROOTKITS, 3. TROJAN HORSES, ROOTKITS,  AND BACKDOORS.AND BACKDOORS. 0202 3.93.9 Crackers typically use backdoors to secure remote Crackers typically use backdoors to secure remote access to a computer, while attempting to remain access to a computer, while attempting to remain hidden from casual inspection.
Language:English
Score: 1436039.55 - https://www.itu.int/ITU-D/cyb/...modern-trends-sofia-oct-08.pdf
Data Source: un
Image Bust of the Lan-t'-i… 1973 Roger, Dominique Image Vase, Chang period (… 1973 Roger, Dominique Image Detail of a vase, Ch… 1973 Roger, Dominique Image Door handle, period … 1973 Roger, Dominique Image Seated woman, T'Sin … 1973 Roger, Dominique Image Seated woman, T'Sin … 1973 Roger, Dominique Image Nephrite shroud - Ha… 1973 Roger, Dominique Image Nephrite shroud, Han… 1973 Roger, Dominique Image Nephrite shroud, Han… 1973 Roger, Dominique Image Hitched chariot, lat… 1973 Roger, Dominique Image Flying horse, later … 1973 Roger, Dominique Image Women's orchestra, S… 1973 Roger, Dominique Image Statuette of musicia… 1973 Roger, Dominique Image Statuette of a horse… 1973 Roger, Dominique Image Public transportatio… 1973 Roger, Dominique Image Traffic in Indonesia… 1973 Roger, Dominique Image Rick-shaws in Indone… 1973 Roger, Dominique Image Public transportatio… 1973 Roger, Dominique Image Bus transportation i… 1973 Roger, Dominique Image Man washing earthen… 1973 Roger, Dominique Image man on the water tra… 1973 Roger, Dominique Image Activities in Hong-K… 1973 Roger, Dominique Image Agricultural class, … 1973 Roger, Dominique Image Rice growing, inform… 1973 Roger, Dominique Image Bas-relief on a wall… 1973 Roger, Dominique Image _LOST_DATA_ 1973 Roger, Dominique Image View of everyday lif… 1973 Roger, Dominique Image Children playing in … 1973 Roger, Dominique Image Vegetable fields, fa… 1973 Roger, Dominique Image Agricultural class i… 1973 Roger, Dominique Image Agricultural class i… 1973 Roger, Dominique Image Agricultural class i… 1973 Roger, Dominique Image Agriculture field, p… 1973 Roger, Dominique Image Rice growing 1973 Roger, Dominique Image Rice growing 1973 Roger, Dominique Image Rice growing 1973 Roger, Dominique Image Rice growing 1973 Roger, Dominique Image Rice growing 1973 Roger, Dominique Image Portrait of man with… 1973 Roger, Dominique Image Population, family p… 1973 Roger, Dominique Image Population, family p… 1973 Roger, Dominique Image Population, birth co… 1973 Roger, Dominique Image Indonesia, teenagers… 1973 Roger, Dominique Image Population, medical … 1973 Roger, Dominique Image Unions meeting 1973 Roger, Dominique Image Typical market, woma… 1973 Roger, Dominique Image Young Chinese childr… 1973 Roger, Dominique Image Traditional religiou… 1973 Roger, Dominique Image Artistic Education, … 1973 Roger, Dominique Image Artistic Education. … 1973 Roger, Dominique Image Higher Education, Ja… 1973 Roger, Dominique Image Professional trainin… 1973 Roger, Dominique Image Professional trainin… 1973 Roger, Dominique Image Professional trainin… 1973 Roger, Dominique Image Professional trainin… 1973 Roger, Dominique Image Professional trainin… 1973 Roger, Dominique Image Professional trainin… 1973 Roger, Dominique Image Professional trainin… 1973 Roger, Dominique Image Professional trainin… 1973 Roger, Dominique Image Professional trainin… 1973 Roger, Dominique Image Stupas around the ci… 1973 Roger, Dominique Image Stupas around the ci… 1973 Roger, Dominique Image Town planning, build… 1973 Roger, Dominique Image Town planning, citie… 1973 Roger, Dominique Image Town planning, citie… 1973 Roger, Dominique Image Town planning, citie… 1973 Roger, Dominique Image Physical culture, pu… 1973 Roger, Dominique Image Primary education, c… 1973 Roger, Dominique Image Relief on a buddhist… 1973 Roger, Dominique Image Two statues of a bud… 1973 Roger, Dominique Image Arid regions, drough… 1973 Roger, Dominique Image Arid regions, drough… 1973 Roger, Dominique Image Arid regions, drough… 1973 Roger, Dominique This list was generated on Mon Feb 7 13:23:01 2022 CET .
Language:English
Score: 1419305.5 - https://en.unesco.org/mediabank/view/date/1973.html
Data Source: un
REPORT OF THE AD HOC WORKING GROUP ON DRAUGHT ANIMAL POWER
For logging, developed countries use horses and Latin American countries cattle. 11. (...) In the developed countries the farmers knew the importance of enere;y, and draught horses were developed at enormous effort and expense. Even today the best draught horses are still working in parts of the western world, at a cost cheaper than current rates of energy.
Language:English
Score: 1373110.4 - https://daccess-ods.un.org/acc...pen&DS=A/CONF.100/PC/39&Lang=E
Data Source: ods
We don’t need no stinkin badges Proving you’re you and I’m me • The X.509 Public-key certificate securely associates — the distinguished name of an entity; and, — the public key of that entity • The entity has a private key that is securely associated with the public key • There are functions, typically calling signing, that proves that the entity knows the private key • One trusts the association of the public key and the name because the certificate is signed by a trusted entity, the Certification Authority (CA) • One trusts the CA because…well, it’s turtles all the way up All these names are me • Certificate can hold one or more names in different name syntaxes — RFC 822 email name — DNS name — X400 name — EDI party name — URI, universal resource identifier — IP address — Registered name, OID • All the alternate names will be securely associated with one entity You can add stuff • X.509 (and the directory protocols also) are extensible • Anyone can add a new extension to a certificate for a new function — ITU and ISO/IEC extends the certificate by adding new extensions — The IETF has defined extensions • Relying parties are required to ignore fields they don’t recognize Unless that extension is marked critical The standards work • ITU Rec. X.509 and ISO/IEC 9594-8 first published in 1988 — Fifth edition in 2005; sixth edition coming in 2009 — X.509 specifies public-key certificate and attribute certificate — The X.500 series defines the directory and name structure — Naming & addressing, and Registration authorities are standardized • ISO/IEC 9834 and ITU X.660 series of Recommendations • The IETF is a significant contributer — PKIX implementor profile — Additional extensions in the certificate — Protocols to distribute, validate, and determine the status — LDAP directory Using a certificate — SSL (PG-13) a modern browser a modern server 3) browser validates server’s certificate and determines if communicating with correct server 1) browser creates random value and sends to server along with supported cipher methods 2) server creates random value and sends it, its public key certificate(s), and selected cipher method to the browser Using a certificate — SSL (PG-13) a modern browser a modern server 4) browser generates a random value and encrypts it using the server’s public key 6) server uses its private key to decrypt the received value 5) browser sends that encrypted value to server 7) browser and server use that shared secret value and the two publicly exchanged random values to create shared secret values for encryption and integrity Using a certificate — SSL (PG-13) a modern browser a modern server 9) server sends MAC of messages (1, 2, & 5) to browser 8) browser sends MAC of messages (1, 2, & 5) to server Using a certificate — SSL (PG-13) a modern browser a modern server 10) a secure pipe is established Hoyt L Kesterson II The lawyers are interested • Lawyers care about identity • Signing ceremonies authenticate identities • Dispute resolution typically requires validated information, including authenticated identification of parties • Lawyers don’t like ephemeral or ambiguous names • They can work with descriptive name forms, the John Smith who is not a horse thief The lawyers have been doing things • US, Canadian, and EU legal experts worked with Directory and PKI experts • In the US the American Bar Association produced the Digital Signature Guidelines and the PKI Assessment Guidelines • Most countries have passed electronic signature laws and regulations • ABA recently worked with browser implementors to “fix” the issuing of certificates — Browsers downplayed the need to validate the identity of the web site — Users clicked through frequent and obscure certificate warnings Because “they” didn’t get it right the first time • CAs did not perform due diligence checks on names • Phishing emails lead to spoofed sites and fraud • For extended validation the CAs will do the work they should have been doing before issuing SSL certificates, e.g. is the organization registered with the Secretary of State’s office • Browsers will signal the presence of “more trusted” certificates One of your goals should be to ensure “they” get it right the first time Thank you.
Language:English
Score: 1289529.1 - https://www.itu.int/dms_pub/it.../15/04/T15040000110001PDFE.pdf
Data Source: un
A phantom mare is an object constructed to mimic the size and shape of a real horse. For rabbits, the teaser is typically a female and the AV is affixed at the vulva. (...) The basic bovine IVF procedures are being fine-tuned for embryo production from buffalo oocytes. tUGA in the horse. The horse has presented a unique problem for researchers work- ing on assisted reproductive technology. (...) Also, for some as yet unknown reason, typical IVF procedures have not worked consistently in the horse.
Language:English
Score: 1282694.5 - https://www.fao.org/3/i3017e/i3017e05.pdf
Data Source: un
Now that we have learnt more about the Great Silk Roads , let’s take a look at the Southern Silk Roads… The “Silk Roads” are often perceived as expansive caravan routes travelled by camels and horses. The routes are thought to have crossed Northern China and Central Asia to the Iranian plateau, India, southern Russia and the Near East. (...) There was a rising demand for exotic, prestigious and decorative items originating from sophisticated populations of the Mediterranean basin, India, and China. Exotic products typically included spices, and the term, the “Indinization of Southeast Asia”, is rooted in the spice trade.
Language:English
Score: 1256967.2 - https://en.unesco.org/silkroad...d-you-know-southern-silk-roads
Data Source: un
BIOTECHNOLOGY : AN OVERVIEW OF TECHNIQUES, RESEARCH AND APPLICATIONS / UNITED STATES
In the pre-antibio de era, horse sera of various types were used for the treatment of pneumonia, diphtheria, tetanus and other serious infectious diseases. From patients ill with infection, bacteria were isolated, taken to the hospital laboratory and tested against a large panel of the horse sera available in the laboratory refrigerator. (...) Patients often had allergic reactions to the horse serum itself, or had infections for which no horse antibody could be found.
Language:English
Score: 1256429.3 - https://daccess-ods.un.org/acc...BWC/CONF.III/VEREX/WP.7&Lang=E
Data Source: ods
Horses | Livestock Systems | Food and Agriculture Organization of the United Nations FAO.org العربية 中文 english français Русский Español Livestock Systems Global distributions Production systems Resources Buffaloes Cattle Chickens Ducks Horses Goats Pigs Sheep Horses The horse ( Equus ferus caballus ) was domesticated in the Eurasian steppes around 4,000 BC. In early times the horse was an essential form of land transport and traction but also provided meat, hair and leather. They quickly found their use in military operations and were the principle vehicle of warfare up until the end o f the Great War. Horses still fulfill these traditional roles in many parts of South America, Asia, Africa and Eastern Europe.
Language:English
Score: 1242118.5 - https://www.fao.org/livestock-...lobal-distributions/horses/en/
Data Source: un