text
stringlengths 6
1.88M
| source
stringclasses 13
values |
---|---|
double image backup double image backup software runs windows laptops workstations windows servers double image first released march 1994 since followed major releases double image 7.0 released january 12 2011 become compatible windows 7 windows vista windows server 2008 operating systems double image 7.0.58 released march 15 2018 included compatibility windows 10 windows 8 windows server 2016 windows server 2012 added options file synchronization using 'major delete feature double image code installation package code sign certified using sha-2 current release double image 7.0.61 released august 26 2018 features systems supported remain previous versions release several bug fixes including dealing windows 10 registry restore
|
Computer security
|
implicit authentication implicit authentication ia technique allows smart device recognize owner acquainted his/her behaviors technique uses machine learning algorithms learn user behavior various sensors smart devices achieve user identification current authentication techniques e.g. password pattern lock finger print iris recognition explicit authentication require user input comparing explicit authentication ia transparent users usage significantly increases usability reducing time users spending login users find annoying lack cellular coverage implicit authentication ia user behaviors raw data captured various sensors embedded smart device stored database preparing processing filtering noise selecting suitable features data sent machine learning tool train return fine-tuned model back smart device smart device uses model signature identify current user due battery computation limitation smart device training phase computations carried usually implemented remote server lightweight algorithms e.g. kl divergence implemented local device parts real-time authentication units control lock mechanism device developing ia model largely depends operating systems usually adopt android ios two different approaches establish ia model device-centric application-centric device-centric approaches traditional way establish ia model leverage information gathered operating system various sensors ia model directly running operating system application-centric approaches however achieve ia establishing individual framework app executes independently sandbox preserves intrinsic structure operating system simplifies ia developing 1977 wood indicated two types bio-metric authentication approaches physiological behavioral bio-metrics second approach related user gait location information keystroke patterns utilization bio-metrics user authentication developed field location-based access control notably keystroke dynamics typing pattern 2010 shi et al migrated bio-metrics authentication approach mobile device contained many sensors significantly increased accuracy authentication called new approach implicit authentication due fast growth smart technology smart device became sophisticated computational power grew year provided foundation ia achieve high accurate user-friendly authentication current ia approaches mainly focused touch sensor gps accelerometer corresponding techniques svm knn gmm topic model
|
Computer security
|
slurm workload manager slurm workload manager formerly known simple linux utility resource management slurm slurm free open-source job scheduler linux unix-like kernels used many world supercomputers computer clusters provides three key functions slurm workload manager 60 top500 supercomputers slurm uses best fit algorithm based hilbert curve scheduling fat tree network topology order optimize locality task assignments parallel computers slurm began development collaborative effort primarily lawrence livermore national laboratory schedmd linux networx hewlett-packard groupe bull free software resource manager inspired closed source quadrics rms shares similar syntax name reference soda futurama 100 people around world contributed project since evolved sophisticated batch scheduler capable satisfying requirements many large computer centers top500 list powerful computers world indicates slurm workload manager six top ten systems including sunway taihulight 10,649,600 computing cores slurm design modular 100 optional plugins simplest configuration installed configured couple minutes sophisticated configurations provide database integration accounting management resource limits workload prioritization notable slurm features include following following features announced version 14.11 slurm released november 2014 slurm primarily developed work alongside linux distributions although also support posix-based operating systems including bsds freebsd netbsd openbsd slurm also supports several unique computer architectures including slurm available gnu general public license v2 2010 developers slurm founded schedmd maintains canonical source provides development level 3 commercial support training services commercial support also available bright computing bull cray science computing following list useful commands available slurm built ccr allow easier reporting users usage information commands use example use linux command information commands example italicized font commands indicates user supplied information brackets indicate optional flags
|
Distributed computing architecture
|
peripheral interchange program peripheral interchange program pip utility transfer files devices digital equipment corporation computers first implemented pdp-6 architecture harrison dit morse early 1960s subsequently implemented dec operating systems pdp-10 pdp-11 pdp-8 architectures 1970s 1980s digital research implemented pip cp/m mp/m said development named atlatl acronym anything lord anything lord humorously described purpose device-independent file copying tool difficulties time safely copying files devices original pip syntax using left-arrow character ascii-1963 character set flexowriter keyboards time used terminals introduced used later versions ascii without left-arrow character pip allowed syntax underscore character ascii character position left-arrow occupied still supported separate destination source specifications source destination file specification strings consisted device name typically 2 characters device type dk disk lp line printer mt magnetic tape etc unit number 0 7 colon filename extension copying generally permitted file specification made sense late mid 1980s pip still common use tops-10 tops-20 pdp-11 systems gary kildall developed cp/m mp/m based much design file structure command processor operating systems digital equipment rsts/e pdp-11 besides accessing files floppy disk pip command cp/m could also transfer data following special files true device files however handling limited pip two custom devices inp implemented calls fixed locations start pip program intention user oem could patch locations add input output devices 246 bytes free space left program purpose addition usual pip destination=source syntax pip cp/m still allowed old pip destination_source form behaviour documented cp/m generally standard characters could appear file names therefore programs could create filenames containing underscore characters pip could handle
|
Computer file systems
|
newvoicemedia newvoicemedia cloud service company based basingstoke england company contactworld platform uses customer contact technology cloud service connecting customers existing telephone infrastructures using internet pass along previously collected client information agents company works 128 countries numerous large organisations including mobileiron truphone parcelforce canadian cancer society ashley unitt richard pickering founded newvoicemedia 2000 may 2010 newvoicemedia received £4 million us 6.3 million series round funding jonathan gale appointed ceo feb 2011 led company rapid growth series significant fund raising rounds fuelled product development international expansion company received £2.5 million us 4 million august 2011 2013 raised £35.2 million us 55 million via £12.8 million us 20 million round january september raised additional £22.4 million us 35 million 2014 company raised £99 million funding including £32 million us 50 million series e july year march 2015 business insider recognised newvoicemedia one 13 enterprise cloud startups venture capitalist funding 2015 london stock exchange named newvoicemedia one 1,000 companies inspire britain newvoicemedia announced raised additional £21 million us 30 million funding january 2016 several venture capital funds salesforce company total funding reached 141.3 million since inception making one successful startup enterprises uk backed silicon valley investors 2017 newvoicemedia included forbes cloud 100 list positioned 'leader gartner magic quadrant contact centre service western europe january 2018 dennis fois appointed ceo newvoicemedia acquired november 2018 vonage inc us 350 million november 2018
|
Distributed computing architecture
|
freesbie freesbie live cd operating system able load directly bootable cd installation process hard disk based freebsd operating system name pun frisbee currently freesbie uses xfce fluxbox freesbie 1.0 based freebsd 5.2.1 released february 27 2004 first version freesbie 2 developed summer 2005 thanks google summer code freesbie 2.0.1 complete rewrite so-called toolkit based freebsd 6.2 released february 10 2007 according distrowatch freesbie project discontinued goals freesbie project
|
Operating systems
|
kathleen mckeown kathleen mckeown american computer scientist specializing natural language processing currently henry gertrude rothschild professor computer science director institute data sciences engineering columbia university mckeown received b.a brown university 1976 phd computer science 1982 university pennsylvania spent career columbia first woman tenured university school engineering applied science first woman serve chair department computer science 1998 2003 also served vice dean research school engineering applied science held positions president vice president secretary-treasurer association computational linguistics board member secretary board computing research association mckeown research focuses natural language processing included newsblaster multi-document summarization program derive summary news stories contents number news sites years included multilingual news
|
Computational linguistics
|
carlo ghezzi carlo ghezzi professor chair software engineering politecnico di milano italy adjunct professor università della svizzera italiana usi switzerland politecnico rector delegate research department chair head phd program member academic senate board governors politecnico received dr.eng degree electrical engineering politecnico di milano spent professional life assistant associate full professor also taught research institutions university california los angeles usa 1976 university north carolina chapel hill usa 1979–80 università degli studi di padova italy 1980–81 escuela superior latinoamericana de informática argentina 1990 university california santa barbara usa 1991 technical university vienna austria 1996 university klagenfurt austria 1996 ghezzi 1999 acm fellow citation numerous research contributions compiler theory real-time systems software processes strong contributor software engineering community europe worldwide 2006 ieee fellow citation contributions programming languages software engineering 2006 awarded acm sigsoft distinguished service award member regular member program committee important conferences software engineering field international conference software engineering icse foundations software engineering fse conference jointly held conjunction european software engineering conference esec chairing conferences program co-chair icse 1991 program chair esec/fse '99 general chair icse 2000 general co-chair international conference service oriented computing icsoc 2006 keynote speaker several conferences including esec 1993 ieee international conference software maintenance icsm 1997 european joint conference theory practice software etaps 2006 icse 2009 ieee international conference engineering complex computer systems iceccs 2010 ieee international conference software engineering formal methods sefm 2010 international symposium empirical software engineering measurement esem 2010 servicewave servicewave 2010 fundamentals software engineering fsen 2011 editor chief acm transactions software engineering methodology 2001–2006 associate editor ieee transactions software engineering currently associate editor science computer programming elsevier service oriented computing applications springer science+business media software process improvement practice john wiley sons research constantly focused different facets software engineering programming languages currently active area software architectures especially evolvable distributed software architectures ubiquitous pervasive computer applications long-term goal contribute making software dependable basing solid rigorous methodological theoretical foundations ghezzi co-authored 180 papers almost published internationally papers appeared prestigious journals like journal acm information control information computation acm transactions software engineering methodology acm transactions programming languages systems ieee transactions software engineering co-author 8 books including 2008 awarded advanced investigators grant european research council funding smscom project
|
Programming language topics
|
hp-1000/rte hp-1000/rte hp product code 2171a real-time computer system first produced hewlett packard 1966 discontinued november 2000 hp 1000 series runs rte real-time operating system initially technical applications electronic data capture mainly store data captured used also analyse data captured generate graphics reports later operating system used also small commercial applications mainly inside industries small factories hp 9000 systems became able handle real-time processes rte systems declined
|
Operating systems
|
chain loading chain loading method used computer programs replace currently executing program new program using common data area pass information current program new program occurs several areas computing chain loading similar use overlays unlike overlays however chain loading replaces currently executing program entirety overlays usually replace portion running program like use overlays use chain loading increases i/o load application operating system boot manager programs chain loading used pass control boot manager boot sector target boot sector loaded disk replacing in-memory boot sector boot manager bootstrapped executed unix unix-like operating systems exec system call used perform chain loading program image current process replaced entirely new image current thread begins execution image common data area comprises data process environment variables preserved across system call addition exec process level chain loading linux supports kexec system call replace entire operating system kernel different version new kernel boots started power running processes preserved basic programs chain loading purview codice_1 statement commodore basic codice_2 statement causes current program terminated chained-to program loaded invoked dialects basic support optional parameter specifying line number execution commence rather default first line new program common data area varies according particular dialect basic use bbc basic example specific subset variables preserved across chain basics codice_3 statement used conjunction codice_1 specify variables preserved common data across chain operation chain loading permits basic programs execute program code could fit available program variable memory applications written basic could thus far larger size working memory via set cooperating programs codice_1 back forth amongst program flow moves within overall application many versions fortran include codice_6 statement performs chain loading preserving contents common storage unrelated codice_7 subroutine gnu fortran os/360 successors use codice_8 transfer control macro chain loading operating system memory management may may result replacement code calling program memory
|
Operating systems
|
cluster computing journal cluster computing journal networks software tools applications peer-reviewed scientific journal parallel processing distributed computing systems computer communication networks journal established 1998 2016 journal journal citation reports impact factor 2.040
|
Distributed computing architecture
|
network policy server network policy access services npas component windows server 2008 replaces internet authentication service ias windows server 2003 npas helps safeguard health security network npas server role includes network policy server nps health registration authority hra host credential authorization protocol hcap windows server 2003 ias microsoft implementation remote authentication dial-in user service radius server windows server operating systems later windows server 2003 ias renamed nps npas role service windows server 2008 function npsee enables use heterogeneous set wireless switch remote access vpn equipment one use nps routing remote access service available microsoft windows 2000 windows server 2003 standard edition windows server 2003 enterprise edition windows server 2003 datacenter edition server running nps member active directory domain services ad ds domain nps uses directory service user account database part single sign-on solution set credentials used network access control authenticating authorizing access network log ad ds domain
|
Operating systems
|
backdoor.win32.seed backdoor.win32.seed definition backdoor trojan first known detection goes back february 7th 2005 according securelist kaspersky labs meanwhile several variants malware self-replicate non-a.i. backdoor.win32.seed spread manually often premise .exe file something beneficial distribution channels include irc peer-to-peer networks newsgroup postings e-mails
|
Computer security
|
process migration computing process migration specialized form process management whereby processes moved one computing environment another originated distributed computing used widely multicore machines multiple cores one processor multiple processors process migration happens standard part process scheduling quite easy migrate process within given machine since resources memory files sockets need changed execution context primarily program counter registers traditional form process migration computer clusters processes moved machine machine significantly difficult requires serializing process image migrating reacquiring resources new machine process migration implemented among others openmosix pioneered sprite os university california berkeley process migration computing comes two flavors several problems occur running process moves another machine problems i/o redirection process i/o files devices bound certain machine must way redirect access resources even process migrated involves redirection i/o data stream network disadvantages concerning security performance reliability inter-process communication messages sent process process id p machine redirected new machine n new process id q machine process migrated away needs keep records migrated processes multiple migration occurs overhead increases shared memory one group cooperating processes migrates away processes use shared memory segment network must used emulate shared memory access adds complexity slows access shared memory dramatically processes migrated away machine holding shared memory phenomena host computer must provide services process migrated away called residual dependency addition problems mentioned process based operating systems usually maintain variety tables states running processes simple way retrieve administrative information process simple sequence copy operations depending execution process tables need searched copied altered re-established destination system thus process state replication simple task reference http //www.klammeraffe.org/~fritsch/uni-sb/fsinfo/papers/migrate/node4.html alternate definition process migration used integrated circuit design engineering process migration layout migration context design flow change shrink existing ic layout new process technology node implementation process migration could done manually redrawing layout feature feature automatic eda/cad tools load sharing systems process migrated one node another using mechanism called process migration concept process introduced report processes well-known design operating systems process migration refers mobility executing suspended processes distributed computing environment usually term indicates process uses network migrate another machine continue execution sometimes term used describe change execution one processor another processor within machine
|
Distributed computing architecture
|
parser grammar engine parser grammar engine pge originally parrot grammar engine compiler runtime perl 6 rules parrot virtual machine pge uses rules convert parsing expression grammar parrot bytecode therefore compiling rules program unlike virtual machines runtimes store regular expressions secondary internal format interpreted runtime regular expression engine rules format used pge express regular expression formal grammars forms first link compiler chain parrot front-end languages executed bytecode generated pge parse text described input rules generating parse tree parse tree manipulated directly fed next stage parrot compiler toolchain order generate ast code generation occur grammar describes programming language originally named p6ge written c pge translated native parrot renamed long initial release november 2004 author patrick r. michaud pge written order reduce amount work required implement compiler top parrot also written allow perl 6 easily self-host though current pugs development longer uses pge primary rules back-end favor native engine called pcr pge combines three styles parsing primary form perl 6 rules pge rule might look like addition-only grammar operator precedence parser allows operator table built used directly perl 6 rule style parser like accomplishes goal defining simple addition-only grammar using combination perl 6 style regex/rules codice_1 codice_2 shift-reduce optable everything else though pge outputs code parse grammar described rule used run time handle simple grammars regular expressions found code primary purpose parsing high level languages parrot compiler toolchain broken several parts pge first pge converts source code parse trees tree grammar engine tge converts parrot abstract syntax trees past second tge pass converts past parrot opcode syntax trees post directly transformed executable bytecode
|
Programming language topics
|
debian gnu/hurd debian gnu/hurd flavor debian operating system based hurd microkernel instead common debian kernels linux freebsd debian gnu/hurd development since 1998 made formal release may 2013 78 software packaged debian gnu/linux ported gnu hurd debian gnu/hurd developers hoping able release debian wheezy 2013 however hurd yet official debian release maintained developed unofficial port according gnu/hurd compatibility guide current version compatible laptops pcmcia support yet 2019 debian gnu/hurd several shortcomings among offered i386 uses ext2 filesystem dhcp work roadmap includes plans migrate ext4 filesystem using dhcp machine hang boot debian gnu/hurd distributed installer cd running official debian installer ready-to-run virtual disk image live cd live usb cd uses ia-32 architecture making compatible ia-32 x86-64 pcs current version debian gnu/hurd 2019 published july 2019
|
Operating systems
|
might magic book one secret inner sanctum might magic book one secret inner sanctum also known simply might magic early role-playing video game first popular influential might magic franchise released 1986 new world computing debut ported numerous platforms re-released continuously early '90s original apple ii version game written almost single-handedly jon van caneghem three years van caneghem difficulty finding publisher distribute might magic self-published new world computing handling distribution apartment able broker distribution deal activision due popularity game ported number platforms popular time nine sequels released next fifteen years port might magic released nintendo entertainment system 1992 basic gameplay similar ports released earlier platforms graphics general polish game reflected later release date greater capability nintendo platform game remade release japan pc engine platform version game released cd-rom² rather cartridge able feature digitized voices dialogue result increased storage capacity offered cd medium game later included limited edition special edition game set world varn features expansive outdoor terrain castles caves underground cities astral plane game centers six adventurers trying discover secret inner sanctum kind holy grail quest trying discover inner sanctum heroes discover information mysterious character named corak hunt missing villain sheltem end unmasking sheltem masquerading king defeating evil machinations end game go gates another world travel cron knowing sheltem also escaped world although appears take place straightforward medieval fantasy setting knights armor mythical monsters magicians number science fiction elements revealed later game actual meaning varn vehicular astropod research nacelle relatively common trait early crpgs also seen oldest ultima wizardry titles example sheltem plot first introduced adventurers visit site crashed space ship told aliens prisoner large world characters might magic successors defined number rules conforming loosely fantasy role-playing archetypes characters statistics analogous dungeons dragons ability scores might endurance accuracy personality intelligence luck six character classes player assigns character race creation time human elf half-orc gnome dwarf affects character starting statistics resistance various forms attack alignment also chosen characters party acts collectively time implications minimal alignment plays part game particular determine reward one game quests characters also male female like alignment gender serves minimal purpose game save situations notably city portsmith males males injured stepping certain areas city character gender changed back forth via certain actions within game world two types magic spells might magic sorcerer spells clerical spells sorcerer spells available sorcerer archer characters clerical spells available cleric paladin characters daily spellcasting ability limited character spell points users sorcerer spells number spell points available depends character intelligence statistic clerical spellcasters number spell points depends character personality statistic sorcerer spells tend offensive nature inflicting damage enemy creatures clerical spells usually defensive focusing healing defense removal poison undesirable effects world presented labyrinth utilizing first person perspective interface similar employed bard tale gaming world divided maze-like grid player movement options move forward backward turn ninety degrees left right walls represent mountain ridges cave stone rows trees whatever obstruction might expected terrain explored exploration like combat turn-based might magic hence in-game time pass player delays party moves place hostile creatures random encounter occurs game switches combat phase hostile creatures encountered player usually given option run away attempt surrender creatures try bribe attack player elects attack combat evasion attempt fails game enters combat mode platforms combat interface presented text-only format turn-based combat conducted combatant acting order speed statistic round random speed bonus applied either player party enemy creatures player-character turn player selects action list options including attacking creature casting spell attempting run away combat ends combatants one side either rendered unconscious dead usually hit points reduced zero fled combat player also lose combat allowing members party succumb sleep paralysis effects might magic sold 100,000 copies 1989 1987 compute magazine praised might magic wealth content non-linear play aspects graphics though notes game graphics lack animation limited graphical representation enemy combatants scorpia computer gaming world similarly praised game extensiveness noted early versions game equipped new party members clubs making beginning game difficult 1988 might magic joined magazine hall fame games highly rated time readers 1993 magazine stated despite starting difficulty well worth effort 1996 magazine named might magic 23rd best game ever editors wrote 3d dungeon view combined biggest world map date two major features advanced level crpg apple ii version game reviewed 1987 dragon 122 patricia lesser role computers column lesser stated adventure awesome scope completely fascinating graphically pleasing one top five games ever produced computer subsequent column reviewers gave game 5 5 stars hartley patricia kirk lesser reviewed ibm version game 1988 dragon 132 also giving 5 5 stars lessers reviewed macintosh version game dragon 140 giving macintosh ii version 4½ stars macintosh plus version 3½ stars modern commentators acknowledge mm1 immense scope world freedom exploration pioneering aspects incorporating player characters race gender alignment gameplay
|
Computer architecture
|
list amd cpu microarchitectures following list amd cpu microarchitectures historically amd cpu families given k-number originally stood kryptonite allusion superman comic book character fatal weakness starting first internal x86 cpu design k5 represent generational changes amd used k-nomenclature codenames official amd documents press releases since beginning 2005 k8 described athlon 64 processor family amd refers codename k8 processors family 0fh processors 10h 0fh refer main result cpuid x86 processor instruction hexadecimal numbering 0f h h represents hexadecimal numbering equals decimal number 15 10 h equals decimal number 16 k10h form sometimes pops improper hybrid k code family xxh identifier number family hexadecimal identifier number determined particular processor using freeware system profiling application cpu-z shows family number ext family field application seen various screenshots cpu-z validator world records website list microarchitectures many codenames associated
|
Computer architecture
|
transmeta crusoe crusoe family x86-compatible microprocessors developed transmeta introduced 2000 crusoe notable method achieving x86 compatibility instead instruction set architecture implemented hardware translated specialized hardware crusoe runs software abstraction layer virtual machine known code morphing software cms cms translates machine code instructions received programs native instructions microprocessor way crusoe emulate instruction set architectures isas used allow microprocessors emulate intel x86 instruction set theory possible cms modified emulate isas transmeta demonstrated crusoe executing java bytecode translating bytecodes instructions native instruction set addition abstraction layer x86 instruction stream hardware means hardware architecture change without breaking compatibility modifying cms example transmeta efficeon — second-generation transmeta design — 256-bit-wide vliw core versus 128-bit core crusoe crusoe performs software functionality traditionally implemented hardware e.g instruction re-ordering resulting simpler hardware fewer transistors relative simplicity hardware means crusoe consumes less power therefore generates less heat x86-compatible microprocessors running frequency 700 mhz crusoe ran x86 programs speed 500 mhz pentium iii x86 processor although crusoe processor smaller cheaper corresponding intel processor crusoe available two cores tm3200 embedded applications tm5400 low-power personal computing based architecture differed clock frequency peripheral support tm3200 operated clock frequencies 333–400 mhz 64 kb instruction cache 32 kb data cache l2 cache tm3200 integrated memory controller supports sdram pci interface measures 77 mm² uses 1.5 v power supply dissipating less 1.5 w power typical tm5400 operated clock frequencies 500–800 mhz unlike tm3200 tm5400 longrun power reduction technology 64 kb instruction cache 64 kb data cache 256 kb unified l2 cache integrated memory controller supports sdram ddr sdram also pci interface measures 73 mm² uses 1.10 v 1.6f v power supply dissipating 0.5–1.5 w typically maximum 6 w. transmeta fabless semiconductor company facilities fabricate designs fabricated ibm microelectronics semiconductor business international business machines ibm ibm fabricated crusoe 0.18 µm cmos process five levels copper interconnect crusoe vliw microprocessor executes bundles instructions termed molecules transmeta molecule contains multiple instructions termed atoms code morphing software translates x86 instructions native instructions native instructions 32 bits long instructions meet set conditions executed simultaneously combined form 64- 128-bit molecule containing two four atoms respectively event enough instructions fill molecule software inserts nops padding fill empty slots required vliw architectures criticised inefficient molecules two separate lengths transmeta crusoe new generation processor provide variable operating modes due dynamic core vary voltage frequency dynamically dynamic load frequency range dynamic voltage provides 300 mhz-1.20 v 400 mhz-1.23 v 500 mhz-1.35 v,600 mhz-1.53 v,700 mhz-1.75 v 800 mhz-2.00 v 900 mhz-2.35 1000 mhz- 2.80 v. vary ranges depending upon load optimum minimum load respective frequencies voltages get changed
|
Computer architecture
|
operation bot roast operation bot roast operation fbi track bot herders crackers virus coders install malicious software computers internet without owners knowledge turns computer zombie computer sends spam computers compromised computer making botnet network bot infected computers operation launched vast scale botnet resources poses threat national security operation created disrupt disassemble bot herders june 2007 fbi identified 1 million computers compromised leading arrest persons responsible creating malware process owners infected computers notified many unaware exploitation early results operation include charges following
|
Computer security
|
klaus knopper klaus knopper born 1968 ingelheim german electrical engineer free software developer knopper creator knoppix well-known live cd linux distribution received degree electrical engineering kaiserslautern university technology german technische universität kaiserslautern co-founded linuxtag 1996 major european linux expo self-employed information technology consultant since 1998 also teaches kaiserslautern university applied sciences knopper married adriane knopper visual impairment assisting knopper version knoppix blind visually impaired people released third quarter 2007 live cd name given distribution adriane knoppix adriane desktop non-graphical-userinterface blind computer beginners distribution work linux distribution screenreader preferably sbl screenreader blind linux users text-based tools internet access normal work
|
Operating systems
|
head heels video game head heels action-adventure video game released ocean software 1987 several 8-bit home computers subsequently ported wide range formats working title game foot mouth uses isometric engine similar filmation technique first developed ultimate head heels second isometric game jon ritman bernie drummond earlier batman computer game released 1986 1994 another isometric video game ritman drummond monster max released nintendo game boy player controls two characters instead one different abilities head jump higher heels control air fire doughnuts hooter paralyze enemies heels run twice fast head climb certain staircases head carry objects around room bag abilities become complementary player combines together completing roughly sixth game compared predecessors game offers unique revolutionary gameplay complex puzzles 300 rooms explore drummond contributed famously surreal touches including robots controlled push switches bore remarkable resemblance head prince charles body dalek surreal touches include enemies heads elephants staircases made dogs teleport away soon head enters room headus mouthion head footus underium heels two spies planet freedom sent blacktooth liberate enslaved planets penitentiary safari book world egyptus defeat emperor prevent planets falling rule captured separated spies placed prison headquarters castle blacktooth must first escape break market orbiting moonbase teleport planets locate reobtain stolen crowns liberation planets defeat emperor allow head heels return freedom heroes 2003 retrospec released remake head heels microsoft windows mac os x beos linux 2019 piko interactive released atari st port head heels atari jaguar jon ritman re-used modified isometric engine created batman support control 2 players instead 1 modifications made code c64 version lower processor load end little difference versions
|
Computer architecture
|
space invaders space invaders immediate commercial success 1982 grossed 3.8 billion net profit 450 million making best-selling video game highest-grossing entertainment product time adjusted inflation many versions game estimated grossed 13 billion total revenue 2016 making highest-grossing video game time space invaders considered one influential video games time helped expand video game industry novelty global industry ushered golden age arcade video games inspiration numerous video games game designers across different genres ported re-released various forms 1980 atari vcs version quadrupled sales vcs thereby becoming first killer app video game consoles broadly pixelated enemy alien become pop culture icon often representing video games whole designer nishikado drew inspiration games like 1976 ball-bouncing game breakout 1975 shooter game gun fight well science fiction narratives war worlds space battleship yamato star wars complete development game design custom hardware development tools space invaders fixed shooter player controls laser cannon moving horizontally across bottom screen firing descending aliens aim defeat five rows eleven aliens—although versions feature different numbers—that move horizontally back forth across screen advance toward bottom screen player laser cannon partially protected several stationary defense bunkers—the number also varies version—that gradually destroyed top bottom blasts either aliens player player defeats alien earns points shooting laser cannon aliens defeated aliens movement game music speed defeating aliens on-screen brings another wave difficult loop continue endlessly special mystery ship occasionally move across top screen award bonus points destroyed aliens attempt destroy player cannon firing approach bottom screen reach bottom alien invasion declared successful game ends tragically otherwise ends generally player last cannon destroyed enemy projectiles space invaders created japanese designer tomohiro nishikado spent year designing game developing necessary hardware produce game inspiration reported come varying sources including adaptation mechanical game space monsters released taito 1972 dream japanese school children waiting santa claus attacked invading aliens nishikado cited atari arcade game breakout inspiration aimed create shooting game featured sense achievement completing stages destroying targets complex graphics game uses similar layout breakout altered game mechanics rather bounce ball attack static objects players given ability fire projectiles moving enemies early enemy designs game included tanks combat planes battleships nishikado however satisfied enemy movements technical limitations made difficult simulate flying humans would easier simulate designer considered shooting immoral release 1974 anime space battleship yamato japan seeing magazine feature star wars thought using space theme nishikado drew inspiration aliens novel h. g. wells war worlds created initial bitmap images octopus-like aliens alien designs modeled squids crabs game originally titled space monsters popular song japan time changed space invaders designer superiors microcomputers japan powerful enough time perform complex tasks involved designing programming space invaders nishikado design custom hardware development tools game created arcade board using latest microprocessors united states game uses intel 8080 central processing unit cpu displays raster graphics crt monitor uses monaural sound hosted combination analog circuitry texas instruments sn76477 sound chip adoption microprocessor inspired gun fight 1975 midway microprocessor adaptation nishikado earlier discrete logic game western gun designer impressed improved graphics smoother animation midway version despite specially developed hardware nishikado unable program game wanted—the control program board powerful enough display graphics color move enemies faster—and ended considering development game hardware difficult part whole process programming game nishikado discovered processor able render alien graphics faster fewer screen rather design compensation speed increase decided keep challenging gameplay mechanism space invaders first released cocktail-table format arcade cabinet black-and-white graphics midway released western version upright cabinet used strips orange green cellophane screen simulate color graphics graphics reflected onto painted backdrop moon starry background later japanese releases used rainbow-colored cellophane t.t space invaders 1978 eventually followed version full-color display cabinet artwork features large humanoid monsters present game nishikado attributes artist basing designs original title space monsters rather referring actual in-game graphics despite simplicity music space invaders revolutionary gaming industry time video game scholar andrew schartmann identifies three aspects music significant impact development game music first months following release japan space invaders became popular specialty arcades opened nothing space invaders cabinets end 1978 taito installed 100,000 machines grossed 600 million japan alone 1980 taito sold 300,000 space invaders arcade machines japan 60,000 machines united states within one year prices ranged 2000 3000 machine mid-1981 space invaders machines grossed four billion quarters 1 billion continued gross average 600 million year 1982 time grossed 2 billion quarters equivalent 2019 net profit 450 million equivalent 2019 made best-selling video game highest-grossing entertainment product time comparisons made highest-grossing film star wars grossed 486 million net profit 175 million space invaders earned taito profits 500 million 1980 atari 2600 version first official licensing arcade game consoles became first killer app video game consoles quadrupling system sales sold two million units first year sale home console game making first title sell million cartridges official ports released atari 8-bit computer line atari 5200 console taito later released nintendo famicom 1985 japan numerous unofficial clones made popular computer games super invader 1979 ti invaders 1981 latter top-selling game texas instruments ti-99/4a least 1982 adjusted inflation sales versions space invaders combined estimated exceeded 13 billion gross revenue making highest-grossing video game time urban legend states space invaders popularity led shortage 100-yen coins japan actuality 100-yen coin production lower 1978 1979 previous subsequent years additionally arcade operators would emptied machines taken money bank thus keeping coins circulation reports living japan time indicate nothing ordinary ... height space invaders invasion one earliest shooting games space invaders set precedents helped pave way future titles shooting genre space invaders popularized interactive style gameplay enemies responding player-controlled cannon movement first video game popularize concept achieving high score first save player score earlier shooting games allowed player shoot targets space invaders first targets could fire back player also first game players given multiple lives repel hordes enemies could take cover enemy fire use destructible barriers addition first game use continuous background soundtrack four simple diatonic descending bass notes repeating loop dynamic changed pace stages like heartbeat sound increases pace enemies approached game developers including shigeru miyamoto creator franchises donkey kong super mario legend zelda hideo kojima metal gear john romero john carmack doom cited space invaders introduction video games miyamoto considers space invaders game revolutionized video game industry deus ex creator warren spector said space invaders games like represent roots everything see today gaming represents birth new art form one literally changed world space invaders important historical artefact less silent films early twentieth century early printed books several publications ascribed expansion video game industry novelty global industry success game edge magazine attributed shift games bars amusement arcades mainstream locations restaurants department stores space invaders popularity first game arcade machine owner could make cost machine one month places within one week space invaders also moved gaming industry pong -inspired sports games grounded real-world situations towards fantastical action games space invaders helped action games become dominant genre arcades consoles guinness world records considered space invaders one successful arcade shooting games 2008 describing seminal arcade classic ign listed number eight classic shoot 'em space invaders set template shoot 'em genre worldwide success created demand wide variety science fiction games inspiring development arcade games atari asteroids williams electronics defender namco galaxian galaga modeled space invaders gameplay design influence could said extend shooting games released present day including first-person shooters fps wolfenstein doom halo call duty space invaders also influence early computer dungeon crawl games dungeons daggorath used similar heartbeat sounds indicate player health space invaders cabinets become collector items cocktail cabaret versions rarest technology journalist jason whittaker credited game ending video game crash 1977 caused pong clones flooding market beginning golden age video arcade games 1978–1980s according observer home console versions space invaders popular encouraged users learn program many became industry leaders 1up.com stated space invaders showed video games could compete major entertainment media time movies music television ign attributed launch arcade phenomenon north america part space invaders electronic games credited game success impetus behind video gaming becoming rapidly growing hobby single popular coin-operated attraction time game informer considered along pac-man one popular arcade games tapped popular culture generated excitement golden age arcades space invaders inducted world video game hall fame 2016 1996 next generation magazine put space invaders number 97 list top 100 games time saying provides elegance simplicity found later games like phoenix 1980 ign listed one top 10 influential games 2007 citing source inspiration video game designers impact shooting genre times ranked 1 list ten influential video games ever 2007 1up ranked 3 list 60 influential games time stating contrast earlier arcade games attempts simulate already-existing things space invaders first video game video game instead merely playable electronic representation something else 2008 guinness world records listed top-rated arcade game technical creative cultural impact entertainment weekly named space invaders one top ten games atari 2600 home console 2013 2018 ranked 87th video game canon statistical meta-analysis 48 top games lists published 1995 2017 space invaders remade numerous platforms spawned many sequels re-releases include ported updated versions original arcade game ported versions generally feature different graphics additional gameplay options—for example moving defense bunkers zigzag shots invisible aliens two-player cooperative gameplay ports earlier systems like atari home consoles featured simplified graphics later systems super nintendo entertainment system playstation featured updated graphics later titles include several modes gameplay integrate new elements original design example space invaders extreme released nintendo ds playstation portable integrated musical elements standard gameplay 2008 spin-off wiiware space invaders get even allows players control aliens instead laser cannon little bit role reversal 1980 bally-midway released pinball version game however elements original game included aliens instead resemble xenomorphs film alien bally-midway later sued game resemblance designs h. r. giger ports game met mixed receptions atari 2600 version successful nintendo entertainment system version poorly received taito released several arcade sequels first space invaders part ii 1979 featured color graphics attract mode new gameplay elements added intermission gameplay according killer list video games first video game include intermission game also allowed player top score sign name high score table version released united states deluxe space invaders also known space invaders deluxe featured different graphical color scheme lunar-city background another arcade sequel space invaders ii released exclusively united states cocktail-table format fast alien firing competitive two-player mode summer 1985 return invaders released updated color graphics complex movements attack patterns aliens subsequent arcade sequels included super space invaders '91 space invaders dx space invaders 95 game introduced minor gameplay additions original design like original game several arcade sequels become collector items though considered rarer 2002 taito released space raiders third-person shooter reminiscent space invaders game related games included video game compilation titles space invaders anniversary released 2003 playstation 2 included nine space invader variants similar title playstation portable space invaders pocket released 2005 space invaders space invaders part ii return invaders included taito legends compilation taito classic arcade games released 2005 playstation 2 xbox pc super space invaders '91 space invaders dx space invaders 95 included taito legends 2 sequel compilation released 2006 april 2017 redemption game raw thrills space invaders frenzy released stand-alone version released super impulse part tiny arcade series along namco games pac-man ms. pac-man galaxian space invaders title atari jaguar worked virtuality entertainment would featured support unreleased jaguar vr peripheral however project never entered full development beyond reaching pre-production stages remaining proof existence game design document many publications websites use pixelated alien graphic icon video games general including video game magazine electronic gaming monthly technology website ars technica concert event video games live also space invaders- themed merchandising including necklaces puzzles trend continues day handmade sites like etsy pinterest showcasing thousands handmade items featuring space invaders characters game—and references it—has appeared numerous facets popular culture soon game release hundreds favorable articles stories emerging video game medium popularized space invaders aired television printed newspapers magazines space invaders tournament held atari 1980 rebecca heineman first electronic sports esports event attracted 10,000 participants establishing video gaming mainstream hobby arcade awards ceremony created year honor best video games space invaders winning first game year goty award impact space invaders video game industry compared beatles pop music industry considered first 'blockbuster video game space invaders became synonymous video games worldwide time within year game release japanese pta unsuccessfully attempted ban game allegedly inspiring truancy north america doctors identified condition called space invaders elbow complaint physician new england journal medicine named similar ailment space invaders wrist space invaders also first game attract political controversy 1981 private member bill known control space invaders electronic games bill drafted british labour mp george foulkes attempted allow local councils restrict game like licensing addictive properties causing deviancy conservative mp michael brown defended game innocent harmless pleasure enjoyed day criticized bill example socialist beliefs restriction control motion bring bill parliament defeated 114 votes 94 votes bill never considered parliament musicians drawn inspiration music space invaders pioneering japanese synthpop group yellow magic orchestra reproduced space invaders sounds 1978 self-titled album hit single computer game latter selling 400,000 copies united states pop songs based space invaders soon followed including disco records disco space invaders 1979 funny stuff hit songs space invader 1980 pretenders space invaders 1980 uncle vic australian hit space invaders 1979 player one known us 'playback turn provided bassline jesse saunders 1984 first chicago house music track clash sampled sound effects game song ivan meets g.i joe 4th studio album sandinista video games live performed audio game part special retro classic arcade medley 2007 honor game 30th anniversary taito produced album titled space invaders 2008 album published avex trax features music inspired game taito store taito station also unveiled space invaders themed music video 1982 original pilot series powers matthew star david star uses powers cheat game game shown colored backdrop moon multiple television series aired episodes either reference parody game elements example danger mouse '70s show scrubs chuck robot chicken amazing world gumball elements prominently featured raiders lost arcade segment anthology interest ii episode animated comedy show futurama space invaders also appears films cherry 2000 1987 1991 pixels 2015 deluxe game made appearance fast times ridgemont high 1982 film version game works warner bros akiva goldsman producing february 13 2015 daniel kunka set write script film july 12 2019 greg russo set write script film goldsman still producing alongside safehouse pictures partners joby harold tory tunnell various books published space invaders including 1982 martin amis 2006 geof king tanya krzywinska space invaders 1980 mark roeder julian wolanski mid-'90s athletics company puma released t-shirt stamp references space invaders i.e spaceship aiming company logo see picture right 2006 game one several video game-related media selected represent japan part project compiled japan agency cultural affairs year space invaders included london science museum game exhibition meant showcase various aspects video game history development culture game part barbican centre traveling game exhibition belluard bollwerk international 2006 festival fribourg switzerland guillaume reymond created three-minute video recreation game space invaders part gameover project using humans pixels gh art exhibit 2008 games convention leipzig germany included art game invaders based space invaders gameplay creator later asked game removed exhibit following criticism elements based september 11 attacks united states bridge cáceres spain projected engineers pedro plasencia hadrián arias whose pavement design based game laser cannon shots several figures seen deck french street artist invader made name creating mosaic artwork space invader aliens around world 2014 two brazilian zoologists described new species arachnid taito spaceinvaders kury barros 2014 inspired game resemblance fleck dorsal scutum animal typical alien game 2018 highways england launched campaign titled “ ’ space invader stay safe stay back ” raise awareness dangers tailgating people also able order free car bumper stickers raise awareness campaign
|
Computer architecture
|
iterator computer programming iterator object enables programmer traverse container particularly lists various types iterators often provided via container interface though interface semantics given iterator fixed iterators often implemented terms structures underlying container implementation often tightly coupled container enable operational semantics iterator iterator performs traversal also gives access data elements container perform iteration i.e. without significant liberty taken concept trivial use terminology iterator behaviorally similar database cursor iterators date clu programming language 1974 internal iterators higher order functions often taking anonymous functions map reduce etc. implementing traversal across container applying given function every element turn external iterator may thought type pointer two primary operations referencing one particular element object collection called element access modifying points next element called element traversal must also way create iterator points first element well way determine iterator exhausted elements container depending language intended use iterators may also provide additional operations exhibit different behaviors primary purpose iterator allow user process every element container isolating user internal structure container allows container store elements manner wishes allowing user treat simple sequence list iterator class usually designed tight coordination corresponding container class usually container provides methods creating iterators loop counter sometimes also referred loop iterator loop counter however provides traversal functionality element access functionality one way implementing iterators use restricted form coroutine known generator contrast subroutine generator coroutine yield values caller multiple times instead returning iterators naturally expressible generators generators preserve local state invocations 're particularly well-suited complicated stateful iterators tree traversers subtle differences distinctions use terms generator iterator vary authors languages python generator iterator constructor function returns iterator example python generator returning iterator fibonacci numbers using python codice_1 statement follows object-oriented languages c c++ later versions delphi later versions go java later versions lua perl python ruby provide intrinsic way iterating elements container object without introduction explicit iterator object actual iterator object may exist reality exposed within source code language implicit iterators often manifested foreach statement equivalent following python example python iterable object converted iterator iterated loop done implicitly times may created collection object ruby example iteration style sometimes called internal iteration code fully executes within context iterable object controls aspects iteration programmer provides operation execute step using anonymous function languages support list comprehensions similar constructs may also make use implicit iterators construction result list python sometimes implicit hidden nature partial c++ language function templates implicit iteration codice_2 functions still require explicit iterator objects initial input subsequent iteration expose iterator object user iterators useful abstraction input streams – provide potentially infinite iterable necessarily indexable object several languages perl python implement streams iterators alternative implementations stream include data-driven languages awk sed procedural languages common use subscript operator loop counter loop elements sequence array although indexing may also used object-oriented containers use iterators may advantages ability container modified iterating elements become necessary modern object-oriented programming interrelationships objects effects operations may obvious using iterator one isolated sorts consequences assertion must however taken grain salt often efficiency reasons iterator implementation tightly bound container preclude modification underlying container without invalidating containers may move around data memory way invalidate iterator container somehow keep track currently alive iterators update fly since number iterators given time may arbitrarily large comparison size tied container updating drastically impair complexity guarantee container operations alternative way keep number updates bound relatively container size would use kind handle mechanism collection indirect pointers container elements must updated container let iterators point handles instead directly data elements approach negatively impact iterator performance since must effectuate double pointer following access actual data element usually desirable many algorithms using iterators invoke iterators data access operation often advance method therefore especially important iterators efficient data access always trade-off security iterators remain always valid efficiency time added security worth efficiency price pay using alternative container example singly linked list instead vector would better choice globally efficient stability iterators needed iterators categorised according functionality non-exhaustive list iterator categories different languages libraries used languages define iterator types iterators .net framework called enumerators represented codice_3 interface codice_3 provides codice_5 method advances next element indicates whether end collection reached codice_6 property obtain value element currently pointed optional codice_7 method rewind enumerator back initial position enumerator initially points special value first element call codice_5 required begin iterating enumerators typically obtained calling codice_9 method object implementing codice_10 interface container classes typically implement interface however foreach statement c operate object providing method even n't implement codice_10 duck typing interfaces expanded generic versions .net 2.0 following shows simple use iterators c 2.0 c 2.0 also supports generators method declared returning codice_3 codice_10 uses codice_14 statement produce sequence elements instead returning object instance transformed compiler new class implementing appropriate interface c++ language makes wide use iterators standard library describes several categories iterators differing repertoire operations allow include forward iterators bidirectional iterators random access iterators order increasing possibilities standard container template types provide iterators one categories iterators generalize pointers elements array indeed used iterators syntax designed resemble c pointer arithmetic codice_15 codice_16 operators used reference element iterator points pointer arithmetic operators like codice_17 used modify iterators traversal container traversal using iterators usually involves single varying iterator two fixed iterators serve delimit range traversed distance limiting iterators terms number applications operator codice_17 needed transform lower limit upper one equals number items designated range number distinct iterator values involved one convention lower limiting iterator points first element range upper limiting iterator point element range rather beyond end range traversal entire container codice_19 method provides lower limit codice_20 upper limit latter reference element container valid iterator value compared following example shows typical use iterator iterator types separate container types used though two often used concert category iterator thus operations defined usually depends type container instance arrays vectors providing random access iterators sets use linked structure implementation providing bidirectional iterators container type one associated iterator type instance codice_21 container type allows traversal either using raw pointers elements type codice_22 values special type codice_23 yet another type provided reverse iterators whose operations defined way algorithm performing usual forward traversal actually traversal reverse order called reverse iterators containers also provide separate codice_24 type operations would allow changing values pointed intentionally defined simple traversal container object range elements including modification elements unless codice_24 used done using iterators alone container types may also provide methods like codice_26 codice_27 modify structure container methods container class addition require one iterator values specify desired operation possible multiple iterators pointing container simultaneously structure-modifying operations may invalidate certain iterator values standard specifies case whether may using invalidated iterator error lead undefined behvior errors need signalled run time system implicit iteration also partially supported c++ use standard function templates codice_28 codice_29 codice_30 used must initialized existing iterators usually codice_31 codice_32 define range iteration occurs explicit iterator object subsequently exposed iteration proceeds example shows use codice_33 achieved using codice_34 passing codice_35 value third iterator since c++11 lambda function syntax used specify operation iterated inline avoiding need define named function example for-each iteration using lambda function introduced java jdk 1.2 release interface allows iteration container classes codice_36 provides method may optionally support method iterators created corresponding container class typically method named codice_37 codice_38 method advances iterator returns value pointed iterator first element obtained upon first call codice_38 determine elements container visited codice_40 test method used following example shows simple use iterators show codice_40 called repeatedly use insert commas elements last element approach properly separate advance operation actual data access data element must used advance needs stored temporary variable advance needed without data access i.e skip given data element access nonetheless performed though returned value ignored case collection types support codice_42 method iterator removes recently visited element container keeping iterator usable adding removing elements calling methods container also thread makes iterator unusable attempt get next element throws exception exception also thrown elements remaining codice_40 previously returned false additionally similar api allows forward backward iteration provides current index list allows setting list element position j2se 5.0 release java introduced interface support enhanced codice_44 foreach loop iterating collections arrays codice_45 defines method returns codice_36 using enhanced codice_44 loop preceding example rewritten containers also use older since 1.0 codice_48 class provides codice_49 codice_50 methods methods modify container scala iterators rich set methods similar collections used directly loops indeed iterators collections inherit common base trait scala.collection.traversableonce however rich set methods available scala collections library map collect filter etc. often necessary deal iterators directly programming scala java iterators collections automatically converted scala iterators collections respectively simply adding single line import scala.collection.javaconversions._ file javaconversions object provides implicit conversions implicit conversions feature scala methods visible current scope automatically insert calls relevant expressions appropriate place make typecheck otherwise would n't matlab supports external internal implicit iteration using either native arrays codice_51 arrays case external iteration onus user advance traversal request next elements one define set elements within array storage structure traverse elements using codice_44-loop construct example traverses array integers using codice_44 keyword case internal iteration user supply operation iterator perform every element collection many built-in operators matlab functions overloaded execute every element array return corresponding output array implicitly furthermore codice_54 codice_55 functions leveraged performing custom user defined operations native arrays codice_51 arrays respectively example defines primary function codice_57 implicitly applies custom subfunction codice_58 element array using built-in function codice_54 alternatively may desirable abstract mechanisms array storage container user defining custom object-oriented matlab implementation iterator pattern implementation supporting external iteration demonstrated matlab central file exchange item design pattern iterator behavioral written new class-definition syntax introduced matlab software version 7.6 r2008a features one-dimensional codice_51 array realization list abstract data type adt mechanism storing heterogeneous data type set elements provides functionality explicit forward list traversal codice_40 codice_38 codice_63 methods use codice_64-loop php ’ foreach loop introduced version 4.0 made compatible objects values 4.0 beta 4 however support iterators added php 5 introduction internal traversable interface two main interfaces implementation php scripts enable objects iterated via foreach loop iterator iteratoraggregate latter require implementing class declare required methods instead implements accessor method codice_65 returns instance traversable standard php library provides several classes work special iterators php also supports generators since 5.5 simplest implementation wrapping array useful type hinting information hiding methods example class used execution complete foreach loop codice_66 iterator ’ methods executed following order next example illustrates php class implements traversable interface could wrapped iteratoriterator class act upon data returned foreach loop usage together codice_75 constant allows php scripts iterate result sets billions rows little memory usage features exclusive php mysql class implementations e.g pdostatement class implement traversable interface well iterators python fundamental part language many cases go unseen implicitly used codice_44 foreach statement list comprehensions generator expressions python standard built-in collection types support iteration well many classes part standard library following example shows typical implicit iteration sequence python dictionaries form associative array also directly iterated dictionary keys returned items method dictionary iterated yields corresponding key value pairs tuple iterators however used defined explicitly iterable sequence type class built-in function codice_77 used create iterator object iterator object iterated codice_38 function uses codice_79 method internally returns next element container previous statement applies python 3.x python 2.x codice_38 method equivalent codice_81 exception raised elements left following example shows equivalent iteration sequence using explicit iterators user-defined class support standard iteration either implicit explicit defining codice_82 method returns iterator object iterator object needs define codice_79 method returns next element python generators implement iteration protocol ruby implements iterators quite differently iterations done means passing callback closures container methods way ruby implements basic iteration also several patterns iteration like function mapping filters reducing ruby also supports alternative syntax basic iterating method codice_84 following three examples equivalent …and… even shorter ruby also iterate fixed lists using enumerators either calling next method rust implements iterators language iterate element vectors create iterators iterator iterator adapters map filter skip take ... fibonacci custom iterator
|
Programming language topics
|
namco system 246 namco system 246 development sony playstation 2 technology basis arcade system board released december 2000 first game bloody roar 3 like sega naomi widely licensed use manufacturers games battle gear 3 capcom fighting evolution examples system 246-based arcade games namco products namco system 256 upgraded version system 246 upgrades unknown vram faster cpu speeds likely namco super system 256 regular namco system 256 gun board integrated though variant used time crisis 4 namco system 147 similar 246 use dvd-rom drive instead rom chips system board
|
Computer architecture
|
analogical modeling analogical modeling formal theory exemplar based analogical reasoning proposed royal skousen professor linguistics english language brigham young university provo utah applicable language modeling categorization tasks analogical modeling related connectionism nearest neighbor approaches data-based rather abstraction-based distinguished ability cope imperfect datasets caused simulated short term memory limits base predictions relevant segments dataset whether near far language modeling successfully predicted empirically valid forms theoretical explanation known see discussion finnish morphology skousen et al 2002 exemplar-based model consists general-purpose modeling engine problem-specific dataset within dataset exemplar case reasoned informative past experience appears feature vector row values set parameters define problem example spelling-to-sound task feature vector might consist letters word exemplar dataset stored outcome phoneme phone generated model presented novel situation form outcome-less feature vector engine algorithmically sorts dataset find exemplars helpfully resemble selects one whose outcome model prediction particulars algorithm distinguish one exemplar-based modeling system another think feature values characterizing context outcome behavior occurs within context accordingly novel situation known given context given known features context engine systematically generates contexts include supracontexts extracts dataset exemplars belong engine discards supracontexts whose outcomes inconsistent measure consistency discussed leaving analogical set supracontexts probabilistically selects exemplar analogical set bias toward large supracontexts multilevel search exponentially magnifies likelihood behavior predicted occurs reliably settings specifically resemble given context performs process case asked evaluate given context consisting n variables used template generate formula_1 supracontexts supracontext set exemplars one variables values given context variables ignored effect view data created filtering criteria similarity given context total set supracontexts exhausts views alternatively supracontext theory task proposed rule whose predictive power needs evaluated important note supracontexts equal peers one another arranged distance given context forming hierarchy supracontext specifies variables another one subcontext one lies closer given context hierarchy strictly branching supracontext subcontext several others several subcontexts hierarchy becomes significant next step algorithm engine chooses analogical set among supracontexts supracontext may contain exemplars exhibit one behavior deterministically homogeneous included view data displays regularity relevant theory never yet disproven supracontext may exhibit several behaviors contain exemplars occur specific supracontext subcontexts case non-deterministically homogeneous included great evidence systematic behavior occurs also counterargument finally supracontext may heterogeneous meaning exhibits behaviors found subcontext closer given context also behaviors ambiguous behavior nondeterministically homogeneous supracontext accepted rejected intervening subcontext demonstrates better theory found heterogeneous supracontext therefore excluded guarantees see increase meaningfully consistent behavior analogical set approach given context analogical set chosen appearance exemplar given exemplar may appear several analogical supracontexts given pointer every appearance exemplar within supracontexts one pointers selected random followed exemplar points provides outcome gives supracontext importance proportional square size makes exemplar likely selected direct proportion sum sizes analogically consistent supracontexts appears course probability predicting particular outcome proportional summed probabilities exemplars support given context formula_2 elements terminology best understood example example used second chapter skousen 1989 context consists three variables potential values 0-3 two outcomes dataset e r exemplars define network pointers like solid lines represent pointers exemplars matching outcomes dotted lines represent pointers exemplars non-matching outcomes statistics example follows behavior predicted given context example let us predict outcome context 3 1 2 first find contexts containing given context contexts called supracontexts find supracontexts systematically eliminating variables given context variables generally formula_19 supracontexts following table lists sub- supracontexts means x means anything contexts shown venn diagram next step determine exemplars belong contexts order determine contexts homogeneous table shows subcontexts behavior terms given exemplars number disagreements within behavior analyzing subcontexts table see 1 subcontext disagreements 3 1 dataset consists 3 1 0 e 3 1 1 r 2 disagreements subcontext 1 pointing exemplars see pointer network pictured therefore supracontexts containing subcontext contain disagreements use simple rule identify homogeneous supracontexts number disagreements supracontext greater number disagreements contained subcontext say heterogeneous otherwise homogeneous 3 situations produce homogeneous supracontext two heterogeneous supracontexts 1 combination non-deterministic 3 1 subcontexts containing r outcome causes heterogeneity actually 4th type homogeneous supracontext contains one non-empty subcontext non-deterministic frequency outcomes sub-context exactly analogical modeling consider situation however 2 reasons next construct analogical set consists pointers outcomes homogeneous supracontexts figure shows pointer network homogeneous contexts highlighted pointers summarized following table 4 pointers analogical set associated outcome e 9 associated r pointer randomly selected outcome points predicted total 13 pointers probability outcome e predicted 4/13 30.8 outcome r 9/13 69.2 create detailed account listing pointers occurrences homogeneous supracontexts see analogical effect instances data set analogy considered useful describing language least since time saussure noam chomsky others recently criticized analogy vague really useful bańko 1991 appeal deus ex machina skousen proposal appears address criticism proposing explicit mechanism analogy tested psychological validity analogical modeling employed experiments ranging phonology morphology linguistics orthography syntax though analogical modeling aims create model free rules seen contrived linguists current form still requires researchers select variables take consideration necessary so-called exponential explosion processing power requirements computer software used implement analogical modeling recent research suggests quantum computing could provide solution performance bottlenecks skousen et al 2002 see pp 45–47
|
Computational linguistics
|
slitaz slitaz gnu/linux lightweight gnu/linux distribution community-based suitable use older hardware live cd live usb slitaz stands simple light incredible temporary autonomous zone according boot screen slitaz uses openbox window manager additional packages added using program called tazpanel due specific package format slitaz uses tazpkg still use packages popular distribution though debian means first carrying conversion different packages default slitaz offers persistence however still added user wish choice filesystem/bootloader used slitaz importance however persistence available ext2 ext3 filesystems syslinux extlinux boot loader another useful tool tazlito users create livecd based selected packages even based upon current system state slitaz gnu/linux supported machines based i486 x86 intel compatible processors live cd four variants slitaz requiring 192 mb ram core system 48 mb text mode x window system slitaz even run 16 mb ram little swap memory slitaz booted live cd live usb floppy disk local area network pxe installed requiring approximately 80 mb hard disk space tazlito livecd creation utility slitaz gnu/linux check ensure uid zero i.e. tazlito run root root sudoer looks existence etc directory root file system directory n.b. checking ensure anything actually directory however tazlito used livecd creation operations one create/modify directories used tazlito directories existence implies populated properly looks existence boot directory root cd directory n.b. checking ensure anything actually directory however tazlito used livecd creation operations one create/modify directories used tazlito directories existence implies populated properly linux distribution route development slitaz mainly determined coders slitaz 5 major changes seem swapping systemd busybox init udev hence avoiding safety risks implementation qt implementation x64 arm architectures currently development dedoimedo reviewed slitaz gnu/linux 1.0 wrote dedoimedo also reviewed version 2.0 distrowatch wrote distrowatch weekly review slitaz gnu/linux 1.0
|
Operating systems
|
list object-relational mapping software list well-known object-relational mapping software up-to-date all-inclusive athena framework open source flex orm native support multitenancy
|
Databases
|
resource allocation computer computing resource allocation necessary application run system user opens program counted process therefore requires computer allocate certain resources able run resources could access section computer memory data device interface buffer one files required amount processing power computer single processor perform one process time regardless amount programs loaded user initiated start-up computers using single processors appear running multiple programs processor quickly alternates programs processing needed small amounts time process known multitasking time slicing time allocation automatic however higher lower priority may given certain processes essentially giving high priority programs more/bigger slices processor time computer multiple processors different processes allocated different processors computer truly multitask programs adobe photoshop yafray require intense processing power coded able run one processor thus running quickly efficiently method generally suitable multiprogramming environments actually helpful
|
Operating systems
|
l4linux llinux variant linux kernel altered extent run virtualized l4 l4 microkernel l4linux kernel runs service l4linux fork variant binary compatible linux/x86 kernel thus replace linux kernel linux distribution llinux developed dresden real-time operating system project drops allow real-time time-sharing-programs run computer parallel time llinux also allows setting virtualized environment vaguely similar xen kvm couple significant differences intention xen llinux l4android fork llinux encompasses modifications main-line linux kernel android joint project operating systems group dresden university technology chair security telecommunications berlin institute technology
|
Computer architecture
|
incredibuild incredibuild suite grid computing software developed incredibuild ltd. incredibuild designed help accelerate computationally-intensive tasks distributing network notable applications including compiling source code building software generally software development-related tasks jobs distributed several computers network giving possibility accelerating work using resources available initiating computer alone potentially freeing local resources tasks incredibuild tools available microsoft windows linux out-of-the-box support accelerating builds targeting platforms well android nintendo switch playstation 4 xbox one platforms originally sold specifically tool accelerate compiling incredibuild used development processes well general high performance computing incredibuild software suite broken several separately-licensable tools incredibuild visual studio c/c++ provides visual studio integration accelerate builds c c++ projects incredibuild make build tools provides integration several standard build tools including make cmake msbuild incredibuild dev tools provides additional interfaces distributing jobs need necessarily building compiling-related incredibuild several software development companies customers including number video game developers turn 10 studios instance used incredibuild accelerate builds rendering 3ds max code analysis tasks development forza 5 incredibuild also claims epic games electronic arts id software bohemia interactive scaleform corporation fromsoftware bugbear entertainment clients cryengine unreal engine include built-in support build acceleration via incredibuild incredibuild ltd. israeli company based tel aviv incredibuild selling product 2002 introduced incredibuild v1.0 offering solution acceleration microsoft visual studio 6.0 c/c++ code builds incredibuild 1.3 awarded game developer magazine annual front line award category programming year 2003 adding support visual studio .net visual studio 2005 incredibuild later expanded incredibuild time called xge interfaces package allowed customers implement custom acceleration jobs necessarily compilation-related exposing set interfaces incredibuild core grid engine technology 2008 incredibuild productivity award change configuration management category 18th annual jolt awards
|
Distributed computing architecture
|
related-key attack cryptography related-key attack form cryptanalysis attacker observe operation cipher several different keys whose values initially unknown mathematical relationship connecting keys known attacker example attacker might know last 80 bits keys always even though n't know first bits appears first glance unrealistic model would certainly unlikely attacker could persuade human cryptographer encrypt plaintexts numerous secret keys related way kasumi eight round 64-bit block cipher 128-bit key based upon misty1 designed form basis 3g confidentiality integrity algorithms mark blunden adrian escott described differential related key attacks five six rounds kasumi differential attacks introduced biham shamir related key attacks first introduced biham differential related key attacks discussed kelsey et al important example cryptographic protocol failed related-key attack wired equivalent privacy wep used wi-fi wireless networks client wi-fi network adapter wireless access point wep-protected network shares wep key encryption uses rc4 algorithm stream cipher essential key never used twice stream cipher prevent happening wep includes 24-bit initialization vector iv message packet rc4 key packet iv concatenated wep key wep keys changed manually typically happens infrequently attacker therefore assume keys used encrypt packets share single wep key fact opened wep series attacks proved devastating simplest understand uses fact 24-bit iv allows little 17 million possibilities birthday paradox likely every 4096 packets two share iv hence rc4 key allowing packets attacked devastating attacks take advantage certain weak keys rc4 eventually allow wep key recovered 2005 agents u.s. federal bureau investigation publicly demonstrated ability widely available software tools three minutes one approach preventing related-key attacks design protocols applications encryption keys never simple relationship example encryption key generated underlying key material using key derivation function example replacement wep wi-fi protected access wpa uses three levels keys master key working key rc4 key master wpa key shared client access point used protocol called temporal key integrity protocol tkip create new working keys frequently enough thwart known attack methods working keys combined longer 48-bit iv form rc4 key packet design mimics wep approach enough allow wpa used first-generation wi-fi network cards implemented portions wep hardware however first-generation access points run wpa another conservative approach employ cipher designed prevent related-key attacks altogether usually incorporating strong key schedule newer version wi-fi protected access wpa2 uses aes block cipher instead rc4 part reason related-key attacks aes unlike rc4 're far practical implement wpa2 key generation functions may provide security many older network cards run wpa2
|
Computer security
|
interlingual machine translation interlingual machine translation one classic approaches machine translation approach source language i.e text translated transformed interlingua i.e. abstract language-independent representation target language generated interlingua within rule-based machine translation paradigm interlingual approach alternative direct approach transfer approach direct approach words translated directly without passing additional representation transfer approach source language transformed abstract less language-specific representation linguistic rules specific language pair transform source language representation abstract target language representation target sentence generated interlingual approach machine translation advantages disadvantages advantages requires fewer components order relate source language target language takes fewer components add new language supports paraphrases input original language allows analysers generators written monolingual system developers handles languages different e.g english arabic obvious disadvantage definition interlingua difficult maybe even impossible wider domain ideal context interlingual machine translation thus multilingual machine translation specific domain first ideas interlingual machine translation appeared 17th century descartes leibniz came theories create dictionaries using universal numerical codes others cave beck athanasius kircher johann joachim becher worked developing unambiguous universal language based principles logic iconographs 1668 john wilkins described interlingua essay towards real character philosophical language 18th 19th centuries many proposals universal international languages developed well known esperanto said applying idea universal language machine translation appear first significant approaches instead work started pairs languages however 1950s 60s researchers cambridge headed margaret masterman leningrad headed nikolai andreev milan silvio ceccato started work area idea discussed extensively israeli philosopher yehoshua bar-hillel 1969 1970s noteworthy research done grenoble researchers attempting translate physics mathematical texts russian french texas similar project metal ongoing russian english early interlingual mt systems also built stanford 1970s roger schank yorick wilks former became basis commercial system transfer funds latter code preserved computer museum boston first interlingual machine translation system 1980s renewed relevance given interlingua-based knowledge-based approaches machine translation general much research going field uniting factor research high-quality translation required abandoning idea requiring total comprehension text instead translation based linguistic knowledge specific domain system would used important research era done distributed language translation dlt utrecht worked modified version esperanto fujitsu system japan method translation interlingua thought way describing analysis text written source language possible convert morphological syntactic semantic even pragmatic characteristics meaning target language interlingua able describe characteristics languages translated instead simply translating one language another sometimes two interlinguas used translation possible one two covers characteristics source language possess characteristics target language translation proceeds converting sentences first language sentences closer target language two stages system may also set second interlingua uses specific vocabulary closer aligned target language could improve translation quality above-mentioned system based idea using linguistic proximity improve translation quality text one original language many structurally similar languages one original analysis principle also used pivot machine translation natural language used bridge two distant languages example case translating english ukrainian using russian intermediate language interlingual machine translation systems two monolingual components analysis source language interlingual generation interlingua target language however necessary distinguish interlingual systems using syntactic methods example systems developed 1970s universities grenoble texas based artificial intelligence 1987 japan research universities southern california carnegie mellon first type system corresponds outlined figure 1. types would approximated diagram figure 4 following resources necessary interlingual machine translation system one problems knowledge-based machine translation systems becomes impossible create databases domains larger specific areas another processing databases computationally expensive one main advantages strategy provides economical way make multilingual translation systems interlingua becomes unnecessary make translation pair pair languages system instead creating formula_1 language pairs formula_2 number languages system necessary make formula_3 pairs formula_2 languages interlingua main disadvantage strategy difficulty creating adequate interlingua abstract independent source target languages languages added translation system different potent interlingua must express possible translation directions another problem difficult extract meaning texts original languages create intermediate representation
|
Computational linguistics
|
provisioning telecommunications telecommunication provisioning involves process preparing equipping network allow provide new services users national security/emergency preparedness telecommunications services provisioning equates initiation includes altering state existing priority service capability concept network provisioning service mediation mostly used telecommunication industry refers provisioning customer services network elements requires existence networking equipment depends network planning design modern signal infrastructure employing information technology levels possible distinction telecommunications services higher level infrastructure accordingly provisioning configures required systems provides users access data technology resources refers enterprise-level information-resource management involved organizationally cio typically manages provisioning necessarily involving human resources departments cooperating core provisioning process monitors access rights privileges ensure security enterprise resources user privacy secondary responsibility ensures compliance minimizes vulnerability systems penetration abuse tertiary responsibility tries reduce amount custom configuration using boot image control methods radically reduce number different configurations involved discussion provisioning often appears context virtualization orchestration utility computing cloud computing open-configuration concepts projects instance oasis provisioning services technical committee pstc defines xml-based framework exchanging user resource service-provisioning information spml service provisioning markup language managing provisioning allocation identity information system resources within organizations provisioning taken place process sysopping ensures maintenance services expected standards provisioning thus refers setup startup part service operation sysopping ongoing support one type provisioning services assigned customer customer relationship management crm provisioned network element enabling service allows customer actually use service relation service configured crm service network elements necessarily 1:1 relation services enabled one network element e.g microsoft media server mms // service provisioning service mediation device translates service corresponding parameters service one services/parameters network elements involved algorithm used translate system service network services called provisioning logic electronic invoice feeds carriers automatically downloaded directly core telecom expense management tem software immediately conduct audit single line item charge way user support operations center usoc level provisioning software capture circuit number provided carriers bills outside contracted rate exception rule trigger red flag notify pre-established staff member review billing error server provisioning set actions prepare server appropriate systems data software make ready network operation typical tasks provisioning server select server pool available servers load appropriate software operating system device drivers middleware applications appropriately customize configure system software create change boot image server change parameters ip address ip gateway find associated network storage resources sometimes separated resource provisioning audit system auditing system ensure oval compliance limit vulnerability ensure compliance install patches actions restart system load new software makes system ready operation typically internet service provider isp network operations center perform tasks well-defined set parameters example boot image organization approved uses software license many instances boot image create virtual dedicated host many software products available automate provisioning servers services end-user devices examples bmc bladelogic server automation hp server automation ibm tivoli provisioning manager redhat kickstart xcat hp insight cmu etc middleware applications installed either operating system installed afterwards using application service automation tool questions addressed academia provisioning issued many servers needed multi-tier multi-service applications cloud computing servers may provisioned via web user interface application programming interface one unique things cloud computing rapidly easily done monitoring software used trigger automatic provisioning existing resources become heavily stressed short server provisioning configures servers based resource requirements use hardware software component e.g single/dual processor ram hdd raid controller number lan cards applications os etc depends functionality server isp virtualization nos voice processing server redundancy depends availability servers organization critical applications less downtime using cluster servers raid mirroring system service used larger scale centers part avoid additional resource provisioning may done per service several software market server provisioning cobbler hp intelligent provisioning user provisioning refers creation maintenance deactivation user objects user attributes exist one systems directories applications response automated interactive business processes user provisioning software may include one following processes change propagation self-service workflow consolidated user administration delegated user administration federated change control user objects may represent employees contractors vendors partners customers recipients service services may include electronic mail inclusion published user directory access database access network mainframe etc user provisioning type identity management software particularly useful within organizations users may represented multiple objects multiple systems multiple instances on-demand self-service described national institute standards technology nist essential characteristic cloud computing self-service nature cloud computing lets end users obtain remove cloud services―including applications infrastructure supporting applications configuration― without requiring assistance staff member automatic self-servicing may target different application goals constraints e.g deadlines cost well handling different application architectures e.g. bags-of-tasks workflows cloud users obtain cloud services cloud service catalog self-service portal business users obtain configure cloud services means staff productive gives time manage cloud infrastructures however one problem cloud service provisioning instantaneous cloud vm acquired time user may take several minutes acquired vm ready use vm startup time dependent factors image size vm type data center location number vms etc cloud providers different vm startup performance mobile subscriber provisioning refers setting new services gprs mms instant messaging existing subscriber mobile phone network gateways standard internet chat mail services network operator typically sends settings subscriber handset using sms text services html less commonly wap depending mobile operating systems accept general example provisioning data services mobile user using device voice calling may wish switch data services order read emails browse internet mobile device services provisioned thus user able stay connected push emails features smartphone services device management systems benefit end-users incorporating plug play data services supporting whatever device end-user using.. platform automatically detect devices network sending settings immediate continued usability process fully automated keeping history used devices sending settings subscriber devices previously set one method managing mobile updates filter imei/imsi pairs operators report activity 50 over-the-air settings update files per second changed refers delivering mobile content mobile internet mobile phone agnostic features said device may include operating system type versions java version browser version screen form factors audio capabilities language settings plethora characteristics april 2006 estimated 5000 permutations relevant mobile content provisioning facilitates common user experience though delivered widely different handsets getting user customer online beyond user provisioning network provisioning client system must configured process may include many steps depending connection technology question dsl cable fibre etc. possible steps four approaches provisioning internet access
|
Operating systems
|
datamapper datamapper object-relational mapper library written ruby follows active record pattern even though name implies follows data mapper pattern datamapper 1 may achieved total decoupling object database suggested data mapper pattern appears datamapper 2 intended change la virtus library adapted datamapper datamapper 2 project renamed launch released ruby object mapper rom august 2013 features datamapper datamapper designed abstract orm strictly sql based martin fowler enterprise pattern result datamapper adapters built non-sql databases couchdb apache solr webservices salesforce.com
|
Databases
|
stingray phone tracker stingray imsi-catcher controversial cellular phone surveillance device manufactured harris corporation initially developed military intelligence community stingray similar harris devices widespread use local state law enforcement agencies across canada united states united kingdom stingray also become generic name describe kinds devices stingray imsi-catcher passive digital analyzer active cell-site simulator capabilities operating active mode device mimics wireless carrier cell tower order force nearby mobile phones cellular data devices connect stingray family devices mounted vehicles aeroplanes helicopters unmanned aerial vehicles hand-carried versions referred trade name kingfish active mode stingray force compatible cellular device given area disconnect service provider cell site e.g. operated verizon etc establish new connection stingray cases accomplished stingray broadcast pilot signal either stronger made appear stronger pilot signals broadcast legitimate cell sites operating area common function cellular communications protocols cellular device connect cell site offering strongest signal stingrays exploit function means force temporary connections cellular devices within limited area process forcing connections compatible cellular devices given area stingray operator needs determine device desired surveillance target accomplished downloading imsi esn identifying data devices connected stingray context imsi equivalent identifier obtained cellular service provider third-party stingray downloads data directly device using radio waves cases imsi equivalent identifier target device known stingray operator beforehand case operator download imsi equivalent identifier device connects stingray downloaded imsi matches known imsi desired target dragnet end operator proceed conduct specific surveillance operations target device cases imsi equivalent identifier target known stingray operator goal surveillance operation identify one cellular devices used known area example visual surveillance conducted group protestors stingray used download imsi equivalent identifier phone within protest area identifying phones locating tracking operations conducted service providers forced turn account information identifying phone users cellular telephones radio transmitters receivers much like walkie-talkie however cell phone communicates repeater inside nearby cell tower installation installation devices take cell calls geographic area repeat cell installations repeat signals onward destination telephone either radio landline wires radio used also transmit caller voice/data back receiver cell telephone two-way duplex phone conversation exists via interconnections make work correctly system allows automatic increases decreases transmitter power individual cell phone tower repeater minimum transmit power used complete hold call active allows users hear heard continuously conversation goal hold call active use least amount transmitting power mainly conserve batteries efficient tower system sense cell phone coming clearly order cell phone boost transmit power user control boosting may occur split second whole conversation user remote location power boost may continuous addition carrying voice data cell phone also transmits data automatically boosted system detects need encoding transmissions ensures cross talk interference occurs two nearby cell users boosting power however limited design devices maximum setting standard systems high power thus overpowered secret systems using much boosted power take user cell phone overpowered way cell phone indicate change due secret radio programmed hide normal detection ordinary user know cell phone captured via overpowering boosts ways secret capture need overpower person shouting drowns someone whispering boost rf watts power cell telephone system overtake control system—in total even one conversation strategy requires rf power thus simple types secret control power boosting equipment installed anywhere antenna including vehicle perhaps even vehicle move secretly boosted system takes control manipulation possible simple recording voice data total blocking cell phones geographic area stingray used identify track phone compatible cellular data device even device engaged call accessing data services stingray closely resembles portable cellphone tower typically law enforcement officials place stingray vehicle compatible computer software stingray acts cellular tower send signals get specific device connect cell phones programmed connect cellular tower offering best signal phone stingray connect computer system determines strength signal thus distance device vehicle moves another location sends signals connects phone signal strength determined enough locations computer system centralizes phone able find cell phones programmed constantly search strongest signal emitted cell phone towers area course day cell phones connect reconnect multiple towers attempt connect strongest fastest closest signal way designed signals stingray emits far stronger coming surrounding towers reason cell phones vicinity connect stingray regardless cell phone owner ’ knowledge stingray capable locating device interfering device collecting personal data device fbi claimed used identify locate track cellular device stingray collect communications content forward service provider instead device causes disruption service scenario attempt cellular device user place call access data services fail stingray conducting surveillance august 21 2018 senator ron wyden noted harris corporation confirmed stingrays disrupt targeted phone communications additionally noted company claims cell-site simulators include feature detects permits delivery emergency calls 9-1-1 officials admitted office feature independently tested part federal communication commission ’ certification process able confirm feature capable detecting passing-through 9-1-1 emergency communications made people deaf hard hearing speech disabled using real-time text technology way software upgrades stingray similar harris products used intercept gsm communications content transmitted over-the-air target cellular device legitimate service provider cell site stingray way following man-in-the-middle attack 1 simulate cell site force connection target device 2 download target device imsi identifying information 3 conduct gsm active key extraction obtain target device stored encryption key 4 use downloaded identifying information simulate target device over-the-air 5 simulating target device establish connection legitimate cell site authorized provide service target device 6 use encryption key authenticate stingray service provider target device 7 forward signals target device legitimate cell site decrypting recording communications content gsm active key extraction performed stingray step three merits additional explanation gsm phone encrypts communications content using encryption key stored sim card copy stored service provider simulating target device explained man-in-the-middle attack service provider cell site ask stingray believes target device initiate encryption using key stored target device therefore stingray needs method obtain target device stored encryption key else man-in-the-middle attack fail gsm primarily encrypts communications content using a5/1 call encryption cypher 2008 reported gsm phone encryption key obtained using 1,000 worth computer hardware 30 minutes cryptanalysis performed signals encrypted using a5/1 however gsm also supports export weakened variant a5/1 called a5/2 weaker encryption cypher cracked real-time a5/1 a5/2 use different cypher strengths use underlying encryption key stored sim card therefore stingray performs gsm active key extraction step three man-in-the-middle attack follows 1 instruct target device use weaker a5/2 encryption cypher 2 collect a5/2 encrypted signals target device 3 perform cryptanalysis a5/2 signals quickly recover underlying stored encryption key encryption key obtained stingray uses comply encryption request made service provider man-in-the-middle attack rogue base station force unencrypted links supported handset software rogue base station send 'cipher mode settings element see gsm 04.08 chapter 10.5.2.9 phone element clearing one bit marks encryption used cases phone display could indicate use unsafe link user interface software phones interrogate handset radio subsystem use insecure mode display warning indication passive mode stingray operates either digital analyzer receives analyzes signals transmitted cellular devices and/or wireless carrier cell sites radio jamming device transmits signals block communications cellular devices wireless carrier cell sites passive mode meant stingray mimic wireless carrier cell site communicate directly cellular devices stingray test phone used conduct base station surveys process collecting information cell sites including identification numbers signal strength signal coverage areas conducting base station surveys stingray mimics cell phone passively collecting signals transmitted cell-sites area stingray base station survey data used narrow past locations cellular device used conjunction historical cell site location information hcsli obtained wireless carrier hcsli includes list cell sites sectors accessed cellular device date time access made law enforcement often obtain hcsli wireless carriers order determine particular cell phone located past information obtained law enforcement use map cell site locations determine past geographical locations cellular device however signal coverage area given cell site may change according time day weather physical obstructions relation cellular device attempts access service maps cell site coverage areas used law enforcement may also lack precision general matter reasons beneficial use stingray test phone map precise coverage areas cell sites appearing hcsli records typically done time day weather conditions effect hcsli logged using stingray conduct base station surveys manner allows mapping cell site coverage areas accurately match coverage areas effect cellular device used use devices frequently funded grants department homeland security los angeles police department used department homeland security grant 2006 buy stingray regional terrorism investigations however according electronic frontier foundation lapd using investigation imaginable addition federal law enforcement military intelligence agencies stingrays recent years purchased local state law enforcement agencies 2006 harris corporation employees directly conducted wireless surveillance using stingray units behalf palm bay police department — harris campus — response bomb threat middle school search conducted without warrant judicial oversight american civil liberties union commonly referred aclu confirmed local police cell site simulators washington nevada arizona alaska missouri new mexico georgia massachusetts state police cell site simulators oklahoma louisiana pennsylvania delaware local state police cell site simulators california texas minnesota wisconsin michigan illinois indiana tennessee north carolina virginia florida maryland new york 60 police use cell site simulators unknown remaining states however many agencies disclose use stingray technology statistics still potentially under-representation actual number agencies according recent information published american civil liberties union 72 law enforcement agencies 24 states stingray technology 2017 since 2014 numbers increased 42 agencies 17 states 60 following federal agencies united states validated use cell site simulators federal bureau investigation drug enforcement administration us secret service immigration customs enforcement us marshals service bureau alcohol tobacco firearms explosives us army us navy us marine corps us national guard us special command national security agency 60 several court decisions issued legality using stingray without warrant courts ruling warrant required others requiring warrant police vancouver bc canada admitted much speculation across country made use stingray device provided rcmp also stated intended make use devices future two days later statement edmonton police force taken confirming use devices said later mean create called miscommunication privacy international sunday times reported usage stingrays imsi-catchers ireland irish garda síochána ombudsman commission gsoc oversight agency irish police force garda síochána june 10 2015 bbc reported investigation sky news possible false mobile phone towers used london metropolitan police commissioner bernard hogan-howe refused comment february 2015 april 2016 12 companies united kingdom authorized export imsi-catcher devices states including saudi arabia uae turkey critics expressed concern export surveillance technology countries poor human rights records histories abusing surveillance technology increasing use devices largely kept secret court system public 2014 police florida revealed used devices least 200 additional times since 2010 without disclosing courts obtaining warrant one reasons tallahassee police provided pursuing court approval efforts would allegedly violate non-disclosure agreements ndas police sign manufacturer american civil liberties union filed multiple requests public records florida law enforcement agencies use cell phone tracking devices local law enforcement federal government resisted judicial requests information use stingrays refusing turn information heavily censoring june 2014 american civil liberties union published information court regarding extensive use devices local florida police publication united states marshals service seized local police surveillance records bid keep coming court cases police refused disclose information courts citing non-disclosure agreements signed harris corporation fbi defended agreements saying information technology could allow adversaries circumvent aclu said potentially unconstitutional government surveillance scale remain hidden public private corporation desires secrecy certainly concealed judges 2015 santa clara county pulled contract negotiations harris stingray units citing onerous restrictions imposed harris could released public records requests reason exiting negotiations recent years legal scholars public interest advocates legislators several members judiciary strongly criticized use technology law enforcement agencies critics called use devices government agencies warrantless cell phone tracking frequently used without informing court system obtaining warrant electronic frontier foundation called devices “ unconstitutional all-you-can-eat data buffet. ” june 2015 wnyc public radio published podcast daniel rigmaiden stingray device 2016 professor laura moy georgetown university law center filed formal complaint fcc regarding use devices law enforcement agencies taking position devices mimic properties cell phone towers agencies operating violation fcc regulation lack appropriate spectrum licenses number countermeasures stingray devices developed example crypto phones gmsk cryptophone firewalls identify thwart stingray actions alert user imsi capture
|
Computer security
|
openzaurus openzaurus defunct embedded operating system sharp zaurus personal mobile tool pda original form project repackaging sharprom zaurus factory supplied kernel root filesystem image order make zaurus os closer needs developer community sharprom altered use bugfixes software additions even removals order make package open openzaurus project revamped completely becoming debian-based built source ground due change direction openzaurus became quite similar embedded debian-based distributions familiar ipaq openzaurus current form facilitates easy method users build custom images efforts openzaurus along embedded linux projects integrated openembedded project provides common framework projects addition building custom openzaurus image using openembedded metadata openzaurus distribution acquired three variations version release april 26 2007 announced openzaurus project future development efforts focus ångström distribution embedded systems
|
Computer architecture
|
flag convenience flag convenience foc business practice whereby ship owners register merchant ship ship register country ship owners ship flies civil ensign country called flag state term often used pejoratively practice regarded contentious merchant ship required international law registered registry created country ship subject laws country used also ship involved case admiralty law ship owners may elect register ship foreign country enables avoid regulations owners ’ country may example stricter safety standards may also select jurisdiction reduce operating costs bypassing laws protect wages working conditions mariners term flag convenience used since 1950s registry nationality residency requirement ship registration often described open registry panama example offers advantages easier registration often online ability employ cheaper foreign labour furthermore foreign owners pay income taxes modern practice ships registered foreign country began 1920s united states shipowners seeking serve alcohol passengers prohibition registered ships panama owners soon began perceive advantages terms avoiding increased regulations rising labor costs continued register ships panama even prohibition ended use open registries steadily increased 1968 liberia grew surpass united kingdom world largest ship register half world merchant ships registered open registries almost 40 entire world fleet terms deadweight tonnage registered panama liberia marshall islands 2006 20 high-seas fishing vessels registered states connected according ihs markit march 2017 panama 8,052 ships registry singapore 3,574 ships liberia 3,277 ships marshall islands 3,244 ships hong kong 2,594 ships open registries criticised mainly trade union organisations based developed countries especially europe one criticism shipowners want hide ownership may select flag-of-convenience jurisdiction enables legally anonymous ships flags convenience found engaging crime offer substandard working conditions negatively impact environment primarily illegal unreported unregulated fishing shipowners may select jurisdiction measurement rules reduce certified grt size ship reduce subsequent port call dock dues consideration carnival cruise line changed flag rms empress canada 1972 panama 2011 cunard cruise line registered ships bermuda besides considerations enabled ship captains marry couples sea weddings sea described lucrative market thirteen flag states found international shipping organisations substandard regulations hand maritime industry practitioners seafarers countries contend natural product globalisation supporters practice however point economic regulatory advantages increased freedom choosing employees international labour pool ship owners developed countries use practice competitive global environment ships thirteen flags convenience targeted special enforcement countries visit ports countries called port state control international law requires every merchant ship registered country country ship registered flag state flag state gives ship right fly civil ensign ship operates laws flag state laws used ship involved admiralty case ship flag state exercises regulatory control vessel required inspect regularly certify ship equipment crew issue safety pollution prevention documents organization actually registers ship known registry registries may governmental private agencies reasons choosing open register varied include tax avoidance ability avoid national labor environmental regulations ability hire crews lower-wage countries national closed registries typically require ship owned constructed national interests least partially crewed citizens conversely open registries frequently offer on-line registration questions asked use flags convenience lowers registration maintenance costs turn reduces overall transportation costs accumulated advantages significant example 1999 28 american company sealand fleet 63 ships foreign-flagged saving company us 3.5 million per ship every year environmental disaster caused 1978 sinking flew liberian flag spurred creation new type maritime enforcement resulting strong political public outcry amoco cadiz sinking fourteen european nations signed 1982 paris memorandum understanding port state control paris mou port state control ships international trade became subject inspection states visit addition shipboard living working conditions inspections cover items concerning safety life sea prevention pollution ships cases port state inspection uncovers problems ship port state may take actions including detaining ship 2015 member states paris mou conducted 17,858 inspections deficiencies resulted 595 detained vessels 11 banned member states tokyo memorandum understanding conducted 17,269 ship inspections 2015 recording 83,606 deficiencies resulted 1,153 detentions principle genuine link ship owners flag state dates back 1958 article 5 1 geneva convention high seas also required state must effectively exercise jurisdiction control administrative technical social matters ships flying flag principle repeated article 91 1982 treaty called united nations convention law sea often referred unclos 1986 united nations conference trade development attempted solidify genuine link concept united nations convention conditions registration ships convention registration ships would require flag state linked ships either economic stake ownership ships providing mariners crew ships come force 1986 treaty requires 40 signatories whose combined tonnage exceeds 25 world total 14 countries signed treaty merchant ships used false flags tactic evade enemy warships since antiquity examples found early roman era middle ages following american revolutionary war merchantmen flying flag fledgling united states quickly found offered little protection attack barbary pirates – many responded seeking transfer registry back great britain use false flags frequently used british napoleonic wars united states war 1812 mid-19th century slave ships flew various flags avoid searched british anti-slavery fleets belen quezada august 1919 first foreign ship re-registered panamanian registry employed running illegal alcohol canada united states prohibition modern practice registering ships foreign countries gain economic advantage originated united states era world war though term flag convenience come use 1950s 1915 1922 several laws passed united states strengthen united states merchant marine provide safeguards mariners period u.s.-flagged ships became subject regular inspections undertaken american bureau shipping also time robert lafollette seamen act 1915 described magna carta sailors rights seamen act regulated mariners working hours payment established baseline requirements shipboard food also reduced penalties disobedience abolished practice imprisoning sailors offense desertion another aspect seamen act enforcement safety standards requirements lifeboats number qualified able seamen board officers seamen able speak language laws put u.s.-flagged vessels economic disadvantage countries lacking safeguards ships started re-registered panama open registry 1919 addition sidestepping seamen act panamanian-flagged ships early period paid sailors japanese wage scale much lower western merchant powers early phase world war ii transfer american-owned ships panama registry sanctioned united states government could used deliver materials britain without dragging united states neutral unintentionally war liberian open registry founded 1948 brainchild edward stettinius franklin d. roosevelt secretary state world war ii stettinius created corporate structure included liberia corporation joint-venture government liberia corporation structured one-fourth revenue would go liberian government another 10 went fund social programs liberia remainder returned stettinius corporation liberian registry created time panama registry becoming less attractive several reasons including unpopularity u.s. labor movement european shipping concerns political unrest panama increases fees regulations 11 march 1949 greek shipping magnate stavros niarchos registered first ship liberian flag world peace stettinius died 1949 ownership registry passed international bank washington led general george olmsted within 18 years liberia grew surpass united kingdom world largest register due liberia 1989 1999 civil wars registry eventually fell second panama flag convenience maritime funds continued supply 70 total government revenue civil war 1990 liberia joined republic marshall islands develop new maritime corporate program resulting company international registries formed parent company 1993 bought management taking liberian government americo-liberian warlord charles taylor signed new registry contract liberian international ship corporate registry commonly known liscr liscr one legal sources income taylor regime liberia registry operated virginia united states open registries panama liberia marshall islands accounted almost 40 entire world fleet terms deadweight tonnage year top ten flags convenience registered 55 world deadweight tonnage including 61 bulk carriers 56 oil tankers counteract class hopping 2009 iacs established transfer class agreement toca international transport workers federation itf maintains list registries considers flags convenience foc registries developing list itf considers ability willingness flag state enforce international minimum social standards vessels degree ratification enforcement ilo conventions recommendations safety environmental record list includes 35 countries panama liberia marshall islands world three largest registries terms deadweight tonnage dwt three organizations registered 11,636 ships total 39 world shipborne carrying capacity panama dominates scene 8,065 ships accounting almost 23 world dwt three marshall islands 1,265 registered ships greatest rate dwt increase 2009 increasing tonnage almost 15 bahamian flag ranks sixth worldwide behind hong kong greek registries similar size marshallese flag convenience 200 ships carrying capacity lower malta ninth position worldwide 100 ships bahamas capacity representing 4 world fleet 12 growth year eleventh position cyprus registered 1,016 ships 2009 2.6 world tonnage remaining top 11 flags convenience antigua barbuda 20 bermuda 22 saint vincent grenadines 26 french international ship register fis number 27 bermuda fis fewer 200 ships apiece large average bermudan ship average fis ship way reference average capacity ships u.s. u.k. registers respectively registries antigua barbuda saint vincent grenadines 1,000 ships average capacity respectively remaining flags convenience listed itf account less 1 world dwt half world merchant ships measured tonnage registered flags convenience number common threads found criticisms flag convenience system one flag states insufficient regulations regulations poorly enforced another many cases flag state identify shipowner much less hold owner civilly criminally responsible ship actions result lack flag state control flags convenience criticized grounds enabling tax avoidance providing environment conducting criminal activities supporting terrorism providing poor working conditions seafarers adverse effect environment david cockroft former general secretary itf says panama largest maritime register followed liberia landlocked bolivia also major registry mongolia also registers based countries example panama consulates manage documentation collect registration fees liberia registry managed company virginia bahamas city london ship beneficial owner legally financially responsible ship activities number reasons justifiable suspicious shipowners wish conceal ownership may use number strategies achieve goal jurisidictions permit actual owners may establish shell corporations legal owners ships making difficult impossible track beneficial owner ship 2004 report un secretary general consultative group flag state implementation reported easy comparatively inexpensive establish complex web corporate entities provide effective cover identities beneficial owners want known according 2003 report organisation economic co-operation development oecd report entitled ownership control ships corporate structures often multi-layered spread across numerous jurisdictions make beneficial owner almost impenetrable law enforcement officials taxation report concludes regardless reasons cloak anonymity made available provided also assist may wish remain hidden engage illegal criminal activities including terrorists oecd report concludes use bearer shares perhaps single important perhaps widely used mechanism protect anonymity ship beneficial owner physically possessing bearer share accords ownership corporation requirement reporting transfer bearer shares every jurisdiction requires serial numbers even recorded two similar techniques provide anonymity ship beneficial owner nominee shareholders nominee directors jurisdictions require shareholder identities reported loophole may exist beneficial owner may appoint nominee shareholder nominee legally compelled reveal identity beneficial owner corporations required least one director however many jurisdictions allow nominee director nominee director name would appear corporate paperwork place beneficial owners like nominee shareholders jurisdictions compel nominee director divulge identity beneficial owners hurdle jurisdictions allow corporation named director flag convenience ships long linked crime high seas example 1982 honduras shut open registry operations enabled illegal traffic kinds given honduras bad name ships registered cambodia shipping corporation csc found smuggling drugs cigarettes europe breaking iraq oil embargo engaging human trafficking prostitution europe asia response activities 2000 ahamd yahya cambodian ministry public works transport told industry publication fairplay n't know care owns ships whether 're 'white 'black business ... concern less two years later french forces seized cambodian-flagged greek-owned mv winner cocaine smuggling shortly seizure cambodian prime minister hun sen closed registry foreign ships cambodia canceled contract csc shortly thereafter north korean flag convenience also garnered significant scrutiny 2003 north korean freighter pong su reflagged tuvalu middle voyage shortly seized australian authorities smuggling heroin country year thirteen nations began monitoring vessels north korean flag illicit cargos like drugs missiles nuclear weapon fuel accompanying material ilo maritime labour convention 2006 international labour organization estimated time approximately 1,200,000 working seafarers across world document goes say working aboard ships flagged states exercise effective jurisdiction control ships seafarers often work unacceptable conditions detriment well-being health safety safety ships work international transport workers federation goes stating flags convenience provide means avoiding labor regulation country ownership become vehicle paying low wages forcing long hours work unsafe working conditions since foc ships real nationality beyond reach single national seafarers trade union also say ships low safety standards construction requirements enforce safety standards minimum social standards trade union rights seafarers frequently fail pay crews poor safety records engage practices abandoning crewmen distant ports flag convenience ships involved highest-profile oil spills history maltese-flagged bahamian-flagged marshallese-flagged deepwater horizon liberian-flagged ss torrey canyon common environmental criticism face regards illegal fishing critics flag convenience system argue many foc flag states lack resources properly monitor control vessels environmental justice foundation ejf contends illegal unreported unregulated fishing iuu vessels use flags convenience avoid fisheries regulations controls flags convenience help reduce operating costs associated illegal fishing methods help illegal operators avoid prosecution hide beneficial ownership result flags convenience perpetuate iuu fishing extensive environmental social economic impacts particularly developing countries ejf campaigning end granting flags convenience fishing vessels effective measure combat iuu fishing according franz fischler european union fisheries commissioner international regulations maritime industry promulgated agencies united nations particularly international maritime organization international labour organization flag states adopt regulations ships ratifying individual treaties one common criticism flag convenience countries allow shipowners avoid regulations ratifying important treaties failing enforce international chamber shipping ics issues annual report entitled shipping industry flag state performance table identifying six core conventions representing minimum level maritime regulation viewpoint shipowners solas marpol 66 stcw mlc clc/fund92 35 flag convenience countries listed itf ratified stcw convention concerning standards training certification watchkeeping seafarers 19 ratified six however least fourteen listed countries ratified remaining five conventions put context 60 flag states ratified six conventions including china united states america safety life sea solas load line 66 conventions focus shipboard safety issues originally developed response sinking rms titanic solas sets regulations lifeboats emergency equipment safety procedures including continuous radio watches updated include regulations ship construction fire protection systems life-saving appliances radio communications safety navigation management safe operation ships safety security concerns 66 sets standards minimum buoyancy hull stress ship fittings well establishing navigational zones extra precautions must taken international labour organization maritime labour convention 2006 provides comprehensive rights protection work seafarers including requirements minimum age qualifications hours work rest medical care complaint procedures wage payments onboard living arrangements mlc replaced number earlier ilo conventions including ilo147 marpol clc/fund92 relate pollution international convention prevention pollution ships 1973 marpol modified protocol 1978 including annexes i–vi regulates pollution ships including oil air pollution shipboard sewage garbage civil liability oil pollution damage clc international fund compensation oil pollution damage fund92 together provide mechanisms ensure compensation victims oil spills 1978 number european countries agreed hague audit labour conditions board vessels vis-a-vis rules international labour organization end 1982 paris memorandum understanding port state control paris mou established setting port state control standards twenty-six european countries canada several regional memoranda understanding established based paris model including memorandum understanding port state control asia-pacific region typically referred tokyo mou organizations black sea caribbean indian ocean mediterranean latin america tokyo paris organizations generate based deficiencies detentions black- white- grey-lists flag states us coast guard handles port state control inspections us maintains similar target list underperforming flag states least thirteen thirty-five flags convenience listed itf targeted special enforcement countries paris tokyo mous u.s. coast guard united nations conference trade development 2009 report maritime trade states shipowners often register ships foreign flag order employ seafarers developing countries lower wages philippines china supply large percentage maritime labor general major flags convenience particular 2009 flag-states employing highest number expatriate-filipino seafarers panama bahamas liberia marshall islands year 150,000 filipino sailors employed four flags convenience 2006 study united states maritime administration marad sailors people republic china comprised 40 crews surveyed ships flying panamanian flag around 10 flying liberian flag marad report referred china philippines low cost crewing sources seafaring industry often divided two employment groups licensed mariners including deck officers marine engineers mariners required licenses able seamen cooks required certified latter group collectively known unlicensed mariners ratings differences wages seen groups high cost crewing sources united states low cost sources china philippines however salaries flag convenience ships still far higher median salaries non-seafarers countries addition income tax exemption seamen particularly philippines unlicensed mariners 2009 statistics american bureau labor statistics give median earnings able ordinary seamen us 35,810 varying 21,640 10th percentile 55,360 90th percentile compared 2006 statistics international labour organization giving average yearly earnings filipino chinese able seamen around 2,000 3,000 per year php9,900 per month cny3,071 per year among licensed mariners american chief engineers earned median 63,630 varying 35,030 109,310 filipino counterparts averaged 5,500 per year php21,342 per month
|
Databases
|
pc1512 amstrad pc1512 amstrad mostly ibm pc-compatible computer system first manufactured 1986 later succeeded pc1640 launched £499 sold well one first cheap pcs europe significantly helped open european pc market consumers well businesses amstrad advertising pc1512 aimed homes rather offices 1512 influence uk pc magazine pc plus originally targeted amstrad pc 1512 compatibles since home ownership pcs time rare pc1512 shipped 512 kb ram could upgraded 640 kb ram 16 pieces 4164-120 dynamic ram chips 64kbx1 per chip setting jumper video output compatible cga standard extension allowing 16 colours used 640×200 graphics mode cpu pc1512 later pc1640 8 mhz intel 8086 sufficient playing secret monkey island maniac mansion prince persia power supply located monitor made upgrading difficult amstrad licensed ms-dos 3.2 digital research dos plus largely compatible ms-dos included features cp/m ability read cp/m disks one operating systems could used time also licensed gem windowing system supported customized cga hardware 1512 pc1512 followed pc1640 640 kb ram ega-compatible graphics chipset though ecd model could display ega modes either model shipped one two 5¼-inch floppy drives optionally hard drive either 10 20 mb amstrad also attempted expand market share selling computers united states us pc1512 marketed pc6400 included 20 mb hard drive ram upgrade 640 kb pc1512 also sold sinclair pc500 input devices supplied machine notable mouse amstrad mouse incompatible serial mice common time supported games including elite many dos programs problems keyboard sported atari-compatible joystick port digital joysticks joystick movements buttons mapped unused keyboard codes allowing joystick used many dos games written keyboard control series somewhat unusual fact physical volume control internal speaker allowed user make machine beep quietly silently boot time onwards innovation still present modern pcs legacy beeper typically still fixed-volume device whereas ibm pc almost pc compatibles power supply corner main case pc1512 power supply integrated monitor monitor sufficient venting cool convection instead needing fan pc1512 therefore quieter pcs rumours circulated amstrad pc would overheat existing owners would note happen new buyers discouraged result later models cooling fan integrated main case another example rumour suggestion issues 'unshielded power supply monitor affecting optional hard drive could installed back base unit would solved taping tin foil aluminum foil back base unit bottom monitor shield hard drive four discs supplied floppy models five hard drive models amstrad launched amstrad dmp3000 printer 80 character dot matrix printer ibm epson compatibility boasted nlq near letter quality could handle a4 fanfold paper connected computer via parallel port amstrad also launched sm2400 modem quad speed dial-up modem boasted speeds 2400 baud internal isa modem encased plastic could fit amstrad pc1512 pc1640
|
Computer architecture
|
market zero-day exploits market zero-day exploits refers commercial activity happens around trafficking software exploits software vulnerabilities exploits used get remote access stored information information generated real time people use software case countries today given monopolistic nature internet content service providers one specific vulnerability used thousands millions people context criminals become interested vulnerabilities 2014 report mcafee center strategic international studies estimates cost cybercrime cyberespionage somewhere around 160 billion per year worldwide countries appointed public institutions deal issue likely conflict interest government access people information order prevent crime result national security agencies criminals hide certain software vulnerabilities users original developer type vulnerability known zero-day exploit much said academia regular media regulation zero-day exploits market however difficult reach consensus definitions zero-day exploits rather vague applicable one define use certain software malware used addition conflict interest within operations state could prevent regulation make mandatory disclosure zero-days governments face trade-off protecting citizens privacy reporting vulnerabilities private companies one hand undermining communication technologies used targets—who also threaten security public—on protection national security exploitation software vulnerabilities unknown companies public ultimate resource security agencies also compromises safety every single user third party including criminal organizations could making use resource hence users private firms incentives minimize risks associated zero-day exploits former avoid invasion privacy latter reduce costs data breaches include legal processes costs related development solutions fix patch original vulnerability software costs associated loss confidence clients product ablon libicki golay explained great extent inner workings zero-day market main findings separated five components expanded commodity currency marketplace supply demand components relationship pricing described additionally challenge definition given demand component paramount understand nature markets i.e white gray black regulation lack thereof exploits digital products means information goods near-zero marginal production costs however atypical information goods unlike e-books digital videos lose value easy replicate due fact exposed original developer patch vulnerability decreasing value commodity value go zero two reasons 1 distribution patch asymmetric 2 developers could use original bug create variant decreased cost also atypical time-sensitive commodities companies updating software regular basis patch useful lapse versions sometimes vulnerability corrected without external report third even confidential transactions use exploit create dysfunction user end exposing vulnerability leading loss value sense exploits non-excludable non-rivalrous cases transactions typically designed protect identity least one parties involved exchange dependent type market—white markets use traceable money—most purchases made stolen digital funds credit cards cryptocurrencies latter dominant trend last years prices gray market set dollars shown leaks hacking team email archive classically black markets—like illegal weapons narcotics—require huge network trusted parties perform transactions deal-making document forgery financial transfers illicit transport among others difficult enforce legal agreement within networks many criminal organizations recruit members close home proximity element increases cost transaction intermediaries required transnational transactions decreasing overall profit original seller zero-days hand virtual products easily sold without intermediaries internet available technologies strong enough provide anonymity low cost even need intermediaries unwitting data mules used avoid evidence wrongdoing black market lucrative compared gray markets gray markets involve transactions public institutions charge national security usually require use third parties hide traces transactions hacking team archive example contains alleged contracts ecuadorian national secretariat intelligence used two intermediaries robotec theola archive said third-party companies cicom robotec negotiated contracts behalf fbi dea respectively less likely white markets face problem interest hide transaction quite opposite companies actively promote use new patches supply chain complex involves multiple actors organized hierarchies administrators sit top followed technical experts next intermediaries brokers vendors sophisticated finally followed witting mules within chain command one find multiple products zero-day exploits found developed subject matter experts exploits easily commercialized almost person willing enter black market two reasons first devices use outdated deprecated software easily targeted exploits otherwise would completely useless second half-day exploits used graphical interfaces learned freely available tutorials means little expertise required enter market seller coexistence zero-day half-day markets influences resilience black market developers keep moving towards sophisticated end take-downs high organized crime increased suppliers easily replaced people lower levels pyramid take less day find new provider take-down operation easily last months getting top however requires personal connections good reputation digital black market different physical one half-day exploits usually traded easily accessible places zero-days often require double-blind auctions use multiple layers encryption evade law enforcement done forums boards hence transactions occur extremely vetted spaces buys zero-day exploits defines kind market dealing afidler differentiates white gray black markets following market-sizing methodology harvard business school guide differentiate white markets gray markets black markets white markets original developers reward security researchers reporting vulnerabilities average prices reported 2014 less ten thousands dollars special offers 100,000 made certain vulnerabilities based type criticality nature affected software fourteen percent microsoft apple adobe vulnerabilities past ten years came white market programs criminals buy black market however governments occasional buyers offer satisfied gray market find impediments acquire zero-days due international regulations hacking team states website sell products governments countries blacklisted u.s. eu un nato asean although found infringing policy prices usually 10–100 times higher market compared white market changes depending location buyer united states place best prices offered potential sellers allowed sell specific territories like cuba north korea case u.s. likely operate black market well gray markets buyers include clients private sector governments brokers resell vulnerabilities information regarding markets available requests confidential information governments price usually redacted safety purposes information leaked national security agencies private companies i.e finfisher hacking team tsyrklevich reported transactions made hacking team date represents best evidence available inner workings gray market however likely case procedures applied white black markets well typically parties opposed gray markets retailers item market damages profits reputation result usually pressure original manufacturer adjust official channels distribution state also plays important role enforcing penalties case law infringement however zero-day exploit market atypical way operates closer workings black market brokers bounty programs could seen retailers zero-days control whatsoever original producers bad independently discovered different often anonymous actors interest change channel distribution profit white gray markets much less risk former states usually complement labour original manufacturers restrict gray markets play different role zero-day market regular purchasers exploits given secretive nature information security interest disclose information software vulnerabilities interest case aligned criminals seek infiltrate devices acquire information specific targets argued presence intelligence agencies consumers bad could increase price zero-days even legitimate markets provide bargaining power black-market sellers finally private companies unwilling raise prices rewards levels reached gray black markets arguing sustainable defensive markets previous studies shown reward programs cost-effective private firms compared hiring in-house security researchers prize rewards keeps increasing might case anymore 2015 zerodium new start-up focused acquisition high-risk vulnerabilities announced new bounty program published formats required vulnerability submissions criteria determine prices—the popularity complexity affected software quality submitted exploit—and prices represents mixture transparency offered traditional vulnerability reward program high rewards offered gray black markets software developer companies perceived new approach threat primarily due fact high bounties could cause developer tester employees leave day jobs effects market however yet defined nsa criticized buying stockpiling zero-day vulnerabilities keeping secret developing mainly offensive capabilities instead helping patch vulnerabilities
|
Computer security
|
cyberhound cyberhound pty ltd formerly netbox blue pty ltd november 2015 australian-owned provider internet email security filtering management solutions founded brisbane john oxnam justin cooke trent davis 1999 privately held company cyberhound head office located fortitude valley queensland australia company provides products internet compliance management security john fison became chairman netbox blue 2006 director shareholder company january 2016 bloomberg acquired ip assets netbox blue bloomberg vault monitor social media trent davis works bloomberg 2008 netbox blue launched internet email filtering appliance specifically education sector technology offers cyberbullying protection category web filtering spam filtering virus protection internet quota management firewall late 2006 netbox blue partnered corporation ibm april 2008 global vendor canon solutions japan signed distribution agreement netbox blue netbox blue agreed provide spamchecker appliance—as known japan—to canon japan customers email filtering content control drop-in appliance result nine months co-development netbox blue canon japan specifically designed sme market japan netbox blue partnered anti-virus software provider eset partnership offered customers eset nod32 antivirus option netbox blue line utm virtualised security products result union small- medium-sized businesses smbs also access netbox blue integrated security management suite june 2012 netbox blue partnered edgewave inc deal enables edgewave provide customers netbox blue social media management technology safechat
|
Computer security
|
open port security parlance term open port used mean tcp udp port number configured accept packets contrast port rejects connections ignores packets directed called closed port ports integral part internet communication model — channel applications client computer reach software server services web pages ftp require respective ports open server order publicly reachable use terms open closed sometimes misleading though blurs distinction given port reachable unfiltered whether application actually listening port technically given port open context reachable enough communication channel established needs application service listening port accepting incoming packets processing application listening port incoming packets port simply rejected computer operating system ports closed context filtered use firewall firewall filter incoming packets letting packets configured packets directed port firewall configured close simply dropped transit though never existed malicious software acts service waiting connections remote attacker order give information control machine common security practice close unused ports personal computers block public access services might running computer without user knowledge whether due legitimate services misconfigured presence malicious software malicious black hat hackers crackers commonly use port scanning software find ports open unfiltered given computer whether actual service listening port attempt exploit potential vulnerabilities services find
|
Internet protocols
|
split horizon route advertisement computer networking split-horizon route advertisement method preventing routing loops distance-vector routing protocols prohibiting router advertising route back onto interface learned concept suggested 1974 torsten cegrell originally implemented arpanet inspired swedish network tidas example network node routes packets node b order reach node c links nodes distinct point-to-point links according split-horizon rule node advertise route c namely b c back b surface seems redundant since b never route via node route costs direct route b c however link b c goes b received route c b could end using route via would send packet right back b creating loop count infinity problem split-horizon rule place particular loop scenario happen improving convergence time complex highly-redundant environments split-horizon routing poison reverse variant split-horizon route advertising router actively advertises routes unreachable interface learned setting route metric infinite 16 rip effect announcement immediately remove looping routes propagate network main disadvantage poison reverse significantly increase size routing announcements certain fairly common network topologies allows improvement overall efficiency network case faults split horizon states neighboring router sends route router receiving router propagate route back advertising router interface route poisoning router detects one connected routes failed router poison route assigning infinite metric advertising neighbors router advertises poisoned route neighbors neighbors break rule split horizon send back originator poisoned route called poison reverse order give router enough time propagate poisoned route ensure routing loops occur propagation occurs routers implement hold-down mechanism poison reverse implemented algorithm often used within distance-vector routing use poison reverse solve count-to-infinity problem count infinity problem found distance vector routing basic idea poison reverse make sure path turn back node cost changed within network example would node z routes via node destination x cost z increases count infinity problem occur implement use poison reverse long z routes via node get x z broadcast infinite cost destination x node z routes via following topology assume distance vector table z destination z x z routes via get x cost 3 poison reverse kicks broadcast distance vector neighbors distance tables broadcast 0 1 ∞ x 0 1 3 see distance vector broadcast node end destination x infinity value solves count-to-infinity problem since link z bounce instead directly try another path poison reverse n't always work example link c would fail node c still try go b get destination cause b route loop solve poison reverse though completed implementation distance vector protocol called rip split-horizon method effective simple implement therefore used distance-vector protocols notably used
|
Internet protocols
|
interbase interbase relational database management system rdbms currently developed marketed embarcadero technologies interbase distinguished rdbmss small footprint close zero administration requirements multi-generational architecture interbase runs microsoft windows macos linux solaris operating systems well ios android interbase sql-92-compliant relational database supports standard interfaces jdbc odbc ado.net full interbase server installation requires around 40 mb disk minimum interbase client install requires 400 kb disk space interbase run embedded database regular server since interbase xe interbase includes 256bit aes strength encryption offers full database table column data encryption assists data controllers conform data protection laws around at-rest data providing separated encryption db access database ensuring database file encrypted wherever resides separation encryption also enables developers develop application rather worry data visible specific user login avoid blocking updates interbase uses multiversion concurrency control instead locks transaction create version record upon write step update fail rather blocked initially interbase also uses multi-generational records implement rollbacks rather transaction logs certain operations difficult implement multi-generational architecture hence perform slowly relative traditional implementation one example sql codice_1 verb even index available column columns included codice_1 records must visited order see visible current transaction isol interbase software—originally known groton database systems—was born ann harrison spare room ann first junior programmer company worked nearly every component version 0 3.3 jim starkey working dec datatrieve 4th generation language 4gl product came idea system manage concurrent changes many users idea dramatically simplified existing problems locking proving serious problem new relational database systems developed time starkey however idea spun original relational database project another group turf war ensued starkey left company shipping first version rdb/eln product although interbase implementation much similar system described reed mit dissertation database existed time starkey knew bernstein previous position computer corporation america later dec starkey stated arrived idea multiversion concurrency control independently comment starkey says inspiration multi-generational concurrency control database system done prime supported page level snapshots intention feature give reader consistent view database without blocking writers idea intrigued useful characteristic database system heard local workstation vendor apollo computer looking database offering unix machines agreed fund development encouragement formed groton database systems named town groton massachusetts located labor day 1984 started work would eventually released interbase 1986 apollo suffered corporate shakeup decided exit software business time product making money 1986 1991 product gradually sold ashton-tate makers famous dbase time purchasing various database companies order fill portfolio company soon trouble borland purchased ashton-tate 1991 acquiring interbase part deal early 2000 borland announced interbase would released open-source began negotiations spin separate company manage product people run new company borland could agree terms separation interbase remained borland product source code interbase version 6 released variant mozilla public license mid-2000 interbase division borland new management company released proprietary version interbase version 6 6.5 borland released several updates open source code announcing would longer actively develop open source project firebird open source fork interbase 6 code however remains active development 2001 backdoor discovered fixed software present versions since 1994 february 8 2006 borland announced intention sell line development tool products including interbase delphi jbuilder tools instead selling divisions borland spun subsidiary 14 november 2006 interbase along ide tools delphi jbuilder included new company product lineup 7 may 2008 borland embarcadero technologies announced embarcadero signed definitive asset purchase agreement purchase codegear acquisition approximately 24.5 million closed 30 june 2008 end 2002 borland released interbase version 7 featuring support smp enhanced support monitoring control server administrators borland released interbase 7.1 june 2003 7.5 december 2004 7.5.1 june 1 2005 september 2006 borland announced availability interbase 2007 new features include point time recovery via journaling also allows recoverability without performance penalty synchronous writes incremental backup batch statement operations new unicode character encodings new odbc driver september 2008 embarcadero announced availability interbase 2009 new features include full database encryption selective column-level data encryption over-the-wire encryption offering secure tcp/ip communication via secure socket layer ssl september 2010 embarcadero announced availability interbase xe new features include 64 bit client server improved security improved scalability support dynamic sql stored procedures optimized performance large objects stream methods 2013/2014 embarcadero added ios android available supported platforms interbase xe3 additionally interbase iblite released run time royalty free edition interbase covering windows macos ios android december 2014 embarcadero released interbase xe7 offering brand new patent pending change tracking technology called change views. added ubuntu certified linux platforms also added 64bit linux support additional 64bit transaction id introduced new distinguished data dumps enabling rapid updates read copies master database march 2017 embarcadero released interbase 2017 interbase 2017 includes interbase togo linux server wide monitoring support interbase server number language enhancements including derived tables common table expressions truncate table faster data removal enhancements change views expanding subscription table wide scope new transaction isolation levels transaction wait time management
|
Databases
|
lightweight portable security lightweight portable security lps linux livecd liveusb developed publicly distributed united states department defense ’ air force research laboratory designed serve secure end node run almost intel-based computer pc mac lps boots ram creating pristine non-persistent end node supports dod-approved common access card cac readers required authenticating users pki-authenticated gateways access internal dod networks lps turns untrusted system home computer trusted network client trace work activity malware written local computer hard drive september 2011 version 1.2.5 lps public distribution includes smart card-enabled firefox browser supporting dod cac personal identity verification piv cards pdf text viewer java file browser remote desktop software citrix microsoft vmware view ssh client public edition encryption wizard ability use usb flash drives public deluxe version also available adds libreoffice adobe reader software lps encryption wizard initiated air force research laboratory anti-tamper software protection initiative program started 2001 2016 program ending lps encryption wizard moved trusted end node security program office lps version 1.7 rebranded trusted end node security tens encryption wizard retained name received tens logo version 3.4.11 nevertheless early 2019 site still uses lps name many places lps comes encryption wizard ew simple strong file folder encryptor protection sensitive unclassified information fouo privacy act cui etc. written java ew encrypts file types data rest data transit protection without installation elevated privileges ew runs windows mac linux solaris computers support java software platform simple drag drop interface ew offers 128-bit 256-bit aes encryption sha-256 hashing rsa signatures searchable metadata archives compression secure deleting pki/cac/piv support encryption keyed passphrase pki certificate ew gots—u.s government invented owned supported software—and comes three versions public version uses standard java cryptographic library unified version uses fip-140-2 certified crypto licensed legion bouncy castle government-only version uses fips-140-2 certified crypto stack licensed rsa security three versions interoperate web site distribution lps-public served https uses tls certificate signed certificate authority managed directly department defense defense information systems agency ca trusted non-dod operating systems browsers visiting site downloading iso generate browser security warning indicating certificate trusted military-issued devices already include certificate authority list trusted cas see errors article incorporates text us department defense spi web site
|
Operating systems
|
besta computer besta беста — soviet unix-based graphics workstation production started 1988 1,000 besta workstations produced several modifications computer besta-88 motorola 68020 cpu vme bus operating system legally ported version unix system v release 3.2 also known bestix
|
Computer architecture
|
ptk forensics ptk forensics ptk non-free commercial gui old versions digital forensics tool sleuth kit tsk also includes number software modules investigating digital media software developed anymore ptk runs gui interface sleuth kit acquiring indexing digital media investigation indexes stored sql database searching part digital investigation ptk calculates hash signature using sha-1 md5 acquired media verification consistency purposes
|
Computer security
|
market fragmentation fragmentation technology market happens market composed multiple highly-incompatible technologies technology stacks forcing prospective buyers single product commit entire product ecosystem rather maintaining free choice complementary products services two common varieties fragmentation market fragmentation version fragmentation fragmentation opposite solved standardization market fragmentation happens multiple competing firms offer highly-incompatible technologies technology stacks likely leading vendor lock-in version fragmentation happens firm offers multiple incompatible versions variations single product either tandem time result accumulated changes product specification term used android development community android fragmentation fragmentation within android variety versions android platform combined mixture hardware result inability devices properly run certain applications despite google upgrading android operating system version 4.4 also known kitkat users continued use earlier versions operating system primarily gingerbread 0.3 share cause primarily hardware manufacturers devices able upgrade later operating system number reasons result applications written one version operate consistently vice versa august 2010 developers opensignal wireless crowd-sourcing app detected 3,997 distinct values android.build.model among users app variable represents device model though may altered adding custom rom opensignal acknowledged made problematic develop apps wide variety models allows android enter markets developers placed blame google hardware manufacturers google blamed software developers staying within guidelines terms conditions issue fragmentation forced google add prohibition terms conditions software development kit developers must accept developing android operating system example opensignal testdroid studies found oems fragment android ecosystem significantly google
|
Computer file systems
|
xbox linux xbox linux project ported linux operating system xbox video game console xbox uses digital signature system prevent public running unsigned code one must either use modchip softmod originally modchips option however later demonstrated tsop chip xbox bios held may reflashed way one may flash cromwell bios developed legally xbox linux project catalyzed large cash prize first team provide possibility booting linux xbox without need hardware hack numerous software-only hacks also found example buffer overflow found game allowed booting linux loader xbeboot straight save game xbox essentially pc custom 733 mhz intel pentium iii processor 10 gb hard drive 8 gb accessible user 64mb ram although earlier boxes upgradable 128mb 4 usb ports controller ports actually usb 1.1 ports modified connector specifications enough run several readily available linux distributions xbox-linux home page xbox legacy-free pc microsoft consists intel celeron 733 mhz cpu nvidia geforce 3mx 64 mb ram 8/10 gb hard disk dvd drive 10/100 ethernet every pc run linux it. xbox linux full desktop computer mouse keyboard web/email box connected tv server router node cluster either dual-boot use linux latter case replace ide devices yes connect xbox vga monitor. xbox linux installed act full desktop computer mouse keyboard web/email box connected television server router node cluster one either dual-boot use linux latter case one replace ide devices one also connect xbox vga monitor converter needed use keyboards/mice controller ports however difficult xbox uses standard usb proprietary port currently distributions xbox linux run version 1.6 xbox third newest version including 1.6b xboxes modchips cromwell bios installed run distributions softmod mainly due issues video chip used version 1.6 xboxes developed exclusively microsoft source code available time cause significant overscan four sides screen different kernel original loaded one popular ways installing xbox linux softmod require modchip use xbox linux softmod utilizes save exploit found original run mechassault splinter cell tony hawk pro skater 4 method involves loading hacked save file transferred xbox hard drive save file loaded mechinstaller initiated xbox live option dashboard replaced new linux option rebooting system another softmod used hotswap exploit unlock xbox hard drive long enough allow one modify also way completely replace xbox stock bios cromwell bios completely legal solely linux xbox however tsop bios chip flashed cromwell xbox longer play xbox games run native xbox executables .xbe files akin .exe windows several distributions xbox linux based pc linux distributions
|
Operating systems
|
windows runtime windows runtime winrt platform-agnostic application architecture first introduced windows 8 windows server 2012 2012 winrt supports development c++/winrt standard c++ c++/cx component extensions language based c++ javascript-typescript managed code languages c visual basic .net vb.net winrt applications natively support x86 arm processors may run inside sandboxed environment allow greater security stability winrt components designed interoperability multiple languages apis mind including native managed scripting languages windows phone 8.1 uses version windows runtime named windows phone runtime enables developing applications c vb.net windows runtime components c++/cx winrt implemented programming language c++ object-oriented design predecessor windows api win32 api written mostly language c. unmanaged code application programming interface api based component object model com allows interfacing multiple languages com however api definitions stored codice_1 files encoded ecma 335 metadata format .net framework also uses modifications common metadata format allows significantly less overhead invoking winrt .net applications relative p/invoke much simpler syntax new c++/cx component extensions language borrows c++/cli syntax allows writing consuming winrt components less glue code visible programmer relative classic com programming c++ imposes fewer restrictions relative c++/cli mixing types component extensions c++/cx recommended use api-boundary purposes regular c++ com-specific discipline also used program winrt components help windows runtime c++ template library wrl similar purpose active template library provides com winrt applications run within sandbox need explicit user approval access critical os features underlying hardware file access restricted several predetermined locations directories documents pictures winrt applications windows rt windows 8 beyond packaged codice_2 file format based upon open packaging conventions uses zip format added xml files winrt applications distributed mostly application store named microsoft store winrt software termed windows store apps downloaded purchased users winrt apps sideloaded outside windows store windows 8 rt systems part windows domain equipped special activation key obtained microsoft major departure win32 similarly .net framework 4.5 apis expected take significant time complete implemented asynchronous application dispatches api call returns immediately freeing application perform tasks waiting results asynchronous model requires new programming language constructs keyword codice_3 operator codice_4 c visual basic class codice_5 method codice_6 c++ provided winrt software development kit sdk keyword codice_7 function codice_8 javascript-html5 similar codice_9/codice_10 used exception handling parts api needing asynchronous access include on-screen messages dialogs file access internet connectivity sockets streams devices services calendar contacts appointments metadata describes code written winrt platform defines programming model makes possible write object-oriented code shared across programming languages enables services like reflection herb sutter c++ expert microsoft explained session c++ 2011 build conference winrt metadata cli metadata native code i.e. processor-specific machine code contain metadata stored separate winmd-files reflected like ordinary cli assemblies cli metadata code written native winrt languages used managed cli languages winrt rich object-oriented class-based type system built metadata supports constructs corresponding constructs .net framework classes methods properties delegates events one major additions winrt relative com cross-application binary interface abi .net-style generics c++/cx declared using keyword codice_11 syntax similar keyword codice_12 winrt classes ref classes also genericized using c++ templates template instantiations exported .winmd metadata name mangling unlike winrt generics preserve genericity metadata winrt also provides library generic containers parallel c++ standard library reciprocal back-and-forth conversion functions consumption winrt collections .net languages e.g. c vb javascript transparent c++ automated mappings natural equivalents occurring behind scenes authoring winrt component managed language extra com-style rules must followed e.g .net framework collection types declared return types winrt interfaces implement used component boundary classes compiled target winrt called winrt components classes written supported language supported platform key metadata metadata makes possible interface component winrt language runtime requires winrt components built .net framework use defined interface types .net type interfaces automatically map first named inheritance yet supported managed winrt components except xaml classes programs libraries targeted winrt runtime created consumed several platforms programming languages notably c/c++ either language extensions offering first-class support winrt concepts lower-level template library allowing write code standard c++ .net c visual basic .net vb.net javascript made possible metadata winrt terminology language binding termed language projection native c++ first-class citizen winrt platform version 10.0.17134.0 windows 10 version 1803 windows sdk contains c++/winrt c++/winrt entirely standard modern c++17 language projection windows runtime winrt apis implemented header-file-based library designed provide first-class access modern windows api c++/winrt windows runtime apis authored consumed using standards-compliant c++17 compiler winrt native platform supports native standard c++ code c++ developer reuse existing native c/c++ libraries c++/winrt language extensions prior c++/winrt officially released windows sdk october 2016 microsoft offered github c++/winrt rely c++/cx code result producing smaller binaries faster code two legacy options using winrt c++ wrl atl-style template library c++/cx c++ component extensions resembles c++/cli internal consumption requirements microsoft wrl exception-free meaning return-value discipline hresult-based like com c++/cx hand wraps-up calls winrt code error checking throws exceptions appropriate c++/cx several extensions enable integration platform type system syntax resembles one c++/cli although produces native although standard code metadata integrates runtime example winrt objects may allocated codice_13 counterpart codice_14 c++/cli hat operator codice_15 retains meaning however case caller callee written c++ living process hat reference simply pointer vptr virtual method table vtable vmt along c++/cx relative traditional c++ com programming partial classes inspired .net allow instance xaml code translated c++ code tools combined human-written code produce complete class allowing clean separation machine-generated human-edited parts class implementation different files .net framework common language runtime clr integrated winrt subplatform influenced set standards ecosystem metadata format libraries clr provides services like jit-compilation code garbage collection winrt applications using .net languages use new windows runtime xaml framework primarily written c vb.net first time xaml native code using c++/cx although yet officially supported programs also written .net languages classes defined winrt components built managed .net languages must declared codice_16 derived however non-sealed winrt classes defined elsewhere inherited .net virtual methods overridden inherited managed class must still sealed members interface another language must signature winrt types managed type convertible winrt applications also coded using html javascript code-behind run using trident rendering engine chakra javascript engine also used internet explorer coding winrt app javascript features adapted follow javascript naming conventions namespaces also mapped javascript objects winrt comes application programming interface api form class library exposes features windows 8 developer like immersive interface api accessible consumable supported language windows runtime classes set sdks provide access functionality xaml parser camera function sdks implemented native c/c++ libraries unmanaged naming conventions components classes members api heavily influenced .net naming conventions uses camel case specifically pascalcase microsoft recommends users follow rules case others given conventions projected differently languages like javascript converts conventions way around give native consistent experience regardless programming language since windows runtime projected various languages restrictions fundamental data types exist host languages programmers must careful behavior types used public access method parameters method return values properties etc. starting windows phone 8 possible develop apps using version windows runtime called windows phone runtime wprt although wp8 brought limited support platform eventually converge windows 8.1 windows phone 8.1 windows phone 8 limited support developing consuming windows runtime components windows phone runtime many windows runtime apis windows 8 handle core operating system functions ported windows phone 8 support developing native games using c++/cx directx added request game development industry however windows phone xaml framework still based microsoft silverlight framework windows phone 7 backward compatibility thus xaml development impossible c++/cx development using either html5 winjs unsupported windows phone 8 windows runtime support windows phone 8.1 converges windows 8.1 release brings full windows runtime api platform including support windows runtime xaml framework language bindings c++/cx html5-javascript also project type called universal apps enable apps share code across 8.1 versions windows phone windows windows phone 8 silverlight framework updated exploit new features windows runtime windows phone runtime uses appx package format windows 8 formerly using silverlight xap
|
Operating systems
|
expression index expression index also known function based index database index built generic expression rather one columns allows indexes defined common query conditions depend data table actually stored table common use expression index support case-insensitive searching constraints example web site wants make user names case-insensitive still preserve case originally entered user index created lower-case representation user name create unique index lower last_name queries search lower last_name could make use index major databases support expression indexes include db2 since version 10.5 oracle database since release 8i postgresql since least version 7
|
Databases
|
simcos simcos acronym standing simulation continuous systems computer language development environment computer simulation 1989 developed slovenian experts led borut zupančič purpose language simulation dynamic mathematical models systems given set ordinary differential equations equation oriented compiler type language despite name used discrete simulation well language suits well cssl'67 standard simulation languages portability among languages conforming standard e.g tutsim acsl etc quite simple dos based software occasionally slightly modified run actual versions microsoft windows apart simulation also perform parametrisation series simulations different values parameters linearisation models optimisation finding values parameters criterion function minimised simulation scheme must prepared must described simcos language drawn similarly analogue computer using enclosed block library graphics tool contains basic elements integrators amplifiers summators basic input signals etc often entered program using one text editors e.g edit enclosed dos whichever form entry model used first phase simulation reprocesses space states form rewrites program fortran prepares files input parameters fortran program compiled executable file .exe executed executable program reads parameter values input files performs simulation writes requested calculated values another file terminates simcos takes control display results graphic plot heart executable function integ solve differential equations using one several numerical methods first reads necessary values e.g values parameters initial conditions files calls function deriv model actually described series functions derivatives returned values used selected numerical method requested calculated results written file whole procedure repeated termination condition satisfied continuous simulation dead time laplace transform formula_1 trivial task usually use one padé approximations simulate padé approximation 2nd order 4th order input signal unit step communication interval equals 0.01s length simulation run 5s results compared output built-in discrete function delay requires additional array del case appropriate size y1 result simulation padé approximation 2nd order y2 result simulation padé approximation 4th order y3 result discrete function delay transfer functions padé approximation developed using one simulation schemes model described following program simulation run finished results displayed plots possible trace values plots select plots display turning grid zoom etc slovenian language
|
Programming language topics
|
message session relay protocol computer networking message session relay protocol msrp protocol transmitting series related instant messages context communications session application instantiates session session description protocol sdp session initiation protocol sip rendezvous methods msrp protocol defined rfc 4975 msrp messages also transmitted using intermediaries peers using relay extensions defined rfc 4976 msrp used rcs context especially instant messaging file transfer photo sharing features msrp similar syntax ietf text based protocol sip http rtsp message either request response uses uris message contains headers body carry type data including binary information unlike sip msrp much simpler first 2 headers must to-path from-path last must content-type significantly reduces complexity parsers messages must also end 7 dash '- characters followed transaction identifier appears first line followed continuation flag single character end line crlf last line end messages makes rather simple find detect message boundaries msrp defined connection-less protocols udp thus one certain response request would arrive connection msrp also relies reliable transport layer guarantees delivery maintains order messages simplifies protocol design msrp uri scheme msrp msrps authority defined rfc 3986 holds ip/domain name possibly port optional session identifier transport additional optional parameters example codice_1 msrp used within sip session msrp session set sip offer-answer model sdp m-line media type message protocol either tcp/msrp msrp tcp tcp/tls/msrp msrp secure tls furthermore msrp uri specified path attribute full sdp example provided rfc fact msrp contains address port time c-line holds address m-line contain port cause ambiguity generally media types use c-line m-line describe address msrp rfc 4975 states information actually specified msrp path may cause devices improperly set session particular b2bua may require alter path per msrp message different devices overcome rfc 6714 cema msrp changes way cema-aware devices use sdp makes cema-aware msrp b2bua implementations much simpler efficient generic open source peer library implemented following programming languages
|
Internet protocols
|
graugon antivirus graugon antivirus antivirus software based clam antivirus developed maintained graugon software group software undergone several name changes relaunched mid-2008 graugon antivirus first released 2003 antivirus hd1988 labs software initially designed scan network files malicious traits mainly viruses 2005 hd1988 labs merged another team software developers antivirus renamed graugon antivirus may 2010 graugon antivirus average user rating 2.3 5 stars fileforum
|
Computer security
|
project builder project builder integrated development environment ide originally developed next nextstep operating system rewritten informally dubbed pbx distributed apple computer software development mac os x computer systems prior mac os x v10.3 superseded xcode mac os x 10.3 panther gnustep projectcenter ide rough workalike original nextstep design additional functionality provided projectmanager 3rd-party gnustep ide meant greater usability
|
Operating systems
|
recovery procedure telecommunication recovery procedure process attempts bring system back normal operating state examples
|
Computer security
|
hibernation computing hibernation suspend disk computing powering computer retaining state upon hibernation computer saves contents random access memory ram hard disk non-volatile storage upon resumption computer exactly entering hibernation hibernating hardware powered like regular shutdown hibernation means avoiding burden saving unsaved data shutting restoring running programs powering back hibernation used laptops limited battery power available set happen automatically low battery alarm desktops also support hibernation mainly general energy saving measure many systems also support low-power sleep mode processing functions machine powered using little power preserve contents ram support waking instantaneous resumption one advantages sleep mode hibernation hibernated system must start read data back ram typically takes time system sleep mode needs power cpu display almost instantaneous hand system sleep mode still consumes power keep data ram detaching power system sleep mode results data loss cutting power system hibernation risk hibernated system resume power restored shut hibernated systems may consume standby power unless unplugged sleep mode hibernation combined contents ram copied non-volatile storage computer enters sleep mode approach combines benefits sleep mode hibernation machine resume instantaneously state including open unsaved files survives power outage hybrid sleep consumes much power sleep mode hibernation powers computer early implementations hibernation used bios modern operating systems usually handle hibernation hibernation defined sleeping mode s4 acpi specification windows computers hibernation available hardware device drivers acpi plug-and-play–compliant hibernation invoked start menu command line windows 95 supports hibernation hardware manufacturer-supplied drivers compatible hardware bios present since windows 95 supports advanced power management apm hibernation called suspend-to-disk windows 98 later support acpi however hibernation often caused problems since hardware fully acpi 1.0 compliant wdm drivers also issues fat32 file system windows 2000 first windows support hibernation operating system level os-controlled acpi s4 sleep state without special drivers hardware manufacturer hidden system file named hiberfil.sys root boot partition used store contents ram computer hibernates windows 2000 file big total ram installed windows last release windows 9x family also supports os controlled hibernation requires disk space equal computer ram windows xp improved support hibernation hibernation resumption much faster memory pages compressed using improved algorithm compression overlapped disk writes unused memory pages freed dma transfers used i/o hiberfil.sys contains information including processor state file documented security researcher matthieu suiche black hat briefings 2008 also provided computer forensics framework manage convert file readable memory dump compression algorithm later documented microsoft well although windows xp added support 4 gigabytes memory windows xp 64-bit edition windows xp professional x64 edition operating system well windows server 2003 windows vista windows server 2008 support hibernation amount memory installed performance issues associated saving large pool data ram disk windows vista introduced hybrid sleep feature saves contents memory hard disk instead powering enters sleep mode power lost computer resume hibernated windows 7 introduced compression hibernation file set default size 75 total physical memory microsoft also recommends increase size using codice_1 tool rare workloads memory footprint exceeds amount set anywhere 50 100 although decreasing recommended windows 8 resume-from-hibernation algorithm multi-core optimized windows 8 also introduces hybrid boot feature users select shut option hibernates computer closes programs logs user session hibernating according microsoft regular hibernation includes data memory pages takes longer written disk comparison user session closed hibernation data much smaller therefore takes less time write disk resume windows 8 also saves kernel image users option performing traditional shutdown holding shift key clicking shut hibernation often under-used business environments difficult enable large network computers without resorting third-party pc power management software omission microsoft criticized led huge waste energy third-party power management programs offer features beyond present windows products offer active directory integration per-user per-machine settings advanced power plans scheduled power plans anti-insomnia features enterprise power usage reporting notable vendors include 1e nightwatchman data synergy powerman software faronics power save verdiem surveyor possible disable hibernation delete codice_2 macs feature known safe sleep saves contents volatile memory system hard disk time mac enters sleep mode mac instantaneously wake sleep mode power ram lost however power supply interrupted removing batteries without ac power connection mac would wake safe sleep instead restoring memory contents hard drive safe sleep hibernation process occurs regular sleep apple menu hibernate option safe sleep capability added mac models starting october 2005 powerbook g4 double-layer sd safe sleep requires mac os x v10.4 higher shortly apple started supporting safe sleep mac enthusiasts released hack enable feature much older mac computers running mac os x v10.4 classic mac os also supported hibernation feature dropped apple linux kernel hibernation implemented swsusp built 2.6 series alternative implementation tuxonice available patches kernel version 3.4 tuxonice provides advantages support symmetric multiprocessing preemption another alternative implementation uswsusp three refer suspend-to-disk
|
Operating systems
|
jughead search engine jughead search engine system gopher protocol distinct veronica searches single server time jughead developed rhett jones 1993 university utah name jughead originally chosen match archie search engine jughead jones archie friend archie comics later backronym developed jonzy universal gopher hierarchy excavation display released original author gnu general public license 2006 source code modernized better run current posix systems due trademark issues modified version called jugtail made available download gnu savannah see external links
|
Internet protocols
|
privacy impact assessment privacy impact assessment pia process assists organizations identifying minimizing privacy risks new projects policies privacy impact assessment type impact assessment conducted organization typically government agency corporation access large amount sensitive private data individuals flowing system organization audits processes sees processes affect might compromise privacy individuals whose data holds collects processes pias conducted various sub-agencies u.s. department homeland security dhs many others pia designed accomplish three goals privacy impact report seeks identify record essential components proposed system containing significant amounts personal information establish privacy risks associated system managed pia sometimes go beyond assessment system consider critical downstream effects people affected way proposal since pias measure organization ability keep private information safe pia conducted whenever said organization possession personal information employees and/or clients include limited name age phone numbers emails etc pia also conducted instance business organization question possession information otherwise sensitive cases security systems private sensitive information organizations undergoing changes could lead risk privacy leaks according presentation international association privacy professionals congress pias following benefits privacy impact assessments summed four step process 1970s technology assessment ta created united states office technology assessment ta used determine societal social repercussions new technologies similarly around time came environmental impact assessments eia reaction social push sixties green movements method impact assessments acted precursors creation pia privacy impact statement much less extensive version pia came late eighties 1990s became need measure effectiveness company organization data security especially data stored computers electronic platforms extensive pias started used frequently corporations governments mid 1990s used organizations around world several governments including new zealand canada australia united states department homeland security assess privacy risk systems addition several countries corporations use assessment systems similar pias data risk analysis e-government act 2002 section 208 establishes requirement agencies conduct privacy impact assessments pias electronic information systems collections assessment practical method evaluating privacy information systems collections documented assurance privacy issues identified adequately addressed process designed guide sec system owners developers assessing privacy early stages development throughout systems development life cycle sdlc determine project affect privacy individuals whether project objectives met also protecting privacy general data protection regulation gdpr states data protection impact assessment dpia mandatory cases piaf privacy impact assessment framework data protection privacy rights european commission co-funded project aims encourage eu member states adopt progressive privacy impact assessment policy means addressing needs challenges related privacy processing personal data
|
Computer security
|
martin mckeay martin mckeay born june 29 1971 united states computer security expert blogger works akamai technologies security evangelist writes one popular security blogs also podcast called network security podcast qualified security assessor 2006 started blogging computer world product evangelist stillsecure speaker many conferences including hacker halted rsa conference def con advocate payment card industry data security standard
|
Computer security
|
dragon slayer video game dragon slayer began dragon slayer series banner encompasses number popular falcom titles sorcerian legacy wizard dragon slayer early example action role-playing game genre laid foundations building prototypical action role-playing elements panorama toh 1983 created yoshio kiya nihon falcom well namco tower druaga 1984 dragon slayer often considered first true action role-playing game contrast earlier turn-based roguelikes dragon slayer dungeon crawl role-playing game entirely real-time action-oriented combat combining arcade style action mechanics traditional role-playing mechanics dragon slayer featured in-game map help dungeon-crawling required item management due inventory limited one item time featured item-based puzzles similar legend zelda dragon slayer overhead action-rpg formula used many later games along competitor hydlide dragon slayer laid foundations action rpg genre including franchises ys legend zelda
|
Computer architecture
|
peazip peazip free open-source file manager file archiver microsoft windows linux bsd made giorgio tani supports native pea archive format featuring compression multi volume split flexible authenticated encryption integrity check schemes mainstream formats special focus handling open formats supports 188 file extensions version 6.0.0 peazip mainly written free pascal using lazarus peazip released terms gnu lesser general public license program features archive browser interface search history features intuitive navigation archive content allows application fine-grained multiple exclusion inclusion filter rules archive flat browsing mode possible alternative archive browsing method peazip allows users run extracting archiving operations automatically using command-line generated exporting job defined gui front-end also create edit restore archive layout speeding archiving backup operation definition notable features program include archive conversion file splitting joining secure file deletion byte-to-byte file comparison archive encryption checksum/hash files find duplicate files batch renaming system benchmarking random passwords/keyfiles generation view image thumbnails multi threaded fly thumbnails generation without saving image cache host machine integration windows explorer context menu addition program user interface including icons color scheme customized peazip available ia-32 x86-64 natively standalone portable application installable package microsoft windows linux deb rpm tgz compiled gtk2 qt widgetset bsd gtk2 available also portableapps package .paf.exe along popular general-purpose archive formats like 7z tar zip etc. peazip supports paq lpaq formats although usually recommended general purpose use due high memory usage low speed formats included value cutting edge compression technology providing compression ratio amongst best data structures peazip supports encryption aes 256-bit cipher 7z zip archive formats peazip native pea format freearc arc format supported ciphers aes 256-bit blowfish twofish 256 serpent 256 pea format ciphers used eax authenticated encryption mode graphical frontend progress bar less reliable native console progress indicator various backend utilities critical follow real time progress work possible set program use native console interface graphical console interfaces backend utilities pea acronym pack encrypt authenticate archive file format general purpose archiving format featuring compression multiple volume output developers goal offer flexible security model authenticated encryption provides privacy authentication data redundant integrity checks ranging checksums cryptographically strong hashes defining three different levels communication control streams objects volumes developed conjunction peazip file archiver peazip universal extractor support pea archive format peazip acts graphical front-end numerous third-party open source royalty-free utilities including separate plugin optional utilities run console mode graphical wrapper allows user-friendly handling output information prior release 5.3 peazip installers windows win64 bundled opencandy advertising module installation offered optional installation recommended third-party software official download page provided alternative installers without module named 'plain release 5.3 april 2014 peazip longer ad-supported bundle peazip portable peazip linux packages never featured ad-supported bundle
|
Computer file systems
|
repeater telecommunications repeater electronic device receives signal retransmits repeaters used extend transmissions signal cover longer distances received side obstruction types repeaters broadcast identical signal alter method transmission example another frequency baud rate several different types repeaters telephone repeater amplifier telephone line optical repeater optoelectronic circuit amplifies light beam optical fiber cable radio repeater radio receiver transmitter retransmits radio signal broadcast relay station repeater used broadcast radio television information-bearing signal passes communication channel progressively degraded due loss power example telephone call passes wire telephone line power electric current represents audio signal dissipated heat resistance copper wire longer wire power lost smaller amplitude signal far end long enough wire call audible end similarly farther radio station receiver weaker radio signal poorer reception repeater electronic device communication channel increases power signal retransmits allowing travel since amplifies signal requires source electric power term repeater originated telegraphy 19th century referred electromechanical device relay used regenerate telegraph signals use term continued telephony data communications computer networking repeaters work actual physical signal attempt interpret data transmitted operate physical layer first layer osi model used increase range telephone signals telephone line frequently used trunklines carry long distance calls analog telephone line consisting pair wires consists amplifier circuit made transistors use power dc current source increase power alternating current audio signal line since telephone duplex bidirectional communication system wire pair carries two audio signals one going direction telephone repeaters bilateral amplifying signal directions without causing feedback complicates design considerably telephone repeaters first type repeater first applications amplification development telephone repeaters 1900 1915 made long distance phone service possible telecommunications cables fiber optic cables use optical repeaters invention electronic amplifiers mechanically coupled carbon microphones used amplifiers telephone repeaters turn 20th century found negative resistance mercury lamps could amplify used invention audion tube repeaters around 1916 made transcontinental telephony practical 1930s vacuum tube repeaters using hybrid coils became commonplace allowing use thinner wires 1950s negative impedance gain devices popular transistorized version called e6 repeater final major type used bell system low cost digital transmission made voiceband repeaters obsolete frequency frogging repeaters commonplace frequency-division multiplexing systems middle late 20th century type telephone repeater used underwater submarine telecommunications cables used increase range signals fiber optic cable digital information travels fiber optic cable form short pulses light light made particles called photons absorbed scattered fiber optical communications repeater usually consists phototransistor converts light pulses electrical signal amplifier increase power signal electronic filter reshapes pulses laser converts electrical signal light sends fiber however optical amplifiers developed repeaters amplify light without need converting electric signal first used extend range coverage radio signal history radio relay repeaters began 1898 publication johann mattausch austrian journal zeitschrift für electrotechnik v. 16 35 36 proposal translator primitive suitable use first relay system radio repeaters really functioned invented 1899 emile guarini-foresio radio repeater usually consists radio receiver connected radio transmitter received signal amplified retransmitted often another frequency provide coverage beyond obstruction usage duplexer allow repeater use one antenna receive transmit time radio repeaters improve communication coverage systems using frequencies typically line-of-sight propagation without repeater systems limited range curvature earth blocking effect terrain high buildings repeater hilltop tall building allow stations line-of-sight range communicate reliably radio repeaters may also allow translation one set radio frequencies another example allow two different public service agencies interoperate say police fire services city neighboring police departments may provide links public switched telephone network well typically repeater station listens one frequency transmits second b mobile stations listen signals channel b transmit channel difference two frequencies may relatively small compared frequency operation say 1 often repeater station use antenna transmission reception highly selective filters called duplexers separate faint incoming received signal billions times powerful outbound transmitted signal sometimes separate transmitting receiving locations used connected wire line radio link repeater station designed simultaneous reception transmission mobile units need equipped bulky costly duplexers transmit receive time mobile units repeater system may provided talkaround channel allows direct mobile-to-mobile operation single channel may used reach repeater system communications requiring attention mobiles talkaround channel may repeater output frequency repeater retransmit signals output frequency engineered radio communication system designer analyze coverage area desired select repeater locations elevations antennas operating frequencies power levels permit predictable level reliable communication designed coverage area repeaters divided two types depending type data handle type used channels transmit data form analog signal voltage current proportional amplitude signal audio signal also used trunklines transmit multiple signals using frequency division multiplexing fdm analog repeaters composed linear amplifier may include electronic filters compensate frequency phase distortion line digipeater used channels transmit data binary digital signals data form pulses two possible values representing binary digits 1 0 digital repeater amplifies signal also may retime resynchronize reshape pulses repeater performs retiming resynchronizing functions may called regenerator
|
Internet protocols
|
seculert seculert cloud-based cyber security technology company based israel company ’ technology designed detect breaches advanced persistent threats apts attacking networks seculert ’ business based malware research ability uncover malware gone undetected traditional measures 2012 company named one hottest new security start-ups new york times finalist sc magazine awards rookie security company year seculert founded 2010 former rsa fraudaction research lab manager aviv raff former sandisk product marketing manager dudi matot former finjan vp operations alex milstein 2011 company launched first offering seculert echo seculert sense traffic log analysis released october 2012 rsa conference february 2013 seculert unveiled beta version seculert swamp malware analysis sandbox seculert privately funded headquartered petah tikva israel july 2012 company announced 5.35m venture funding yl ventures norwest venture partners july 2013 seculert announced raised additional 10 million series b funding sequoia capital january 31 2017 seculert acquired radware company based mahwah new jersey usa january 2012 seculert discovered ramnit started targeting facebook accounts considerable success stealing 45,000 facebook login credentials worldwide mostly people uk france march 2012 seculert reported kelihos botnet distributed facebook worm still active spreading july 2012 seculert conjunction kaspersky lab uncovered ongoing cyber espionage campaign targeting iran middle eastern countries dubbed mahdi malware august 2012 seculert kaspersky lab symantec revealed discovery shamoon sophisticated malware attacked qatar natural gas firm rasgas saudi arabian oil company aramco december 2012 seculert uncovered dexter new malware steals payment card data point-of-sale terminals used stores hotels businesses victim businesses english-speaking 42 percent based north america 19 percent u.k. dexter infected systems running variety different versions windows including xp home server server 2003 windows 7 january 2013 kaspersky labs kl revealed cyber espionage operation dubbed red october next day seculert identified special folder used attackers additional attack vector vector attackers sent email embedded link specially crafted php web page webpage exploited vulnerability java background downloaded executed malware automatically january 2014 seculert research lab identified new targeted attack used xtreme rat attack used spear phishing emails target israeli organizations deploy piece advanced malware date 15 machines compromised including ones belonging civil administration judea samaria dyre wolf malware campaign made headlines early april banking trojan bypassed 2 factor authentication order steal 1 million corporate bank accounts several detection protection technologies combined cloud-based solution works identify new cyber threats automated traffic log analysis cloud-based analysis engine leverages http/s gateway traffic logs collected time analyzing petabytes data identify malware activity automatically identifies unknown malware detecting malicious patterns anomalies seculert traffic log analysis pinpoints evidence targeted attacks elastic sandbox elastic cloud-based automated malware analysis environment seculert elastic sandbox includes automatic analysis classification suspicious files time analyzes potentially malicious files different platforms simulate different geographic regions seculert elastic sandbox generates malware behavioral profiles crunching 40,000 malware samples daily basis leveraging data crowdsourced threat repository
|
Computer security
|
arteris arteris inc. multinational technology firm develops on-chip interconnect fabric technology used system-on-chip soc semiconductor designs variety devices particularly mobile consumer markets company specializes development distribution network-on-chip noc interconnect intellectual property ip solutions best known flagship product arteris flexnoc used 60 percent mobile wireless soc designs arteris inc. headquartered campbell california k. charles janac company ’ president ceo 2012 silicon valley san jose business journal ranked arteris 4th fastest-growing private company silicon valley arteris also inc. 500 list america ’ fastest growing companies two years running arteris founded 2003 philippe boucard two engineering executives worked together t.sqware startup acquired globespan company executives wished address problems existing monolithic bus crossbar interconnect technologies wire routing congestion increased heat power consumption failed timing closure increased die area firm ’ leadership sought received venture capital totaling 44.1 million creation new technology investors including arm holdings crescendo ventures docomo capital qualcomm synopsys tvm capital ventech 2006 arteris developed first commercially available noc ip product called noc solution followed 2009 advanced product flexnoc products used “ packetization distributed network small interconnect elements address congestion timing power performance issues. ” arteris marketed flexnoc improvement traditional socs interconnect fabrics citing reduction gate count 30 percent reduction wires 50 percent compact chip floor compared functionally equivalent hybrid bus crossbar designers socs began take advantage technology ’ increased design efficiency flexibility significant reduction production costs 2012 company 40 semiconductor customers including qualcomm samsung texas instruments toshiba lg electronics 200 million socs produced arteris ip company ’ volume projected grow 1 billion units per year 2015 october 2013 qualcomm technologies inc. acquired flexnoc network-on-chip product portfolio arteris retained existing customer contracts continue licensing flexnoc modifying source code customer support qualcomm provide engineering deliverables flexnoc product line updates arteris qualcomm maintain ownership interest arteris february 2014 arteris named craig forrest chief technology officer dave parry vice president engineering benoit de lescure director application engineering arteris claims 117 licensees interconnect ip product since inception 2003 approximately 65 active customers publicly disclosed licensees include top-20 semiconductor makers samsung electronics qualcomm toshiba semiconductor texas instruments stmicroelectronics renesas electronics freescale semiconductor marvell technology group well systems automotive companies like mobileye arteris also signed licenses chinese semiconductor companies including baidu hisilicon huawei actions semiconductor allwinner infotm ingenic leadcore nufront rda semiconductor rockchip socle spreadtrum publicly announced licensees arteris products include altera intel core logic csr gct guc ic-logic lg megachips movidius intel mtekvision ntt electronics open-silicon pixelworks renesas electronics sckipio schneider st-ericsson ericsson via telecom arteris offers number network-on-chip products including flexnoc high performance socs flexlli mipi interchip link ip connecting multiple chips dies flexway interconnect fabric smaller socs firm ’ technology used variety consumer electronics including mobile phones tablets modems gaming consoles digital televisions automotive systems applications
|
Computer architecture
|
netconf network configuration protocol netconf network management protocol developed standardized ietf developed netconf working group published december 2006 rfc 4741 later revised june 2011 published rfc 6241 netconf protocol specification internet standards track document netconf provides mechanisms install manipulate delete configuration network devices operations realized top simple remote procedure call rpc layer netconf protocol uses extensible markup language xml based data encoding configuration data well protocol messages protocol messages exchanged top secure transport protocol netconf protocol conceptually partitioned four layers netconf protocol implemented network devices routers switches major equipment vendors one particular strength netconf support robust configuration change using transactions involving number devices ietf developed simple network management protocol snmp late 1980s proved popular network management protocol early part 21st century became apparent spite originally intended snmp used configure network equipment mainly used network monitoring june 2002 internet architecture board key members ietf network management community got together network operators discuss situation results meeting documented rfc 3535 turned operators primarily using proprietary command line interfaces cli configure devices number features operators liked including fact text-based opposed ber-encoded snmp addition many equipment vendors provide option completely configure devices via snmp operators generally liked write scripts help manage boxes found snmp cli lacking number ways notably unpredictable nature output content formatting output prone change unpredictable ways around time juniper networks using xml-based network management approach brought ietf shared broader community collectively two events led ietf may 2003 creation netconf working group working group chartered work network configuration protocol would better align needs network operators equipment vendors first version base netconf protocol published rfc 4741 december 2006 several extensions published subsequent years notifications rfc 5277 july 2008 partial locks rfc 5717 december 2009 with-defaults rfc 6243 june 2011 system notifications rfc 6470 february 2012 access control rfc 6536 march 2012 revised version base netconf protocol published rfc 6241 june 2011 content netconf operations well-formed xml content related network management subsequently support encoding javascript object notation json also added netmod working group completed work define human-friendly modeling language defining semantics operational data configuration data notifications operations called yang yang defined rfc 6020 version 1 rfc 7950 version 1.1 accompanied common yang data types found rfc 6991 summer 2010 netmod working group re-chartered work core configuration models system interface routing well work compatibility snmp modeling language base protocol defines following protocol operations basic netconf functionality extended definition netconf capabilities set additional protocol features implementation supports communicated server client capability exchange portion session setup mandatory protocol features included capability exchange since assumed rfc 4741 defines number optional capabilities including xpath validate note rfc 6241 obsoletes rfc 4741 capability support subscribing receiving asynchronous event notifications published rfc 5277 document defines create-subscription operation enables creating real-time replay subscriptions notifications sent asynchronously using notification construct also defines interleave capability supported basic notification capability facilitates processing netconf operations subscription active capability support partial locking running configuration defined rfc 5717 allows multiple sessions edit non-overlapping sub-trees within running configuration without capability lock available entire configuration capability monitor netconf protocol defined rfc 6022 document contains data model including information netconf datastores sessions locks statistics facilitates management netconf server also defines methods netconf clients discover data models supported netconf server defines get-schema operation retrieve netconf messages layer provides simple transport-independent framing mechanism encoding every netconf message well-formed xml document rpc result linked rpc invocation message-id attribute netconf messages pipelined i.e. client invoke multiple rpcs without wait rpc result messages first rpc messages defined rfc 6241 notification messages defined rfc 5277
|
Internet protocols
|
david luckham david luckham emeritus professor electrical engineering stanford university graduate student mit one implementers first lisp system best known originator complex event processing cep proposed book power events published 2002 cep consists set concepts techniques processing real time events extracting information event streams arrive cep since become enabling technology many systems used take immediate action response incoming streams events applications described book may found many sectors business including stock market trading systems mobile devices internet operations fraud detection transportation industry governmental intelligence gathering book also describes advanced event processing techniques event abstraction event hierarchies yet general practice luckham latest book event processing business published wiley nov. 2012 david luckham held faculty invited faculty positions mathematics computer science eight major universities europe united states one founders rational software inc. 1981 supplied ada compiler company first products developed served member initial software development team acknowledged leader high-level multiprocessing programming languages annotation languages event-based simulation systems hardware software architectures dr. luckham published one hundred technical articles two winning acm/ieee best paper awards born kingston jamaica raised london blitz world war ii holds m.sc london ph.d. mit degrees mathematics computer science
|
Programming language topics
|
haml haml html abstraction markup language templating system designed avoid writing inline code web document make html cleaner haml gives flexibility dynamic content html similar web languages like php asp jsp template systems like eruby haml also embeds code gets executed runtime generates html code order provide dynamic content order run haml code files need .haml extension files similar .erb eruby files also help embed ruby code developing web application parsing coding comments haml uses rules ruby 1.9 later haml understands ascii compatible encodings like utf-8 utf-16 utf-32 compatible ascii haml used command line separate ruby module ruby rails application making haml suitable wide range applications haml originally introduced hampton catlin initial release 2006 work taken ahead people motive make html simpler cleaner easier use since 2006 revised several times newer versions released 2012 natalie weizenbaum primary maintainer haml followed norman clarke 2015 natalie worked making haml usable ruby applications branding design done nick walsh others currently maintenance team matt wildig akira matsuda tee parham takashi kokubun version 2.2.0 released july 2009 support ruby 1.9 rails 2.0 version 3.0.0 released may 2010 adding support rails 3 performance improvements fourth major version broke compatibility previous versions supporting rails 3 ruby 1.8.7 marked switch semantic versioning several amendments like increasing performance fixing warnings compatibility latest versions rails fixes documentation many made haml 4 series version 5.0.0 released april 2017 supports ruby 2.0.0 drops compatibility rails 3 'trace option helps users perform tracing haml template added four principles involved development haml markup language user-friendly adheres following features markup language adhere n't repeat dry principle markup language good indentation improves appearance makes easy read readers also determine given element starts ends markup language clear structure help code maintenance logical understanding final result unclear whether haml offers differential advantage regard haml markup similar css syntax example haml dot codice_1 representation classes css making easy developers use markup following equivalent haml recognises css selectors render following html code use haml ruby ruby codice_2 include line similar eruby haml also access local variables declared within file ruby code example uses sample ruby controller file renders use haml independent rails actionview install codice_5 gem include codice_2 simply import codice_7 ruby script invoke ruby interpreter codice_8 flag output haml :engine haml class haml uses whitespace indentation two spaces tag nesting scope acts replacement open-end tag pairs making dry cleaner following example compares syntaxes haml eruby embedded ruby alongside html output key differences note simple preview example may reflect current version language haml would produce xhtml official implementation haml built ruby plugins ruby rails merb ruby implementation also functions independently haml easily used along languages list languages haml implementations
|
Web technology
|
content service content service caas managed content service mcaas service-oriented model service provider delivers content demand service consumer via web services licensed subscription content hosted service provider centrally cloud offered number consumers need content delivered applications system hence content demanded consumers required content service way provide raw content words without need specific human compatible representation html way systems make use content service meant direct human consumption rather platforms consume make use content according particular needs happens usually cloud centralized platform globally accessible provides standard format content content service centralize content single repository manage categorize make available others search whatever wish content delivered typically could one following term content service caas considered part nomenclature cloud computing service models service-oriented architecture along software service saas infrastructure service iaas platform service paas desktop service daas managed software service msaas digital content service dcaas mobile backend service mbaas information technology management service itmaas
|
Distributed computing architecture
|
class driver computing class driver type hardware device driver operate large number different devices broadly similar type class drivers often used usb based devices share essential usb protocol common devices similar functionality easily adopt common protocols another example instead separate driver every kind cd-rom device class driver operate wide variety cd-roms different manufacturers accomplish manufacturers make products compatible standardized protocol technical terms class driver used base ancestor class specific drivers need slightly different extended functionality take advantage majority functionality provided class driver concept key aspect object oriented programming extended drivers makes much easier hardware vendors provide driver support products
|
Operating systems
|
media processor media processor mostly used image video processor microprocessor-based system-on-a-chip designed deal digital streaming data real-time e.g display refresh rates devices also considered class digital signal processors dsps unlike graphics processing units gpus used computer displays media processors targeted digital televisions set-top boxes streaming digital media classes include socs composed microprocessor might optimizations previous media processors streaming media datatypes processed using fixed-function hardwired asics could updated field big disadvantage media standards changed since media processors software programmed devices processing done could updated new software releases allowed new generations systems created without hardware redesign set-top boxes even allows possibility in-the-field upgrade downloading new software cable satellite networks companies pioneered idea media processors created marketing term media processor included consumer electronics companies successfully dominated market designing media processors integrating video products companies philips samsung matsushita fujitsu mitsubishi in-house media processor devices newer generations devices use various forms multiprocessing—multiple cpus dsps order deal vastly increased computational needs dealing high definition television signals
|
Computer architecture
|
fusion file system fusion flash file system file system computers using embedded flash memory written ansi c targeted embedded system uses flash ram rom used file storage media uses layered device driver architecture using simple binding model allow operating system agnostic independent portability meaning file system compatible operating systems thus bound one rtos embedded file systems typically require low memory usage fusion compact memory also fully dynamic read rom-style file system according vendor web site multithread capable fat12/fat16/fat32 compatible also features wear leveling post error correction data compression many commercial file systems fusion file system accompanied full suite supporting software modules include error correction file compression fusion standard c lib driver model i/o manager
|
Computer file systems
|
security management security management identification organization assets including people buildings machines systems information assets followed development documentation implementation policies procedures protecting assets organisation uses security management procedures asset information classification threat assessment risk assessment risk analysis identify threats categorise assets rate system vulnerabilities implement effective controls loss prevention focuses critical assets going protect key component loss prevention assessing potential threats successful achievement goal must include potential opportunities object take risk unless upside balance probability impact determine implement measures minimize eliminate threats management security risks applies principles risk management management security threats consists identifying threats risk causes assessing effectiveness existing controls face threats determining risks consequence prioritizing risks rating likelihood impact classifying type risk selecting appropriate risk option risk response 2016 universal standard managing risks developed netherlands 2017 updated named universal security management systems standard 2017 first choice considered possibility eliminating existence criminal opportunity avoiding creation opportunity always best solution additional considerations factors created result action would create greater risk example removing cash retail outlet would eliminate opportunity stealing cash–but would also eliminate ability conduct business avoiding eliminating criminal opportunity conflicts ability conduct business next step reduction opportunity potential loss lowest level consistent function business example application risk reduction might result business keeping enough cash hand one day ’ operation assets remain exposed application reduction avoidance subjects risk spreading concept limits loss potential losses exposing perpetrator probability detection apprehension prior consummation crime application perimeter lighting barred windows intrusion detection systems idea reduce time available steal assets escape without apprehension transferring risks alternatives risks reduced acceptable levels two primary methods accomplishing risk transfer insure assets raise prices cover loss event criminal act generally speaking first three steps properly applied cost transferring risks much lower remaining risks must simply assumed business risk business included accepted losses deductibles made part insurance coverage
|
Computer security
|
pdf/a pdf/a iso-standardized version portable document format pdf specialized use archiving long-term preservation electronic documents pdf/a differs pdf prohibiting features unsuitable long-term archiving font linking opposed font embedding encryption iso requirements pdf/a file viewers include color management guidelines support embedded fonts user interface reading embedded annotations pdf standard encoding documents printed form portable systems however suitability pdf file archival preservation depends options chosen pdf created notably whether embed necessary fonts rendering document whether use encryption whether preserve additional information original document beyond needed print pdf/a originally new joint activity association suppliers printing publishing converting technologies npes association information image management develop international standard defining use portable document format pdf archiving documents goal address growing need electronically archive documents way would ensure preservation contents extended period time ensure documents would able retrieved rendered consistent predictable result future need exists wide variety government industry academic areas worldwide including legal systems libraries newspapers regulated industries pdf/a standard define archiving strategy goals archiving system identifies profile electronic documents ensures documents reproduced exactly way using various software years come key element reproducibility requirement pdf/a documents 100 self-contained information necessary displaying document manner embedded file includes limited content text raster images vector graphics fonts color information pdf/a document permitted reliant information external sources e.g font programs data streams may include annotations e.g hypertext links link external documents key elements pdf/a conformance include part 1 standard first published september 28 2005 specifies two levels conformance pdf files level b conformance requires standards necessary reliable reproduction document visual appearance followed level conformance includes level b requirements addition features intended improve document accessibility additional level requirements level conformance intended increase accessibility conforming files physically impaired users allowing assistive software screen readers precisely extract interpret file contents later standard pdf/ua developed eliminate became considered pdf/a shortcomings replacing many general guidelines detailed technical specifications part 2 standard published june 20 2011 addresses new features added versions 1.5 1.6 1.7 pdf reference pdf/a-1 files necessarily conform pdf/a-2 pdf/a-2 compliant files necessarily conform pdf/a-1 part 2 pdf/a standard based pdf 1.7 iso 32000-1 rather pdf 1.4 offers number new features part 2 defines three conformance levels pdf/a-2a pdf/a-2b correspond conformance levels b pdf/a-1 new conformance level pdf/a-2u represents level b conformance pdf/a-2b additional requirement text document unicode mapping part 3 standard published october 15 2012 differs pdf/a-2 one regard allows embedding arbitrary file formats xml csv cad word-processing documents spreadsheet documents others pdf/a conforming documents part 4 standard based pdf 2.0 expected published 2019 pdf/a document identified pdf/a-specific metadata located nowiki http //www.aiim.org/pdfa/ns/id/ /nowiki namespace metadata represents claim conformance ensure conformance industry collaboration original pdf/a competence center led development isartor test suite 2007 2008 test suite consists 204 pdf files intentionally constructed systematically fail requirements pdf/a-1b conformance allowing developers test ability software validate standard basic level conformance mid-2009 test suite already made appreciable difference general quality pdf/a validation software verapdf consortium led open preservation foundation pdf association created response eu commission preforma challenge develop open-source validator pdf/a format pdf association launched pdf validation technical working group november 2014 articulate plan developing industry-supported pdf/a validator verapdf consortium subsequently phase 2 preforma contract april 2015 development continued throughout 2016 phase 2 completed on-schedule december 2016 phase 3 testing acceptance period concluded july 2017. verapdf covers parts 1 2 3 conformance levels b u pdf/a verapdf available installation windows macos linux using pdfbox-based greenfields pdf parser pdf/a specification also states requirements conforming pdf/a viewer must encountering file claims conformance pdf/a pdf viewers default special pdf/a viewing mode fulfill conforming reader requirements take one example adobe acrobat adobe reader 9 include alert advise user pdf/a viewing mode activated pdf viewers allow users disable pdf/a viewing mode remove pdf/a information file pdf/a document must embed fonts use accordingly pdf/a file often larger equivalent pdf file include embedded fonts use transparency forbidden pdf/a-1 majority pdf generation tools allow pdf/a document compliance pdf export openoffice.org pdf export tool microsoft office 2007 suites also make transparent images given document non-transparent restriction removed pdf/a-2 archivists voiced concerns pdf/a-3 allows arbitrary files embedded pdf/a documents could result circumvention memory institution procedures restrictions archived formats pdf association addressed various misconceptions regarding pdf/a publication pdf/a nutshell 2.0 converting pdf version 1.4 pdf/a-2 usually works expected except problems glyphs according pdf association problems occur and/or generation pdfs pdf/a file formally correct yet still incorrect glyphs careful visual check uncover problem generation problems also affect unicode mapping problem attracts attention visual check carried extracted text pdf/a text/font usage specified uniquely enough ensure incorrect viewers printers offer complete support encoding systems result problems regard pdf/a meaning document completely compliant standard correct internally system used viewing printing document may produce undesired results document produced optical character recognition ocr conversion pdf/a-2 pdf/a-3 n't support codice_1 flag therefore type conversion result unrendered content
|
Programming language topics
|
shallow parsing shallow parsing also chunking light parsing analysis sentence first identifies constituent parts sentences nouns verbs adjectives etc links higher order units discrete grammatical meanings noun groups phrases verb groups etc. elementary chunking algorithms simply link constituent parts basis elementary search patterns e.g specified regular expressions approaches use machine learning techniques classifiers topic modeling etc take contextual information account thus compose chunks way better reflect semantic relations basic constituents advanced methods get around problem combinations elementary constituents different higher level meanings depending context sentence technique widely used natural language processing similar concept lexical analysis computer languages name shallow structure hypothesis also used explanation second language learners often fail parse complex sentences correctly
|
Computational linguistics
|
passports issued european union candidate states since 1980s member states european union started harmonise aspects designs ordinary passports types passports diplomatic service emergency passports well common security features biometrics passports issued eu member states common recommended lay burgundy colour words “ european union ” accompanied name issuing member state printed cover information cover order language issuing state information first page one languages information possibly laminated identification page languages issuing state plus english french optional information following page nationals iceland full freedom movement residence within territory eea derives eea eu law nationals candidate countries varying visa arrangements schengen area common travel area members well united states canada following table details requirements enlargement european union involves accession new member states process began inner six founded european coal steel community eu predecessor 1952 since eu membership grown twenty-eight recent expansion croatia 2013 currently accession negotiations way several states process enlargement sometimes referred european integration term also used refer intensification co-operation eu member states national governments allow gradual harmonisation national laws join european union state needs fulfil economic political conditions called copenhagen criteria copenhagen summit june 1993 require stable democratic government respects rule law corresponding freedoms institutions according maastricht treaty current member state european parliament must agree enlargement present enlargement agenda european union regards turkey western balkans iceland turkey long-standing application eu negotiations expected take many years western balkan states eu pledged include civil wars fact two states entered three candidates one applied others pre-accession agreements finally iceland recently frozen negotiations eu however states europe either seek membership could potentially apply present foreign policy changes eu gives signal might included enlargement agenda however formally part current agenda already delayed due bilateral disputes balkans difficulty fully implementing acquis communautaire accepted body eu law today accession process follows series formal steps pre-accession agreement ratification final accession treaty steps primarily presided european commission enlargement commissioner dg enlargement actual negotiations technically conducted union member states candidate country country applies membership typically signs association agreement help prepare country candidacy eventual membership countries meet criteria even begin negotiations apply need many years prepare process association agreement helps prepare first step case western balkans special process stabilisation association process exists deal special circumstances country formally applies membership council asks commission prepare opinion country readiness begin negotiations council either accept reject commission opinion council rejected commission opinion latter advised opening negotiations greece council agrees open negotiations screening process begins commission candidate country examine laws eu determine differences exist council recommends opening negotiations chapters law feels sufficient common ground constructive negotiations negotiations typically matter candidate country convincing eu laws administrative capacity sufficient execute european law implemented seen fit member states often involve time-lines acquis communautaire european regulations directives standards fully implemented
|
Computer security
|
linux xp linux xp™️ fedora-based shareware linux distribution designed imitate windows environment using gnome desktop could run microsoft windows programs using wine compatibility layer linux xp registered within 99 boots installation os would deactivate
|
Operating systems
|
cri middleware cri started csk research institute subsidiary csk producing video games mega drive/genesis went develop games sega saturn dreamcast incorporated cri middleware 2001 adx streamed audio format allows multiple audio streams seamless looping continuous playback allowing two files crossfaded played sequence low predictable cpu usage format uses adpcm framework known cri adx sofdec streamed video format supporting 24bit color includes multistreaming seamless playback frame rate 60 frames per second essentially repackaging mpeg-1/mpeg-2 video cri proprietary adx codec audio playback known cri sofdec clipper automated lip-syncing program analyzes waveforms outputs appropriate lip pattern text file later substitution facial animations in-game speaker known cri clipper rofs file management system handling virtual disc image extension cd-rom standard limitations file name format number directories files designed compatibility adx sofdec mind known cri rofs sound factory gui-based video game audio tool effective sound design without input programmers support previewing playback generated audio known cri sound factory movie encode video encoding service cri generates sofdec mpeg files media fee designated length file encoded files converted desired format quality specified client known cri movie encode cri movie high definition video support cri filemajik file system features asynchronous file requests prioritized loads zero-buffer decompression umd speed emulation playstation portable
|
Distributed computing architecture
|
cnr software cnr one-click run free one-click software delivery service created make finding installing linux software easier assists user finding installing software computer sits dormant system tray use cnr offered large database linux programs suitable everyday specialty usage available linspire linux operating systems versions linux well 2002 legacy cnr created digital software delivery service created linspire inc service provide desktop linux user online software warehouse could click product installed desktop automatically required paid membership 49.95 use service warehouse hosted free non-free commercial linux software titles service relied client application work concert debian apt dpkg resolve dependencies install files 2006 support community linspire changed membership program two-tier system cnr basic cnr gold originally introduced 19.95-per-year subscription cnr basic membership later made free user could access free non-free software without subscription linspire announced plans april 24 2006 release cnr free software/open source license could used linux distributions early 2007 linspire announced going expand cnr service distributions namely debian ubuntu future extensions rpm linspire hoped consolidate aggregate desktop linux software one service provide easier method finding installing software desktop linux december 2007 linspire announced beta release new cnr.com service support updated linspire freespire distributions ubuntu 7.04 feisty ubuntu 7.10 gutsy planned ubuntu 8.04 hardy april 2008 march 10 2008 linspire closed legacy cnr service cnr also provides access thousands web-based applications providing linux community option local linux web software available single source february 2008 abilities browse search library products additional abilities planned improve web software experience bookmarking community also ability add new products already extensive library applications available cnr.com built collection services commonly referred service-oriented architecture soa highly scalable architecture built using following jee 5 technologies following list major services descriptive information one import service responsible importing package repositories parsing package metadata matching packages products using complex heuristically based algorithm import service supports debian based distribution rpm based packages supported domain model additional work specific rpm package metadata schema release management practices import service 98 success rate matching packages products admin support tools finding correcting problems quickly service responsible making cnr.com largest software warehouse desktop linux warehouse service contains web services apis used external clients acquire access install products cnr.com apis open public soap based apis consist following warehouse service also handles product requisite management product requisites user access requirements must fulfilled user gain install access product product requisites consist following ecommerce service handles purchases commercial software purchases member services collection user acceptance product eulas products require ecommerce service also responsible handling drm requirements software delivering activation codes user account registration isvs user management service handles creation management user accounts well authentication authorization user accounts user access respectively authentication managed using ldap sso utilized via token federation service package management service handles secure non-secure storage packages provides secure delivery types packages free non-free commercial making cnr.com industry leader delivering desktop linux software service also responsible categorization product categories xdg base extended set cnr categories found xdg set intended enhanced searchability community service provides forum wiki document blogging features community general product product mini-community discussions self-help community support thrive presentation layer cnr.com architecture responsible providing web 2.0 interfaces interfaces allow following features interfaces include product chart refresh cycle per 10 minutes various administrative interfaces viewing managing product user data support service provides tracking managing resolving user submitted support issues also facility paid support features versus free support features mail list service responsible mailing list enrollment subscription management well sending system emails user result user-based activity site secure data service responsible secure storage credit card profiles user elected save category data service responsible storage data associated product categories audit data service responsible storage user activity records installs client registration machine registrations etc product data service responsible storage product specific data well product aggregation data warehouse data service responsible storage package level data distribution level data resource data service responsible storage images associated product including user provided images like logos screenshots cnr client desktop client application interfaces apt dpkg desktop warehouse web services server intended provide starting point community build variations client software application written c++ gui built qt framework api integration done gsoap framework cnr client open source open licensed anyone use purposes without need license features include linspire planned port cnr service ubuntu distribution company announced plans april 24 2006 release cnr free software/open source license could used linux distributions january 23 2007 cnr website launched however launching warehouse announced q2 2007 release new free/open-source cnr client plug-in planned coincide release freespire 2.0 linspire 6.0 include free/open-source cnr client plug-in new cnr known internally linspire/freespire cnr 7 july 1 2008 linspire changed corporate name digital cornerstone acquired xandros deal gives xandros ownership linspire trademarks patents assets including cnr expected cnr client eventually made available xandros line desktop linux operating systems 2009 xandros introduced new app store based cnr includes access presto operating system six distributions expected supported time cnr 7 launch debian fedora core freespire linspire opensuse ubuntu feisty fawn support distributions expected starting 2008 test version cnr 7 released july 19 2007
|
Operating systems
|
cadence skill skill lisp dialect used scripting language pcell parameterized cells description language used many eda software suites cadence design systems originally put forth ieee paper 1990 skill originally based flavor lisp called franz lisp created uc berkeley students professor richard j. fateman skill acronym name trademark reasons cadence prefers capitalized franz lisp flavors lisp eventually superseded ansi standard common lisp historically skill known il skill library il functions name originally initialism silicon compiler interface language scil pronounced skil morphed skill plain english word easier everyone remember il interface language although skill used initially describe api rather language snappier name stuck name il remains common file extension used skill code designating code contained file lisp-2 semantics another possible file extension designating content lisp-1 semantics academic
|
Programming language topics
|
simple network management protocol simple network management protocol snmp internet standard protocol collecting organizing information managed devices ip networks modifying information change device behavior devices typically support snmp include cable modems routers switches servers workstations printers snmp widely used network management network monitoring snmp exposes management data form variables managed systems organized management information base mib describe system status configuration variables remotely queried circumstances manipulated managing applications three significant versions snmp developed deployed snmpv1 original version protocol recent versions snmpv2c snmpv3 feature improvements performance flexibility security snmp component internet protocol suite defined internet engineering task force ietf consists set standards network management including application layer protocol database schema set data objects typical uses snmp one administrative computers called managers task monitoring managing group hosts devices computer network managed system executes software component called agent reports information via snmp manager snmp-managed network consists three key components managed device network node implements snmp interface allows unidirectional read-only bidirectional read write access node-specific information managed devices exchange node-specific information nmss sometimes called network elements managed devices type device including limited routers access servers switches cable modems bridges hubs ip telephones ip video cameras computer hosts printers agent network-management software module resides managed device agent local knowledge management information translates information snmp-specific form network management station executes applications monitor control managed devices nmss provide bulk processing memory resources required network management one nmss may exist managed network snmp agents expose management data managed systems variables protocol also permits active management tasks configuration changes remote modification variables variables accessible via snmp organized hierarchies snmp define variables managed system offer rather snmp uses extensible design allows applications define hierarchies hierarchies described management information base mib mibs describe structure management data device subsystem use hierarchical namespace containing object identifiers oid oid identifies variable read set via snmp mibs use notation defined structure management information version 2.0 smiv2 subset asn.1 snmp operates application layer internet protocol suite snmp messages transported via user datagram protocol udp snmp agent receives requests udp port 161 manager may send requests available source port port 161 agent agent response sent back source port manager manager receives notifications traps informrequests port 162 agent may generate notifications available port used transport layer security datagram transport layer security requests received port 10161 notifications sent port 10162 snmpv1 specifies five core protocol data units pdus two pdus getbulkrequest informrequest added snmpv2 report pdu added snmpv3 snmp pdus constructed follows seven snmp pdu types identified pdu-type field follows snmpv1 snmpv2 use communities establish trust managers agents agents support three community names one read-only read-write trap three community strings control different types activities read-only community applies get requests read-write community string applies set requests trap community string applies receipt traps snmpv3 also uses community strings allows secure authentication communication snmp manager agent practice snmp implementations often support multiple versions typically snmpv1 snmpv2c snmpv3 snmp version 1 snmpv1 initial implementation snmp protocol design snmpv1 done 1980s group collaborators viewed officially sponsored osi/ietf/nsf national science foundation effort hems/cmis/cmip unimplementable computing platforms time well potentially unworkable snmp approved based belief interim protocol needed taking steps towards large scale deployment internet commercialization first request comments rfcs snmp known snmpv1 appeared 1988 1990 documents superseded 1991 mib-1 replaced often used snmpv1 widely used de facto network management protocol internet community snmpv1 may carried transport layer protocols user datagram protocol udp internet protocol ip osi connectionless-mode network service clns appletalk datagram delivery protocol ddp novell internetwork packet exchange ipx version 1 criticized poor security specification fact allow room custom authentication used widely used implementations support trivial authentication service identifies snmp messages authentic snmp messages. security messages therefore becomes dependent security channels messages sent example organization may consider internal network sufficiently secure encryption necessary snmp messages cases community name transmitted cleartext tends viewed de facto password spite original specification snmpv2 defined revises version 1 includes improvements areas performance security manager-to-manager communications introduced getbulkrequest alternative iterative getnextrequests retrieving large amounts management data single request new party-based security system introduced snmpv2 viewed many overly complex widely adopted version snmp reached proposed standard level maturity deemed obsolete later versions community-based simple network management protocol version 2 snmpv2c defined – snmpv2c comprises snmpv2 without controversial new snmp v2 security model using instead simple community-based security scheme snmpv1 version one relatively standards meet ietf draft standard maturity level widely considered de facto snmpv2 standard later restated part snmpv3 user-based simple network management protocol version 2 snmpv2u defined – compromise attempts offer greater security snmpv1 without incurring high complexity snmpv2 variant commercialized snmp v2* mechanism eventually adopted one two security frameworks snmp v3 snmpv2c incompatible snmpv1 two key areas message formats protocol operations snmpv2c messages use different header protocol data unit pdu formats snmpv1 messages snmpv2c also uses two protocol operations specified snmpv1 overcome incompatibility defines two snmpv1/v2c coexistence strategies proxy agents bilingual network-management systems snmpv2 agent act proxy agent behalf snmpv1 managed devices follows proxy agent maps snmpv1 trap messages snmpv2 trap messages forwards nms bilingual snmpv2 network-management systems support snmpv1 snmpv2 support dual-management environment management application bilingual nms must contact agent nms examines information stored local database determine whether agent supports snmpv1 snmpv2 based information database nms communicates agent using appropriate version snmp although snmpv3 makes changes protocol aside addition cryptographic security looks much different due new textual conventions concepts terminology visible change define secure version snmp adding security remote configuration enhancements snmp due lack security earlier versions network administrators often used means telnet ssh configuration accounting fault management snmpv3 focuses two main aspects namely security administration security aspect addressed offering strong authentication data encryption privacy administration aspect snmpv3 focuses two parts namely notification originators proxy forwarders changes also facilitated remote configuration administration snmp entities well addressing issues related large-scale deployment accounting fault management features enhancements included security one biggest weakness snmp v3 authentication snmp versions 1 2 amounts nothing password community string sent clear text manager agent snmpv3 message contains security parameters encoded octet string meaning security parameters depends security model used security approach v3 targets v3 also defines usm vacm later followed transport security model provided support snmpv3 ssh snmpv3 tls dtls snmp implementations vary across platform vendors cases snmp added feature taken seriously enough element core design major equipment vendors tend over-extend proprietary command line interface cli centric configuration control systems february 2002 carnegie mellon software engineering institute cm-sei computer emergency response team coordination center cert-cc issued advisory snmpv1 ca-2002-03 oulu university secure programming group conducted thorough analysis snmp message handling snmp implementations regardless version protocol use program code decoding protocol data units pdu thus many vendors issue patches snmp implementations among others problems found decoding snmp trap messages received snmp management station requests received snmp agent network device snmp powerful write capabilities would allow configuration network devices fully utilized many vendors partly lack security snmp versions snmpv3 partly many devices simply capable configured via individual mib object changes requirements snmp set operation easy implement correctly many vendors chose omit support set – probably lower development cost reduce code size among reasons snmp seemingly simple tree structure linear indexing may always understood well enough within internal data structures elements platform basic design consequently processing snmp queries certain data sets may result higher cpu utilization necessary one example would large routing tables bgp igp snmp values especially tabular values require specific knowledge table indexing schemes index values necessarily consistent across platforms cause correlation issues fetching information multiple devices may employ table indexing scheme example fetching disk utilization metrics specific disk identifier different across platforms modular devices may dynamically increase decrease snmp indices a.k.a instances whenever slotted hardware added removed although common hardware virtual interfaces effect index values typically assigned boot time remain fixed next reboot hardware virtual entities added device 'live may indices assigned end existing range possibly reassigned next reboot network inventory monitoring tools need device update capability properly reacting cold start trap device reboot order avoid corruption mismatch polled data index assignments snmp device instance may change poll poll mostly result changes initiated system administrator information needed particular interface imperative determine snmp index retrieving data needed generally description table like ifdescr map user friendly name like serial 0/1 blade 0 port 1 snmp index however necessarily case specific snmp value arbitrary snmp implementation snmp designed allow administrators monitor configure network devices remotely also used penetrate local area network lan snmp used network turned aside creating vulnerability consume available network bandwidth needlessly use cpu cycles significant number software tools scan entire network snmp therefore mistakes configuration read-write mode make network susceptible attacks 2001 cisco released information even read mode snmp implementation cisco ios 11.0 12.0 operating system used switches routers vulnerable certain denial service attacks security issues fixed ios upgrade configuring snmp read-only mode close attention paid configuration access control ip addresses snmp messages accepted snmp servers identified ip snmp allowed respond ips snmp messages ip addresses would denied however ip address spoofing remains security concern snmp available different versions 1 2 3 security issues snmp v1 sends passwords clear-text network therefore passwords read packet sniffing snmp v2 allows password hashing md5 configured virtually network management software support snmp v1 necessarily snmp v2 v3 snmp v2 specifically developed provide data security authentication privacy authorization snmp version 2c gained endorsement internet engineering task force ietf versions 2u 2* failed gain ietf approval due security issues snmp v3 uses md5 secure hash algorithm sha keyed algorithms offer protection unauthorised data modification masquerade attacks higher level security needed data encryption standard des optionally used cipher block chaining mode snmp v3 implemented cisco ios since release 12.0 3 t. snmpv3 may subject brute force dictionary attacks guessing authentication keys encryption keys keys generated short weak passwords passwords found dictionary snmpv3 allows providing random uniformly distributed cryptographic keys generating cryptographic keys password supplied user risk guessing authentication strings hash values transmitted network depends hash function used length hash value snmpv3 uses hmac-sha-2 authentication protocol user-based security model usm challenge-response handshake used improve security snmpv3 like snmp protocol versions stateless protocol designed minimal amount interactions agent manager thus introducing challenge-response handshake command would impose burden agent possibly network protocol designers deemed excessive unacceptable security deficiencies snmp versions mitigated ipsec authentication confidentiality mechanisms implementation snmp datagram transport layer security dtls also available snmp based network management software send passwords repeatedly normal operations across network therefore clear-text passwords significant security risk snmp v2 used network administrator enable password encryption network devices snmp servers running done command snmp-server enable traps snmp authentication md5 many snmp implementations include type automatic discovery new network component switch router discovered pooled automatically snmpv1 v2c done community string broadcast clear-text devices default configuration community strings public read-only access private read-write snmp topped list sans institute common default configuration issues number ten sans top 10 critical internet security threats year 2000 system network administrators frequently change configurations community string sent snmp network encrypted community string known outside organisation could become target attack prevent easy discovery community snmp configured pass community-name authentication failure traps snmp management device needs configured react authentication failure trap snmpv1 v2 vulnerable ip spoofing attacks whether runs tcp udp subject bypassing device access lists might implemented restrict snmp access snmpv3 security mechanisms usm tsm prevent successful attack would pointless employ snmpv3 vacm view-based access control without securing messages usm tsm
|
Internet protocols
|
joe ossanna joseph f. ossanna december 10 1928 detroit michigan – november 28 1977 morristown new jersey worked member technical staff bell telephone laboratories murray hill new jersey became actively engaged software design multics multiplexed information computing service general-purpose operating system used bell ossanna received bachelor engineering b.s.e.e wayne state university 1952 bell telephone labs ossanna concerned low-noise amplifier design feedback amplifier design satellite look-angle prediction mobile radio fading theory statistical data processing also concerned operation murray hill computation center actively engaged software design multics learning program pdp-7 computer ken thompson dennis ritchie joe ossanna rudd canaday began program operating system designed earlier thompson unics later named unix writing file system set basic utilities assembler core unix operating system established doug mcilroy later wrote ossanna instincts motor pool sergeant equipped first lab attracted first outside users team got graphic systems cat phototypesetter making camera-ready copy professional articles publication patent applications ossanna wrote version nroff would drive dubbed troff typesetter roff 1973 authored first version troff unix entirely written pdp-11 assembly language however two years later ossanna re-wrote code c programming language planned another rewrite supposed improve usability work taken brian kernighan ossanna member association computing machinery sigma xi tau beta pi died consequence heart disease
|
Operating systems
|
system safety monitor system safety monitor ssm hips software behavior blocker developed system safety ltd windows platform ssm rely signatures detect malware instead monitors system certain types suspicious behavior warns user giving chance block allow like behavior blockers hips ssm warns certain event behavior occurs process causes warnings might legitimate software tasks though user decide whether allow block behavior ssm began private project 2002 one first behavior blockers aimed home user market april 2005 sold group professionals started syssafety company went commercial released first 2.0 beta series september 2005 june 2006 series split 2 lines first freeware version 2.0 features original 1.9 series plus improvements also 2.1 commercial version improvements freeware version particularly improved registry control hooking opposed polling low level keylogging control better termination protection new 2.1 version also dropped support windows 98 windows ssm similar many products class offers termination protection process filtering blocking driver installs etc separates hips programs offers process filtering also parent-child control processes means instead giving process complete rights start specify restrictive rules given process started another specific process example might want allow windows explorer start web browser might want processes start browser might exploit browser phone home see also leak tests ssm used effectively spyware adware programs well rootkits trojans keyloggers dialers browser hijackers commercial surveillance software however relies entirely user responding correctly prompts beginners might confused prompts respond incorrectly worst-case scenario lead malware infecting system allowing dangerous activity system error blocking activity needed system ssm also offers learning mode rules automatically made needed creating baseline normal operations assumes system clean ssm learn allow malware regardless training mode whenever new unknown process run prompt created unless user chooses block prompts
|
Computer security
|
princess tomato salad kingdom ported may 27 1988 famicom february 8 1991 nintendo entertainment system north america also released wii virtual console japan january 19 2010 north america february 8 2010 characters primarily cartoon-like anthropomorphic fruits vegetables taking role sir cucumber knight player assigned king broccoli deceased defeat evil minister pumpkin kidnapped princess tomato early sir cucumber gains sidekick percy baby persimmon offers advice helps throughout quest always refers sir cucumber boss princess tomato salad kingdom plays similarly text adventure though due nes lack keyboard accessory possible commands represented buttons line sides screen commands fixed change gameplay primarily game consists still screens exception finger wars rock paper scissors mazes occasional animated character octoberry fernbirds players issue commands game protagonist way lose able determine action required advance failing defeat end-game boss minister pumpkin game finger wars
|
Computer architecture
|
compatibility mode compatibility mode software mechanism software either emulates older version software mimics another operating system order allow older incompatible software files remain compatible computer newer hardware software examples software using mode operating systems internet explorer compatibility mode operating system software mechanism computer operating system emulates older processor operating system and/or hardware platform order allow older software remain compatible computer newer hardware software differs full-fledged emulator emulator typically creates virtual hardware architecture host system rather simply translating older system function calls calls host system understand examples include classic mode mac os x windows 2000 windows xp windows vista windows 7 compatibility mode allow applications designed older versions operating system run examples include wine run windows programs linux os x mono run .net programs various unix-like systems compatibility view compatibility mode feature web browser internet explorer version 8 later active compatibility view forces ie display webpage quirks mode page viewed ie7 compatibility view activated ie said running native mode ie11 user turn compatibility mode web site clicking gears icon clicking compatibility view settings internet explorer 8 promoted microsoft stricter adherence w3c described web standards internet explorer 7 result every ie version percentage web pages coded behavior older versions would break ie8 would repetition situation ie7 fixed bugs ie6 broke pages used ie6-specific hacks work around non-compliance especially problem offline html documents may updatable e.g stored read-only medium cd-rom dvd-rom avoid situation ie8 implemented form version targeting whereby page could authored specific version browser using codice_1 declaration either meta element http headers order maintain backwards compatibility sites opt ie7-like handling content inserting specially created meta element web page triggers compatibility mode browser using newer version browser page coded would emulate behavior older version assumptions page made browser behavior hold true microsoft proposed page doctype triggers standards mode almost standards mode ie7 would default trigger ie7-like behavior called standards mode called strict mode ie8 future versions ie new features ie8 enabled trigger microsoft called ie8 standards mode called standards mode doctypes trigger quirks mode ie7 continue ie8 peter bright ars technica claimed idea using meta tag pick specific rendering mode fundamentally misses point standards-based development positioned issue one idealism versus pragmatism web development noting web maintained demanding web developers update sites ensure continue work properly future browser version probably much ask result ie 8 beta 1 could render three modes quirks strict standard old doctype doctype ie renders like ie5 would quirks mode special meta element corresponding http header included web page ie8 render page like ie7 would strict mode otherwise ie8 renders pages engine standard mode users switch three modes clicks release internet explorer 8 beta 1 revealed many web sites work new standards mode microsoft maintains list websites reported problems ie8 standards mode known compatibility view list user enables list ie8 render websites list using compatibility view mode list occasionally updated add newly reported problematic websites well remove websites whose owners requested removal internet explorer team also tests websites list compatibility issues removes none found
|
Computer architecture
|
core common area core common area named magnetic core memory term persisted modern era commonly used fortran basic languages
|
Operating systems
|
nolacon infosec conference nolacon information security conference held annually new orleans united states first year 2014 nolacon held sheraton canal st. 2015 2016 2017 2018 2019 may 17-19 conference astor crowne plaza new orleans french quarter
|
Computer security
|
spread spectrum telecommunication radio communication spread-spectrum techniques methods signal e.g. electrical electromagnetic acoustic signal generated particular bandwidth deliberately spread frequency domain resulting signal wider bandwidth techniques used variety reasons including establishment secure communications increasing resistance natural interference noise jamming prevent detection limit power flux density e.g. satellite links technique telecommunication signal transmitted bandwidth considerably larger frequency content original information frequency hopping basic modulation technique used spread spectrum signal transmission spread-spectrum telecommunications signal structuring technique employs direct sequence frequency hopping hybrid used multiple access and/or multiple functions technique decreases potential interference receivers achieving privacy spread spectrum generally makes use sequential noise-like signal structure spread normally narrowband information signal relatively wideband radio band frequencies receiver correlates received signals retrieve original information signal originally two motivations either resist enemy efforts jam communications anti-jam aj hide fact communication even taking place sometimes called low probability intercept lpi frequency-hopping spread spectrum fhss direct-sequence spread spectrum dsss time-hopping spread spectrum thss chirp spread spectrum css combinations techniques forms spread spectrum first two techniques employ pseudorandom number sequences—created using pseudorandom number generators—to determine control spreading pattern signal across allocated bandwidth wireless standard ieee 802.11 uses either fhss dsss radio interface frequency-hopping may date back radio pioneer jonathan zenneck 1908 german book wireless telegraphy although states telefunken using previously saw limited use german military world war put forward polish engineer leonard danilewicz 1929 showed patent 1930s willem broertjes issued aug. 2 1932 top-secret us army signal corps world war ii communications system named sigsaly world war ii golden age hollywood actress hedy lamarr avant-garde composer george antheil developed intended jamming-resistant radio guidance system use allied torpedoes patenting device us patent 2,292,387 secret communications system august 11 1942 approach unique frequency coordination done paper player piano rolls novel approach never put practice spread-spectrum clock generation sscg used synchronous digital systems especially containing microprocessors reduce spectral density electromagnetic interference emi systems generate synchronous digital system one driven clock signal periodic nature unavoidably narrow frequency spectrum fact perfect clock signal would energy concentrated single frequency desired clock frequency harmonics practical synchronous digital systems radiate electromagnetic energy number narrow bands spread clock frequency harmonics resulting frequency spectrum certain frequencies exceed regulatory limits electromagnetic interference e.g fcc united states jeita japan iec europe spread-spectrum clocking avoids problem using one methods previously described reduce peak radiated energy therefore electromagnetic emissions comply electromagnetic compatibility emc regulations become popular technique gain regulatory approval requires simple equipment modification even popular portable electronics devices faster clock speeds increasing integration high-resolution lcd displays ever smaller devices devices designed lightweight inexpensive traditional passive electronic measures reduce emi capacitors metal shielding viable active emi reduction techniques spread-spectrum clocking needed cases however spread-spectrum clocking like kinds dynamic frequency change also create challenges designers principal among clock/data misalignment clock skew note method reduce total radiated energy therefore systems necessarily less likely cause interference spreading energy larger bandwidth effectively reduces electrical magnetic readings within narrow bandwidths typical measuring receivers used emc testing laboratories divide electromagnetic spectrum frequency bands approximately 120 khz wide system test radiate energy narrow bandwidth would register large peak distributing energy larger bandwidth prevents systems putting enough energy one narrowband exceed statutory limits usefulness method means reduce real-life interference problems often debated perceived spread-spectrum clocking hides rather resolves higher radiated energy issues simple exploitation loopholes emc legislation certification procedures situation results electronic equipment sensitive narrow bandwidth experiencing much less interference broadband sensitivity even operated higher frequencies radio receiver tuned different station experience interference fcc certification testing often completed spread-spectrum function enabled order reduce measured emissions within acceptable legal limits however spread-spectrum functionality may disabled user cases example area personal computers bios writers include ability disable spread-spectrum clock generation user setting thereby defeating object emi regulations might considered loophole generally overlooked long spread-spectrum enabled default ability disable spread-spectrum clocking computer systems considered useful overclocking spread spectrum lower maximum clock speed achievable due clock skew
|
Internet protocols
|
illuminate labs illuminate labs swedish software company based gothenburg founded 2002 specializing video games lighting company produces two middleware products called beast turtle based liquidlight technology illuminate labs products used largest game studios world electronic arts blizzard sony computer entertainment square enix bioware illuminate labs opened office san francisco 2009 autodesk acquired illuminate labs july 21 2010 san rafael california undisclosed amount turtle rendering baking plugin autodesk maya used lighting content creation next-gen game development turtle create global illumination game levels bake illumination texture maps vertex maps point clouds features include baking occlusion normal maps highly detailed models low polygon models baked results visualized maya viewport using gpu beast content pipeline tool used advanced global illumination dynamic character relighting beast enables advanced global illumination enhances look video games little effort beast precalculate lighting light maps shadow maps point clouds bake occlusion normal maps generate light fields dynamic relighting characters objects several game titles made beast and/or turtle company part epic ’ integrated partners program emergent certified partner official autodesk conductors partner partners include 3d labs adobe apple angstrom ati nvidia microsoft pixologic unity technologies announced next unity version 3.0 feature built-in beast lightmapping global illumination shelf
|
Distributed computing architecture
|
dec alpha alpha originally known alpha axp 64-bit reduced instruction set computing risc instruction set architecture isa developed digital equipment corporation dec designed replace 32-bit vax complex instruction set computer cisc isa alpha implemented microprocessors originally developed fabricated dec microprocessors prominently used variety dec workstations servers eventually formed basis almost mid-to-upper-scale lineup several third-party vendors also produced alpha systems including pc form factor motherboards operating systems supported alpha included openvms previously known openvms axp tru64 unix previously known dec osf/1 axp digital unix windows nt discontinued nt 4.0 pre-release windows 2000 rc1 linux debian suse gentoo red hat bsd unix netbsd openbsd freebsd 6.x plan 9 bell labs well l4ka :pistachio kernel alpha architecture sold along parts dec compaq 1998 compaq already intel customer phased alpha favor forthcoming hewlett-packard/intel itanium architecture sold alpha intellectual property intel 2001 effectively killing product hewlett-packard purchased compaq later year continuing development existing product line 2004 selling alpha-based systems largely existing customer base april 2007 alpha born earlier risc project named prism parallel reduced instruction set machine product several earlier projects prism intended flexible design supporting unix-like applications well digital existing vms programs vax minor conversion new unix-like operating system known mica would run applications natively supporting vms emulation running time development palo alto design team working unix-only workstation originally included prism however development workstation well ahead prism engineers proposed release machines using mips r2000 processor instead moving release date considerably dec management doubted need produce new computer architecture replace existing vax decstation lines eventually ended prism project 1988 time cancellation however second-generation risc chips newer sparc architecture offering much better price/performance ratios vax lineup clear third generation would completely outperform vax ways cost another study started see new risc architecture could defined could directly support vms operating system new design used basic prism concepts re-tuned allow vms vms programs run reasonable speed conversion decision also made upgrade design full 64-bit implementation prism 32-bit conversion major risc vendors undertaking eventually new architecture became alpha primary alpha instruction set architects richard l. sites richard t. witek prism epicode developed alpha palcode providing abstracted interface platform- processor implementation-specific features main contribution alpha microprocessor industry main reason performance much architecture rather implementation time microchip industry dominated automated design layout tools chip designers digital continued pursuing sophisticated manual circuit design order deal overly complex vax architecture alpha chips showed manual circuit design applied simpler cleaner architecture allowed much higher operating frequencies possible automated design systems chips caused renaissance custom circuit design within microprocessor design community originally alpha processors designated decchip 21x64 series decchip replaced mid-1990s alpha first two digits 21 signifies 21st century last two digits 64 signifies 64 bits alpha designed 64-bit start 32-bit version middle digit corresponded generation alpha architecture internally alpha processors also identified ev numbers ev officially standing extended vax alternative humorous meaning electric vlasic giving homage electric pickle experiment western research lab first generations alpha chips innovative time persistent report attributed dec insiders suggests choice axp tag processor made dec legal department still smarting vax trademark fiasco lengthy search tag axp found entirely unencumbered within computer industry joke got started acronym axp meant almost exactly prism alpha architecture intended high-performance design digital intended architecture support one-thousandfold increase performance twenty-five years ensure architectural feature impeded multiple instruction issue clock rate multiprocessing removed result alpha alpha condition codes integer instructions remove potential bottleneck condition status register instructions resulting overflow adding two numbers whose result fit 64 bits write 32 64 least significant bits destination register carry generated performing unsigned compare result either operand see result smaller either operand test true value one written least significant bit destination register indicate condition architecture defined set 32 integer registers set 32 floating-point registers addition program counter two lock registers floating-point control register fpcr also defined registers optional implemented implementation required lastly registers palcode defined integer registers denoted r0 r31 floating-point registers denoted f0 f31 r31 f31 registers hardwired zero writes registers instructions ignored digital considered using combined register file split register file determined better enabled two-chip implementations register file located chip integer-only implementations omit floating-point register file containing floating point registers split register file also determined suitable multiple instruction issue due reduced number read write ports number registers per register file also considered 32 64 contenders digital concluded 32 registers suitable required less die space improved clock frequencies number registers deemed major issue respect performance future growth thirty-two registers could support least eight-way instruction issue program counter 64-bit register contains longword-aligned virtual byte address low two bits program counter always zero pc incremented four address next instruction instruction decoded lock flag locked physical address register used load-locked store-conditional instructions multiprocessor support floating-point control register fpcr 64-bit register defined architecture intended use alpha implementations ieee 754-compliant floating-point hardware alpha architecture byte defined 8-bit datum octet word 16-bit datum longword 32-bit datum quadword 64-bit datum octaword 128-bit datum alpha architecture originally defined six data types maintain level compatibility vax 32-bit architecture preceded alpha two floating-point data types included alpha 64-bit linear virtual address space memory segmentation implementations implement smaller virtual address space minimum size 43 bits although unused bits implemented hardware tlbs architecture required implementations check whether zero ensure software compatibility implementations larger full virtual address space alpha isa fixed instruction length 32 bits six instruction formats integer operate format used integer instructions contains 6-bit opcode field followed ra field specifies register containing first operand rb field specifies register containing second operand next 3-bit field unused reserved 1-bit field contains 0 distinguished format integer literal format 7-bit function field follows used conjunction opcode specify operation last field rc field specifies register result computation written register fields 5 bits long required address 32 unique locations 32 integer registers integer literal format used integer instructions use literal one operands format integer operate format except replacement 5-bit rb field 3 bits unused space 8-bit literal field zero-extended 64-bit operand floating-point operate format used floating-point instructions similar integer operate format 11-bit function field made possible using literal unused bits reserved integer operate format memory format used mostly load store instructions 6-bit opcode field 5-bit ra field 5-bit rb field 16-bit displacement field branch instructions 6-bit opcode field 5-bit ra field 21-bit displacement field ra field specifies register tested conditional branch instruction condition met program counter updated adding contents displacement field program counter displacement field contains signed integer value integer positive branch taken program counter incremented value integer negative program counter decremented branch taken range branch thus ±1 mi instructions ±4 mib alpha architecture designed large range part architecture forward-looking goal call_pal format used codice_1 instruction used call palcode subroutines format retains opcode field replaces others 26-bit function field contains integer specifying pal subroutine control instructions consist conditional unconditional branches jumps conditional unconditional branch instructions use branch instruction format jump instructions use memory instruction format conditional branches test whether least significant bit register set clear compare register signed quadword zero branch specified condition true conditions available comparing register zero equality inequality less less equal greater equal greater new address computed longword aligning sign extending 21-bit displacement adding address instruction following conditional branch unconditional branches update program counter new address computed way conditional branches also save address instruction following unconditional branch register two instructions differ hints provided branch prediction hardware four jump instructions perform operation saving address instruction following jump providing program counter new address register differ hints provided branch prediction hardware unused displacement field used purpose integer arithmetic instructions perform addition multiplication subtraction longwords quadwords comparison quadwords instruction division architects considered implementation division hardware adverse simplicity addition standard add subtract instructions scaled versions versions shift second operand left two three bits adding subtracting multiply longword multiply quadword instructions write least significant 32 64 bits 64- 128-bit result destination register respectively since useful obtain significant half unsigned multiply quadword high umulh instruction provided umulh used implementing multi-precision arithmetic division algorithms concept separate instruction multiplication returns significant half result taken prism instructions operate longwords ignore significant half register 32-bit result sign-extended written destination register default add multiply subtract instructions exception umulh scaled versions add subtract trap overflow functionality required versions instructions perform overflow detection trap overflow provided compare instructions compare two registers register literal write 1 destination register specified condition true 0 conditions equality inequality less equal less exception instructions specify former two conditions versions perform signed unsigned compares integer arithmetic instructions use integer operate instruction formats logical instructions consist performing bitwise logical operations conditional moves integer registers bitwise logical instructions perform nand xnor xor two registers register literal conditional move instructions test register signed quadword zero move specified condition true specified conditions equality inequality less equal less greater equal greater shift instructions perform arithmetic right shift logical left right shifts shift amount given register literal logical shift instructions use integer operate instruction formats later alpha included byte-word extensions set instructions manipulate 8-bit 16-bit data types instructions first introduced 21164a ev56 microprocessor present subsequent implementations instructions performed operations previously required multiple instructions implement improved code density performance certain applications bwx also made emulation x86 machine code writing device drivers easier motion video instructions mvi instruction set extension alpha isa added instructions single instruction multiple data simd operations alpha implementations implement mvi chronological order alpha 21164pc pca56 pca57 alpha 21264 ev6 alpha 21364 ev7 unlike simd instruction sets period mips mdmx sparc visual instruction set like pa-risc multimedia acceleration extensions mvi simple instruction set composed instructions operate integer data types stored existing integer registers mvi simplicity due two reasons firstly digital determined alpha 21164 already capable performing dvd decoding software therefore requiring hardware provisions purpose inefficient mpeg-2 encoding second reason requirement retain fast cycle times implementations adding many instructions would complicated enlarged instruction decode logic reducing implementation clock frequency mvi consisted 13 instructions floating-point extensions fix extension alpha architecture introduced nine instructions floating-point square-root transferring data integer registers floating-point registers alpha 21264 ev6 first microprocessor implement instructions count extensions cix extension architecture introduced three instructions counting bits instructions categorized integer arithmetic instructions first implemented alpha 21264a ev67 time announcement alpha heralded architecture next 25 years alpha nevertheless reasonably long life first version alpha 21064 otherwise known ev4 introduced november 1992 running 192 mhz slight shrink die ev4s shrunk 0.75 µm 0.675 µm ran 200 mhz months later 64-bit processor superpipelined superscalar design like risc designs nevertheless outperformed dec touted world fastest processor careful attention circuit design hallmark hudson design team like huge centralized clock circuitry allowed run cpu higher speeds even though microarchitecture fairly similar risc chips comparison less expensive intel pentium ran 66 mhz launched following spring alpha 21164 ev5 became available 1995 processor frequencies 333 mhz july 1996 line speed bumped 500 mhz march 1998 666 mhz also 1998 alpha 21264 ev6 released 450 mhz eventually reaching 2001 21264c/ev68cb 1.25 ghz 2003 alpha 21364 ev7 marvel launched essentially ev68 core four 1.6 gb/s inter-processor communication links improved multiprocessor system performance running 1 1.15 ghz 1996 production alpha chips licensed samsung electronics company following purchase digital compaq majority alpha products placed api networks inc. previously alpha processor inc. private company funded samsung compaq october 2001 microway became exclusive sales service provider api networks alpha-based product line june 25 2001 compaq announced alpha would phased 2004 favor intel itanium canceled planned ev8 chip sold alpha intellectual property intel hp new owner compaq later year announced development alpha series would continue years including release 1.3 ghz ev7 variant called ev7z would final iteration alpha 0.13 µm ev79 also canceled alpha also implemented piranha research prototype developed compaq corporate research nonstop hardware development groups western research laboratory systems research center piranha multicore design transaction processing workloads contained eight simple cores described 27th annual international symposium computer architecture june 2000 illustrate comparative performance alpha-based systems spec performance numbers specint95 specfp95 listed note spec results claim report measured performance whole computer system cpu bus memory compiler optimizer cpu also note benchmark scale changed 1992 1995 however figures give rough impression performance alpha architecture 64-bit compared contemporary hp 64-bit intel-based offerings 32-bit perhaps obvious trend intel could always get reasonably close alpha integer performance floating point performance difference considerable side hp pa-risc also reasonably close alpha cpus running significantly lower clock rates mhz tables lack two important values power consumption price cpu first generation dec alpha-based systems comprised dec 3000 axp series workstations low-end servers dec 4000 axp series mid-range servers dec 7000 axp 10000 axp series high-end servers dec 3000 axp systems used turbochannel bus previous mips-based decstation models whereas 4000 based futurebus+ 7000/10000 shared architecture corresponding vax models dec also produced pc-like alpha workstation eisa bus decpc axp 150 codename jensen also known dec 2000 axp first alpha system support windows nt dec later produced alpha versions celebris xl digital personal workstation pc lines 21164 processors digital also produced single board computers based vmebus embedded industrial use first generation included 21068-based axpvme 64 axpvme 64lc 21066-based axpvme 160 introduced march 1 1994 later models axpvme 100 axpvme 166 axpvme 230 based 21066a processor alpha vme 4/224 alpha vme 4/288 based 21064a processor last models alpha vme 5/352 alpha vme 5/480 based 21164 processor 21066 chip used dec multia vx40/41/42 compact workstation alphabook 1 laptop tadpole technology 1994 dec launched new range alphastation alphaserver systems used 21064 21164 processors introduced pci bus vga-compatible frame buffers ps/2-style keyboards mice alphaserver 8000 series superseded dec 7000/10000 axp also employed xmi futurebus+ buses alphastation xp1000 first workstation based 21264 processor later alphaserver/station models based 21264 categorised ds departmental server es enterprise server gs global server families final 21364 chip used alphaserver es47 es80 gs1280 models alphastation es47 number oem motherboards produced dec 21066 21068-based axppci 33 noname part major push oem market company 21164-based alphapc 164 alphapc 164lx 21164pc-based alphapc 164sx alphapc 164rx 21264-based alphapc 264dp several third parties samsung api also produced oem motherboards api up1000 up2000 assist third parties developing hardware software platform dec produced evaluation boards eb64+ eb164 alpha 21064a 21164 microprocessors respectively 21164 21264 processors used netapp various network-attached storage systems 21064 21164 processors used cray t3d t3e massively parallel supercomputers fastest supercomputer based alpha processors
|
Computer architecture
|
naren gupta narendra gupta born 1948 one india ’ highest profile venture capital investors founder investment company nexus venture partners well various investment software firms also ceo president integrated systems inc. isi decade half 2007 gupta founded nexus venture partners silicon valley investment firm “ homegrown indian operation extensive reach experience overseas notably silicon valley. ” made investments variety technical media startups around india united states boasts 1bn management active portfolio 60+ firms throughout following industries business services consumer healthcare internet technology gupta – via nexus – made investments several developers products including hypertrack h2o software postman also made unique cloud investments ” aryaka dimdim druva mcheck pubmatic snapdeal companies share similar trait developed entrepreneurs india serve international markets interview wall street journal gupta said within years india would building “ billion-dollar startups. ” said traditional approach investment used silicon valley really accepted india sees great deal “ untapped potential ” software industries like cloud computing mobile apps yet “ special challenges ” investing india gupta expanded “ certainly fast-growing startups need hand-holding need u.s quite bit technology talent india ’ leadership marketing talent. ” plus often push indian entrepreneurs sell early rather waiting develop “ billion dollar enterprise many years. ” nexus gupta developed greater sense work within indian culture said “ investors u.s. ’ understand family-run businesses india run. ” basically indian entrepreneurs get program order understand “ tickles fancy consumers ” since one independent firm emerged key player gupta says “ makes sense korea done japan china india. ” regarding indian e-commerce gupta said recently exploded explained “ every investor wanted e-commerce investor – valuations doubling every month completely ridiculous. ” euphoria dissipated speaking indian prime minister narendra modi gupta quoted saying “ innovation state mind saying help bring state mind india big changes pretty much impossible make need democracy take thousand little steps. ” gupta co-founder ceo president integrated systems inc. isi decade-and-a-half 1990 took public merging wind river systems remained board acquired intel boasts two decades experience field early early-growth stage investment america india gupta chairman board red hat member board trustees california institute technology asia society northern california also sits variety privately held companies gives counsel entrepreneurs throughout world gupta bachelor technology degree indian institute technology master science california institute technology ph.d stanford university gupta recipient president ’ gold medal indian institute technology delhi well elected fellow ieee received distinguished alumni awards iit caltech
|
Distributed computing architecture
|
nickle programming language nickle numeric oriented programming language keith packard bart massey originally used desktop calculation since expanded prototyping complicated algorithms
|
Programming language topics
|
spam reporting spam reporting properly called abuse reporting activity pinning abusive messages report kind authority dealt reported messages email messages blog comments kind spam abuse reports particular kind feedback whereby users flag users posts abusive content web sites allow user generated content either apply sort moderation based abuse reports hiding deleting offending content defined threshold implement variety user roles allow users govern site contents cooperatively spammers behavior ranges somehow forcing users opt cooperatively offering possibility opt wildly hiding sender identity including phishing intractable cases dealt reporting abusive message hash-sharing systems like example vipul razor benefit victims cases may cooperative component sender side use spam reports fix mitigate problem origin example may use detect botnets educate sender simply unsubscribe report originator email spam legislation varies country forbidding abusive behavior extent cases may worth prosecuting spammers claiming damages rfc 6650 recommends recipients abusive messages report mailbox providers provider abuse-team determine best course action possibly considering hash-sharing legal steps sender subscribed feedback loop fbl mailbox provider forward complaint feedback report according existing fbl agreement otherwise mailbox providers determine responsible abuse forward complaint recipients unsolicited abuse reports actually prospect fbl subscribers inasmuch mailbox provider needs offer means manage report stream hand mailbox providers prevent messages non-cooperative senders abusive content abuse reports sent email using abuse reporting format arf except initial notification recipient cases mailbox implementation provides direct means target address abuse report depends authority abusive message going reported choices include following first three methods provide full email addresses send reports otherwise target abuse mailboxes assumed form defined rfc 2142 abuse example.com determined querying either rir whois databases—which may query result limits— databases created specifically purpose tendency mandate publication exact abuse pocs abused receivers automate spam reporting different degrees push button see message run tool automatically quarantines reports messages recognizes spam specific tools available receivers report abuse hand forward spammy message attachment—so include whole header—and send chosen authority mailbox providers also use tools automatically process incidents notifications
|
Computer security
|
truth discovery truth discovery also known truth finding process choosing actual true value data item different data sources provide conflicting information several algorithms proposed tackle problem ranging simple methods like majority voting complex ones able estimate trustworthiness data sources truth discovery problems divided two sub-classes single-truth multi-truth first case one true value allowed data item e.g birthday person capital city country second case multiple true values allowed e.g cast movie authors book typically truth discovery last step data integration pipeline schemas different data sources unified records referring data item detected abundance data available web makes probable find different sources provide partially completely different values data item together fact increasing reliance data derive important decisions motivates need developing good truth discovery algorithms many currently available methods rely voting strategy define true value data item nevertheless recent studies shown rely majority voting could get wrong results even 30 data items solution problem assess trustworthiness sources give importance votes coming trusted sources ideally supervised learning techniques could exploited assign reliability score sources hand-crafted labeling provided values unfortunately feasible since number needed labeled examples proportional number sources many applications number sources prohibitive single-truth multi-truth discovery two different problems single-truth discovery characterized following properties multi-truth case following properties hold multi-truth discovery unique features make problem complex taken consideration developing truth-discovery solutions examples point main differences two methods knowing examples truth provided source 1 single truth case first table say sources 2 3 oppose truth result provide wrong values hand second case second table sources 2 3 neither correct erroneous instead provide subset true values time oppose truth vast majority truth discovery methods based voting approach source votes value certain data item end value highest vote select true one sophisticated methods votes weight data sources importance indeed given votes coming trusted sources source trustworthiness usually known priori estimated iterative approach step truth discovery algorithm trustworthiness score data source refined improving assessment true values turn leads better estimation trustworthiness sources process usually ends values reach convergence state source trustworthiness based different metrics accuracy provided values copying values sources domain coverage detecting copying behaviors important fact copy allows spread false values easily making truth discovery hard since many sources would vote wrong values usually systems decrease weight votes associated copied values even ’ count currently available truth discovery methods designed work well single-truth case reported characteristics relevant typologies single-truth methods different systems model source trustworthiness majority voting simplest method popular value selected true one majority voting commonly used baseline assessing performances complex methods methods estimate source trustworthiness exploiting similar technique one used measure authority web pages based web links vote assigned value computed sum trustworthiness sources provide particular value trustworthiness source computed sum votes assigned values source provides methods estimate source trustworthiness using similarity measures typically used information retrieval source trustworthiness computed cosine similarity similarity measures set values provided source set values considered true either selected probabilistic way obtained ground truth methods use bayesian inference define probability value true conditioned values provided sources formula_1 formula_2 value provided data item formula_3 formula_4 set observed values provided sources specific data item trustworthiness source computed based accuracy values provides complex methods exploit bayesian inference detect copying behaviors use insights better assess source trustworthiness due complexity less attention devoted study multi-truth discovery reported two typologies multi-truth methods characteristics methods use bayesian inference define probability group values true conditioned values provided data sources case since could multiple true values data item sources provide multiple values single data item possible consider values individually alternative consider mappings relations set provided values sources providing trustworthiness source computed based accuracy values provides sophisticated methods also consider domain coverage copying behaviors better estimate source trustworthiness methods use probabilistic graphical models automatically define set true values given data item also assess source quality without need supervision many real-world applications benefit use truth discovery algorithms typical domains application include healthcare crowd/social sensing crowdsourcing aggregation information extraction knowledge base construction truth discovery algorithms could also used revolutionize way web pages ranked search engines going form current methods based link analysis like pagerank procedures rank web pages based accuracy information provide
|
Databases
|
granular linux granular granular linux linux distribution targeted common desktop users granular based pclinuxos comes installable live cd cd version granular features two desktop environments kde development version enlightenment kde full-featured desktop environment enlightenment lightweight desktop shell markedly faster kde granular roots india granular linux project kicked october 2006 first demonstration given college students first release made available download 30 december 2006 main idea behind birth project redefine application set included pclinuxos extent introduce idea one major desktop environment single livecd latter idea implemented beginning second version release granular version 0.25 two desktop environments kde xfce included kde highly customizable feature-rich resource heavy xfce light-weight yet feature-full desktop environment v0.25 came v0.90 finally v1.0 granular 1.0 code name esto vox last esto series first 0.90 esto vello october 2007 special dvd edition granular 0.90 released name funworks featured lg3d desktop environment along three others host many software games granular utilizes pclinuxos repository well software/package management granular repository opened march 2008 since source granular-specific rpm packages available pclinuxos repository granular comes livecd means n't install try standard cd version granular includes two desktop environments kde enlightenment 17 like pclinuxos granular uses synaptic package manager gui frontend apt package management installing updating removing packages granular comes perl-based script mklivecd makes possible remaster granular create backup cd/dvd installed system also included granular startpoint html-based acts primer various major software included granular beginning news website launched 5 december domain http //www.granular-linux.com/main/ later main website shifted another server new domain name present website address http //www.granularlinux.com/ later main website migrated http //linux.granularproject.org/
|
Operating systems
|
supervisory program supervisory program supervisor computer program usually part operating system controls execution routines regulates work scheduling input/output operations error actions similar functions regulates flow work data processing system also refer program allocates computer component space schedules computer events task queuing system interrupts control system returned supervisory program frequently enough ensure demands system met historically term essentially associated ibm line mainframe operating systems starting os/360 operating systems supervisor generally called kernel 1970s ibm abstracted supervisor state hardware resulting hypervisor enabled full virtualization i.e capacity run multiple operating systems machine totally independently hence first system called virtual machine vm
|
Operating systems
|
emergency stand alone emergency stand alone esa term used vendors telephone equipment nortel dms-100 lucent 5ess gtd-5 typically small towns communities telephone services provided remote switching unit controlled powerful host switching complex esa occurs host/remote links severed thus leaving region “ community isolation ” esa mode town/community limited receiving placing calls within community/town larger towns/regions may several remote switching units required “ backdoor trunking ” connect remote units esa within town/community special translations implemented allow 911 redirected local number local police station fire hall resides within community/town
|
Internet protocols
|
port triggering port triggering configuration option nat-enabled router controls communication internal external host machines ip network similar port forwarding enables incoming traffic forwarded specific internal host machine although forwarded port open permanently target internal host machine chosen dynamically two networks communicate nat-router host machines internal network behave ip address nat-router perspective host machines external network without traffic forwarding rules impossible host machine external network host b open connection host machine internal network host connection targeted ip nat-router since internal network hidden behind nat port triggering host opens connection host b using predefined port ports incoming traffic router receives predefined port ports forwarded host 'triggering event forwarding rule forwarding rule disabled period inactivity port triggering useful network applications client server roles must switched certain tasks authentication irc chat file downloading ftp file sharing example port triggering operates connecting irc internet relay chat common authenticate username ident protocol via port 113 connecting irc client computer typically makes outgoing connection port 6667 port range 6660–7000 causing irc server attempt verify username given making new connection back client computer port 113 computer behind nat nat silently drops connection know computer behind nat send request connect two transport-level connections necessary application-level connection irc server succeed see internet protocol suite since second tcp/ip connection possible attempted connection irc server fail case port triggering router configured outbound connection established port 6660 7000 allow inbound connections particular computer port 113 gives flexibility static port forwarding necessary set specific address network allowing multiple clients connect irc servers nat-router security also gained sense inbound port left open actively use port triggering disadvantage binds triggered port single client time long port bound particular client port triggering effectively unavailable clients ftp file sharing example means two clients download files ftp server running active mode simultaneously irc even though authentication step happens quickly port triggering timeout may still prevent clients logging irc servers port triggering unsuitable servers behind nat router relies local computer make outgoing connection receive incoming ones routers possible one client use port triggering port forwarding simultaneously
|
Computer security
|
system integrity telecommunications term system integrity following meanings
|
Computer security
|
blackberry world blackberry world previously blackberry app world application distribution service application blackberry limited majority blackberry devices service provides blackberry users environment browse download update third-party applications service went live april 1 2009 three major app stores different operating systems largest revenue per app 9,166.67 compared 6,480.00 1,200.00 apple app store google play respectively 21 january 2013 blackberry announced rebranded blackberry app world simpler blackberry world part release blackberry 10 operating system blackberry devices since 2015 release blackberry priv longer use blackberry 10 operating system android instead uses google play store blackberry world set shut 2019 2003 rim launched mobile data service enable customers access java-based third-party enterprise applications using secure real-time push-based blackberry infrastructure later october 21 2008 rim announced blackberry developer conference company would open application store devices also announced store scheduled open march 2009 would work conjunction paypal services january 19 2009 rim began accepting submissions applications developers march 4 2009 rim officially named store blackberry app world previously called blackberry application storefront also confirmed service would initially available desktops web-based catalog would accessible non-blackberry devices april 1 2009 ctia trade show rim announced app world gone live blackberry sponsored wireless symposium announced average one million apps downloaded day august 19 2010 blackberry app world 2.0 released new version introduced blackberry id single sign account system used blackberry client blackberry app world desktop storefront addition blackberry id blackberry app world 2.0 also introduced direct credit card billing carrier billing wireless subscribers december 3 2010 research motion announced daily downloads two million apps per day february 2 2011 blackberry app world 2.1 released version introduced in-app purchases digital goods allowing add-ons purchased within applications january 21 2013 blackberry rebranded blackberry app world blackberry world june 18 2014 blackberry announced official relationship amazon includes access amazon appstore blackberry 10.3 december 5 2017 blackberry announced closure blackberry world december 31 2019 april 1 2018 blackberry removed paid apps blackberry world beginning 2011 16,000 apps available blackberry app world year later app store passed 60,000 apps january 2012 month later 70,000 apps february 2012 blackberry jam september 2012 rim announced app world 105,000 apps may 2013 blackberry live conference blackberry announced 120,000 apps blackberry 10 available download blackberry world application verification done blackberry world apps content quality agreed launch 85 percent verification done denpasar bali rim announced store would initially available united states united kingdom canada march 2013 blackberry world available 170 markets supports 23 currencies 33 languages 6 million applications downloaded daily aggregate 4 billion downloads to-date accepts payment markets using combination paypal credit card carrier billing list countries blackberry world available applications free paid 0.99 599.99 usd u.s registration app submission fees charged developers currently 0 service available english french italian german spanish brazilian portuguese store available following blackberry devices updated blackberry os version 4.5.0 higher users initially allowed archive apps microsd emmc storage certain blackberry smartphone models archive function later removed release app world 3.0 2010 rim announced several new tools make easier applications developers build simulate deploy monetize feature-rich applications blackberry platform including blackberry enterprise application development platform next generation blackberry web application platform blackberry webworks platform blackberry playbook™ tablet blackberry smartphones blackberry payment service blackberry push service blackberry advertising service location service maps services analytics service scoreloop bbm social platform software developer kits et al blackberry embraced open standards included variety open source libraries box including lua openal cocos2d-x box2d open source repository accessed github.com/blackberry open ecosystem helps developers target multiple platforms partnerships appcelerator apache cordova dojo jquery mobile marmalade nme qt sencha touch blackberry changed whole direction development tools mainly embracing c++/cascades native road develop mobile apps blackberry 10 platform html5 considered almost-native second path development april 2014 blackberry announced stop support adobe air release blackberry 10.3.1 released later 2014 time release blackberry 10.3.1 possible upload new adobe air-based apps blackberry world
|
Operating systems
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.