Slow Technology is Inefficient but Resilient
نویسنده
چکیده
This paper presents ChronoTape, a tangible timeline for family history, as an example of ‘slow technology’. We discuss how the experience of using ChronoTape has led us to believe that successful slow technology is designed to be inefficient but resilient. Author
منابع مشابه
A new security proof for FMNV continuous non-malleable encoding scheme
A non-malleable code is a variant of an encoding scheme which is resilient to tampering attacks. The main idea behind non-malleable coding is that the adversary should not be able to obtain any valuable information about the message. Non-malleable codes are used in tamper-resilient cryptography and protecting memories against tampering attacks. Many different types of non-malleability have alre...
متن کاملA joint pricing-network design model for a resilient closed-loop supply chain under quantity discount
In this paper, a novel resilient multi-echelon closed-loop location-allocation-inventory problem (RMCLIP) is addressed that optimizes strategic and tactical decisions simultaneously. In order to represent the purchasing cost of raw material from the supplier, a pricing model under quantity discounts is employed in the closed-loop supply chain (CLSC). Considering the capability of returning the ...
متن کاملElimination of Waste and Inefficient Facilities in Existing Buildings for Sustainability in Developing Nations
A major reason why many developing nations have not made significant advancement in sustainable development (SD) agenda is the neglect of existing building stock which forms the bulk of built assets. Although sustainable development is a universal challenge, it cannot be approached in the same way for all nations, but rather practical response can be defined nationally or locally. This paper re...
متن کاملA Network Design Model for a Resilient Closed-Loop Supply Chain with Lateral Transshipment
This paper develops a model for the closed-loop supply chain network design with disruption risk. By considering supply disruption, two factors including extra inventory and lateral transshipment are used as resilience strategies. The main purpose is to reduce the supply chain costs due to the location decisions, quantity of products between different levels and lost sale. Disruption in a suppl...
متن کاملResilient Configuration of Distribution System versus False Data Injection Attacks Against State Estimation
State estimation is used in power systems to estimate grid variables based on meter measurements. Unfortunately, power grids are vulnerable to cyber-attacks. Reducing cyber-attacks against state estimation is necessary to ensure power system safe and reliable operation. False data injection (FDI) is a type of cyber-attack that tampers with measurements. This paper proposes network reconfigurati...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012