Managing Online Computer Labs

Author(s):  
Lee Chao

To keep an online computer lab fully operational is critical to the success of teaching online technology-based courses. Unlike a general purpose computer lab where heavy security measures are used to prevent users from damaging computer systems and network equipments, an online computer lab for teaching a technology-based course must release some of the security measures so that students can practice and perform an administrator’s duty. That is, students and faculty members must be given the administrator’s privilege to the computers and network equipments dedicated to them. For many students, this is the first time that they are the administrators of network servers. You can expect that there will be many unintentional mistakes while performing the administrator’s duty. Students will need help from the lab management team or the technical support personnel in the team to fix their problems and keep the hands-on process going. Some severe mistakes may cause a system to shut down and unable to be rebooted. In such a case, the lab management team will need to help the students to reinstall the entire system. Once upgrades to the operating system and application software are available, the lab management team will also need to install these upgrades in the lab. The content of a technology-based course will follow the change of technology on the market. Often, instructors will update the course content for each semester. These updates need to be done by the lab management team before a semester starts. Technical training is another task that will be carried out by the lab management team. Security related issues are also important matter should be dealt with by the lab management team. As we can see, the online computer lab maintenance tasks will keep the lab management team busy all year round. Since the security issues have been covered in a separate chapter, this chapter will focus on the maintenance tasks other than the security related tasks.

2020 ◽  
Author(s):  
Cátia Santos-Pereira

BACKGROUND GDPR was scheduled to be formally adopted in 2016 with EU member states being given two years to implement it (May 2018). Given the sensitive nature of the personal data that healthcare organization process on a 24/7 basis, it is critical that the protection of that data in a hospital environment is given the high priority that data protection legislation (GDPR) requires. OBJECTIVE This study addresses the state of Public Portuguese hospitals regarding GDPR compliance in the moment of GDPR preparation period (2016-2018) before the enforcement in 25 May 2018, and what activities have started since then. The study focuses in three GDPR articles namely 5, 25 and 32, concerning authentication security, identity management processes and audit trail themes. METHODS The study was conducted between 2017 and 2019 in five Portuguese Public Hospitals (each different in complexity). In each hospital, six categories of information systems critical to health institutions were included in the study, trying to cover the main health information systems available and common to hospitals (ADT, EPR, PMS, RIS, LIS and DSS). It was conducted interviews in two phases (before and after GDPR enforcement) with the objective to identify the maturity of information systems of each hospital regarding authentication security, identity management processes and traceability and efforts in progress to avoid security issues. RESULTS A total of 5 hospitals were included in this study and the results of this study highlight the hospitals privacy maturity, in general, the hospitals studied where very far from complying with the security measures selected (before May 2018). Session account lock and password history policy were the poorest issues, and, on the other hand, store encrypted passwords was the best issue. With the enforcement of GDPR these hospitals started a set of initiatives to fill this gap, this is made specifically for means of making the whole process as transparent and trustworthy as possible and trying to avoid the huge fines. CONCLUSIONS We are still very far from having GDPR compliant systems and Institutions efforts are being done. The first step to align an organization with GDPR should be an initial audit of all system. This work collaborates with the initial security audit of the hospitals that belong to this study.


Author(s):  
D. Z. Wang ◽  
D. L. Taylor

Abstract This paper describes an analytical approach for calculating the damped critical speeds of multi-degree-of-freedom rotor-bearing systems. It is shown that to calculate the critical speeds is equivalent to finding the roots of a proposed matrix algebraic equation. The technique employes a Newton-Raphson scheme and the derivatives of eigenvalues. The system left eigenvectors are used to simplify the calculations. Based on this approach, a general-purpose computer program was developed with a finite element model of rotor-bearing systems. The program automatically generates system equations and finds the critical speeds. The program is applied to analyze a turbomachine supported by two cylindrical oil-film Journal bearings. The results are compared with reported data and the agreements are very good.


2020 ◽  
Vol 2 (2) ◽  
pp. 72
Author(s):  
ATIK MAFTUHAH

<p><strong><em>Introduction</em></strong><em>: </em><em>Learning clinical skills in the skills lab gives students the opportunity to learn and practice their clinical skills before examining directly to patients. However, the skills lab itself has many components that require good management and leadership to avoid obstacles or problems in the implementation of learning.</em></p><p><strong><em>Method</em></strong><em>: Literature review conducted through google and google scholar search engines with the keywords “leadership”, “management”, “team”, and “skills lab” from 1985-2015.</em><em></em></p><p><strong><em>Result</em></strong><em>: </em><em>There are several concepts from literature study that can be applied to overcome managerial problems in the skills lab. An effective leader / manager profile according to Quinn (Quinn’s eight roles) is needed in leading the skills lab because the head of the skills lab as the first line manager is responsible for managerial problems in the skills lab. In addition, management and leadership in the skills lab is also very necessary to produce an effective and efficient team so that the performance and contribution of the management team is effective. By understanding the Belbin Team Roles, the concept can be adapted in managing the skills lab management by synergizing the roles among the members of the skills lab management team. Within this concept, there are eight aspects of roles in a good management team.</em></p><p><strong><em>Conclusion</em></strong><em>: </em><em>Given the complexity in the skills lab, managerial problems can arise that can result in the preparation of modules, equipment, facilities, etc. being unprepared. Managerial problem solving in the skills lab can be solved by applying the manager's roles and functions, Quinn's eight roles and the Belbin team roles.</em></p><p><strong>Pendahuluan</strong>: Pembelajaran keterampilan klinis di <em>skills lab</em> memberikan kesempatan mahasiswa untuk belajar dan mempraktikkan keterampilan klinis mahasiswa sebelum terjun ke pasien langsung. Namun, <em>skills lab</em> sendiri memiliki komponen yang banyak sehingga memerlukan manajemen dan <em>leadership</em> yang baik supaya tidak terjadi kendala atau permasalahan dalam pelaksanaan pembelajaran.</p><p><strong>Metode</strong>: <em>Literature review</em> yang dilakukan melalui <em>search engine google </em>dan <em>google scholar</em> dengan kata kunci “<em>leadership”, “management”, “team”, </em>dan<em> “skills lab”</em> dari tahun 1985-2015.</p><p><strong>Hasil</strong>: Ada beberapa konsep dari studi literatur terpilih yang dapat diaplikasikan untuk mengatasi permasalahan manajerial di<em> skills lab. </em>Profil pemimpin/manajer yang efektif menurut Quinn (<em>Quinn’s eight roles</em><em>)</em> sangat diperlukan dalam memimpin <em>skills lab</em> karena kepala bagian <em>skills lab</em> sebagai manajer lini pertama bertanggung jawab terhadap permasalahan manajerial di <em>skills lab</em>. Selain itu, manajemen dan<em> leadership </em>di <em>skills lab </em>juga<em> </em>sangat diperlukan untuk menghasilkan tim yang efektif dan efisien sehingga kinerja dan kontribusi tim pengelola menjadi efektif. Dengan memahami <em>the </em><em>Belbin Team Role</em><em>s</em>, maka konsep tersebut dapat diadaptasi dalam pengelolaan manajemen <em>skills lab</em> dengan melakukan sinergi peran diantara anggota tim pengelola <em>skills lab</em>. Dalam konsep tersebut, terdapat delapan aspek peran dalam sebuah tim manajemen yang bagus.</p><p><strong>Kesimpulan</strong>: Dengan adanya kompleksitas di <em>skills lab</em>, maka dapat timbul permasalahan manajerial seperti kurang siapnya modul, peralatan, fasilitas, dan lainnya. Penyelesaian permasalahan manajerial di <em>skills lab</em> dapat ditinjau dari aplikasi peran dan fungsi manajer, <em>Quinn’s eight roles</em> dan <em>t</em><em>he Belbin </em><em>t</em><em>eam </em><em>r</em><em>ol</em>es.</p>


2021 ◽  
Author(s):  
Abdolkarim Hajfarajollah Dabbagh

"Due to the lack of a centralized server in “Peer-to-Peer” (P2P) networks, users are responsible for the security of these networks. One of the security issues in P2P networks is the security of the message routing. Messages could be altered or modified by attackers while being routed. The conventional security method to avoid this has been “Public Key Cryptography” (PKC). To avoid the certificate management issue in PKC, “Identity-based Encryption” (IBE) has been suggested in which any arbitrary string could be used as a public key. Since IBE is a computationally expensive method, current proposed IBE-based methods are not effective in the message routing phase in P2P networks and highly affect the performance of message delivery time in these networks. This thesis proposes two IBE-based protocols that can be applied effectively to the message routing phase of structured P2P networks, yet provide a satisfactory message delivery time performance. Both protocols benefit from Identity-based key exchange scheme and, therefore, none of them impose any extra communication on the network to secure message routing. Protocol 1 significantly improves the performance of message delivery time compared to the current IBE-based proposed methods. Protocol 2, which requires nodes to store data, has a performance similar to the situations in which no security measures are applied for message routing."


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Mary Subaja Christo ◽  
V. Elizabeth Jesi ◽  
Uma Priyadarsini ◽  
V. Anbarasu ◽  
Hridya Venugopal ◽  
...  

Hospital data management is one of the functional parts of operations to store and access healthcare data. Nowadays, protecting these from hacking is one of the most difficult tasks in the healthcare system. As the user’s data collected in the field of healthcare is very sensitive, adequate security measures have to be taken in this field to protect the networks. To maintain security, an effective encryption technology must be utilised. This paper focuses on implementing the elliptic curve cryptography (ECC) technique, a lightweight authentication approach to share the data effectively. Many researches are in place to share the data wirelessly, among which this work uses Electronic Medical Card (EMC) to store the healthcare data. The work discusses two important data security issues: data authentication and data confidentiality. To ensure data authentication, the proposed system employs a secure mechanism to encrypt and decrypt the data with a 512-bit key. Data confidentiality is ensured by using the Blockchain ledger technique which allows ethical users to access the data. Finally, the encrypted data is stored on the edge device. The edge computing technology is used to store the medical reports within the edge network to access the data in a very fast manner. An authenticated user can decrypt the data and process the data at optimum speed. After processing, the updated data is stored in the Blockchain and in the cloud server. This proposed method ensures secure maintenance and efficient retrieval of medical data and reports.


Sign in / Sign up

Export Citation Format

Share Document