text
stringlengths
6
1.88M
source
stringclasses
13 values
referer spoofing http networking typically world wide web referer spoofing based canonised misspelling referrer sends incorrect referer information http request order prevent website obtaining accurate data identity web page previously visited user referer spoofing typically done data privacy reasons testing order request information without genuine authority web servers may supply response requests specific http referers improve privacy individual browser users may replace accurate referer data inaccurate data though many simply suppress browser sending referer data sending referrer information technically spoofing though sometimes also described software systems networks testing sometimes penetration testing referer spoofing often part larger procedure transmitting accurate inaccurate well expected unexpected input httpd system tested observing results many web sites configured gather referer information serve different content depending referer information obtained exclusively relying http referer information authentication authorization purposes genuine computer security measure http referer information freely alterable interceptable password though poorly configured systems treat websites especially many image hosting sites use referer information secure materials browsers arriving web pages served images additionally site may want users click pages advertisements directly able access downloadable file — using referring page referring site information help site redirect unauthorized users landing page site would like use attackers acquire knowledge approved referers often trivial many sites follow common template use information combined exploit gain access materials spoofing often allows access site content site web server configured block browsers send referer headers website owners may disallow hotlinking also used defeat referer checking controls used mitigate cross-site request forgery attacks several software tools exist facilitate referer spoofing web browsers extensions popular browsers mozilla firefox internet explorer may provide facilities customise manage referrer urls website user visits tools include proxy servers individual configures browser send http requests proxy forwards different headers intended website usually removing modifying referer header proxies may also present privacy issues users may log user activity
Computer security
openmodelica openmodelica free open source environment based modelica modeling language modeling simulating optimizing analyzing complex dynamic systems software actively developed open source modelica consortium non-profit non-governmental organization open source modelica consortium run project rise sics east ab collaboration linköping university openmodelica used academic industrial environments industrial applications include use openmodelica along proprietary software fields power plant optimization automotive water treatment openmodelica compiler omc modelica compiler translating modelica c code symbol table containing definitions classes functions variables definitions predefined user-defined obtained libraries compiler also includes modelica interpreter interactive usage constant expression evaluation subsystem also includes facilities building simulation executables linked selected numerical ode dae solvers omc written metamodelica unified equation-based semantical mathematical modeling language bootstrapped openmodelica connection editor open source graphical user interface creating editing simulating modelica models textual graphical modes omedit communicates omc interactive api requests model information creates models/connection diagrams based modelica annotations implementation based c++ qt library openmodelica shell omshell interactive command line interface parses interprets commands modelica expressions evaluation simulation plotting etc session handler also contains simple history facilities completion file names certain identifiers commands openmodelica notebook omnotebook light-weight mathematica-style editor modelica implements interactive wysiwyg realization literate programming form programming programs integrated documentation document omnotebook primarily used teaching allows mix hierarchically structured text cells containing modelica models expressions evaluated simulated plotted results displayed directly omnotebook ompython python interface enabling users access modeling simulation capabilities openmodelica python uses corba omniorb zeromq communicate openmodelica scripting api mdt eclipse plugin integrates openmodelica compiler eclipse provides editor advanced text based model editing code assistance mdt interacts openmodelica compiler existing corba based api used primarily development openmodelica compiler
Programming language topics
automath automath automating mathematics formal language devised nicolaas govert de bruijn starting 1967 expressing complete mathematical theories way included automated proof checker verify correctness automath system included many novel notions later adopted and/or reinvented areas typed lambda calculus explicit substitution dependent types one outstanding example automath also first practical system exploited curry–howard correspondence propositions represented sets called categories proofs question provability became question non-emptiness type inhabitation de bruijn unaware howard work stated correspondence independently l. s. van benthem jutting part ph.d. thesis 1976 translated edmund landau foundations analysis automath checked correctness automath never widely publicized time however never achieved widespread use nonetheless proved influential later development logical frameworks proof assistants mizar system system writing checking formalized mathematics still active use influenced automath
Programming language topics
bit-flipping attack bit-flipping attack attack cryptographic cipher attacker change ciphertext way result predictable change plaintext although attacker able learn plaintext note type attack not—directly—against cipher cryptanalysis would particular message series messages extreme could become denial service attack messages particular channel using cipher attack especially dangerous attacker knows format message situation attacker turn similar message one important information altered example change destination address might alter message route way force re-encryption weaker cipher thus possibly making easier attacker decipher message applied digital signatures attacker might able change promissory note stating owe 10.00 one stating owe 10000 stream ciphers rc4 vulnerable bit-flipping attack block cipher modes operation see stream cipher attack keyed message authentication code digital signature authentication mechanism allows recipient detect bits flipped transit
Computer security
bonjour software bonjour apple implementation zero-configuration networking zeroconf group technologies includes service discovery address assignment hostname resolution bonjour locates devices printers computers services devices offer local network using multicast domain name system mdns service records software comes built-in apple macos ios operating systems bonjour also installed onto computers running microsoft windows bonjour components may also included within software itunes safari introduction 2002 mac os x 10.2 rendezvous software renamed 2005 bonjour following out-of-court trademark dispute settlement bonjour provides general method discover services local area network software widely used throughout macos allows users set network without configuration used find printers file-sharing servers examples applications using bonjour software bonjour browser istumbler macos zeroconf neighborhood explorer windows used view services declared applications apple remote application iphone ipod touch also uses bonjour establish connection itunes libraries via wi-fi bonjour works within single broadcast domain usually small area without special dns configuration macos bonjour windows airport base stations may configured use wide area bonjour allows wide area service discovery via appropriately configured dns server applications generally implement bonjour services using standard tcp/ip calls rather operating system although macos provides various bonjour services bonjour also works operating systems apple made source code bonjour multicast dns responder core component service discovery available darwin open source project project provides source code build responder daemon wide range platforms including mac os 9 macos linux *bsd solaris vxworks windows apple also provides user-installable set services called bonjour windows java libraries number windows programs use zeroconf including adtec digital adobe systems creative suite 3 itunes cerulean studios trillian pro 3 ruckus music player ruckus network text editor e. bonjour released terms-of-limited-use license apple freeware clients though developers software companies wish redistribute part software package use bonjour logo may need licensing agreement source code mdnsresponder available apache license apple originally introduced bonjour software august 2002 part mac os x 10.2 name rendezvous august 27 2003 tibco software inc announced filed lawsuit trademark infringement tibco enterprise application integration product called tibco rendezvous market since 1994 stated tried come agreement apple computer july 2004 apple computer tibco reached out-of-court settlement specifics settlement released public april 12 2005 apple announced renaming rendezvous bonjour current name bonjour french morning afternoon greeting good day previous name rendezvous french meeting appointment date bonjour version 2.0 released february 24 2010 works microsoft windows 2000 2003 xp vista 7 8 10 systems use primarily facilitate installation configuration use network printers thus runs startup bonjour fully implemented windows features—such ichat—allow communication windows mac os bonjour windows also adds zeroconf capabilities internet explorer provides zeroconf implementation java vms third-party applications adobe photoshop cs3 suite also come bundled bonjour take advantage zeroconf technology installers windows systems normally place bonjour files folder called bonjour within program files folder modifies windows system-registry entries related internal network configuration operation bonjour runs mdnsresponder.exe communications across network take place udp port 5353 may require reconfiguring personal corporate firewalls block bonjour packets full installation bonjour windows include plug-in internet explorer printer wizard network communication services components included installed part third-party application component apple software itunes vpn clients configured local network services unavailable computer vpn software active connected case local zeroconf services available bonjour zeroconf implementation september 2008 two security vulnerabilities found bonjour windows certain installations bonjour windows lack uninstaller display human-readable entry windows services listing 32- 64-bit releases windows 7 older still available versions bonjour services disable network connectivity adding entry 0.0.0.0 default gateway bug reported 2013 open-source im clients pidgin kopete adium support bonjour im protocol non-gpl trillian client number browsers allow end-user graphically explore devices found using bonjour bonjour browser creative commons licensed macos application displays services declared using bonjour program originally called rendezvous browser changed name version 1.5.4 apple changed protocol name bonjour certain protocols double clicking list item launch associated helper 1.5.6 first universal binary version future versions allow users completely define service instead relying author bonjour browser recommended service discovery macaddict 123 student research project columbia university produced java-based system match functionality bonjour browser called jbonjourbrowser jbonjourbrowser open-source available gpl jbonjourbrowser built emulate functionality bonjour browser time work multiple platforms requires apple bonjour java library run native windows application offers similar functions bonjour browser mac os bonjour browser windows offered free hobbyist software handydev software commercial implementation called mdnsbrowser offered netputing systems inc
Operating systems
windows spotlight windows spotlight feature included default windows 10 downloads pictures advertisements automatically bing displays lock screen shown computer running windows 10 users occasionally given opportunity mark whether wish see fewer images similar type sometimes images overlaid links advertisements 2017 microsoft began adding location information many photographs images photo credits available display information picture taken many well-known locations famous historical natural landmarks therefore identified identified images include alphabetical continent
Operating systems
gnome archive manager archive manager previously file roller archive manager gnome desktop environment archive manager backend programs needed use archive manager frontend archive manager supports following file formats archive manager ability use various formats 7z rar etc appropriate plugins n't give option compress using different levels compression via gui high normal/fast etc unlike many utilities set however using gconf-editor
Computer file systems
dns flood dns flood type denial-of-service attack process whereby traffic network resource machine stopped time offender sends great number requests resource machine might become unavailable might try reach dns flood host connects internet disrupted due overload traffic referred disruption causes work resource machine halt allowing traffic land attack mainly done hackers benefit attacked resource machine ddos attacks perpetrated many reasons including blackmailing website owners knocking websites including high-profile sites large bank websites many methods adopted prevent types attacks include dropping malformed packages use filters avoid receiving packages sources potential attack timing half open connections greater hostility one also set syn icmp udp lower levels prevent ddos attacks harming one network
Computer security
telesoft technologies telesoft technologies privately held uk based technology company develops cyber security telecoms mobile products services government infrastructure telesoft operations usa uk india cyber security products include high rate network flow monitoring appliances operate multi 100gbps networks collection analysis software high rate event driven traffic recorders anomaly ddos crypto-jacking breech detection low latency historical analysis profiling incident response business intelligence
Computer security
rustock botnet rustock botnet botnet operated around 2006 march 2011 consisted computers running microsoft windows capable sending 25,000 spam messages per hour infected pc height activities sent average 192 spam messages per compromised machine per minute reported estimates size vary greatly across different sources claims botnet may comprised anywhere 150,000 2,400,000 machines size botnet increased maintained mostly self-propagation botnet sent many malicious e-mails intended infect machines opening trojan would incorporate machine botnet botnet took hit 2008 takedown mccolo isp responsible hosting botnet command control servers mccolo regained internet connectivity several hours hours 15 mbit second traffic observed likely indicating transfer command control russia actions temporarily reduced global spam levels around 75 effect last long spam levels increased 60 january june 2009 40 attributed rustock botnet march 16 2011 botnet taken initially reported coordinated effort internet service providers software vendors revealed next day take-down called operation b107 action microsoft u.s. federal law enforcement agents fireeye university washington capture individuals involved rustock botnet july 18 2011 microsoft offering monetary reward amount us 250,000 new information results identification arrest criminal conviction individual botnets composed infected computers used unwitting internet users order hide presence user anti-virus software rustock botnet employed rootkit technology computer infected would seek contact command-and-control servers number ip addresses 2,500 domains backup domains may direct zombies botnet perform various tasks sending spam executing distributed denial service ddos attacks ninety-six servers operation time takedown sending spam botnet uses tls encryption around 35 percent cases extra layer protection hide presence whether detected creates additional overhead mail servers handling spam experts pointed extra load could negatively impact mail infrastructure internet e-mails sent days spam
Computer security
bright computing bright computing inc. developer software deploying managing high-performance hpc clusters kubernetes clusters openstack private clouds on-prem data centers well public cloud bright computing founded matthijs van leeuwen 2009 spun company clustervision co-founded alex ninaber arijan sauer alex matthijs worked together uk ’ compusys one first companies commercially build hpc clusters left compusys 2002 start clustervision netherlands determining growing market building managing supercomputer clusters using off-the-shelf hardware components open source software tied together customized scripts clustervision also provided delivery installation support services hpc clusters universities government entities 2004 martijn de vries joined clustervision began development cluster management software software made available customers 2008 name clustervisionos v4 2009 bright computing spun clustervision clustervisionos renamed bright cluster manager van leeuwen named bright computing ’ ceo 2010 ing corporate investments made 2.5 million investment bright computing 2014 draper fisher jurvetson dfj us dfj esprit uk prime ventures nl ing corporate investments invested 14.5 million bright computing time bright computing clustervision completely separated february 2016 bright appointed bill wagner chief executive officer matthijs van leeuwen became chief strategy officer left company board directors 2018 wagner presided multiple layoffs august 2019 controversial alliance huawei announced sc 18 early customers included boeing sandia national laboratories virginia tech hewlett packard nsa drexel university many early customers introduced resellers including sicorp cray dell advanced hpc 2019 company 700 customers including 50 fortune 500 companies.this citation 2016 cites much lower number removed bright cluster manager hpc lets customers deploy manage complete clusters provides management hardware operating system hpc software users 2014 company announced bright openstack software deploy provision manage openstack-based private cloud infrastructures 2016 bright started bundling several machine learning frameworks associated tools libraries product make easy get machine learning workload running bright cluster december 2018 version 8.2 released introduced support arm64 architecture edge capabilities build clusters spread many different geographical locations improved workload accounting reporting features well many improvements bright integration kubernetes bright cluster manager software frequently sold original equipment manufacturer oem resellers including dell cray technology partners include bright computing covered software magazine yahoo finance among publications 2016 bright computing awarded €1.5m horizon 2020 sme instrument grant european commission bright computing one 33 grant recipients 960 submitted proposals category 5 260 grants awarded
Distributed computing architecture
comparison antivirus software non-exhaustive list notable antivirus internet security software form comparison tables according platform e.g desktop mobile server etc operating systems e.g windows os x linux solaris android ios ubuntu touch windows phone etc. term on-demand scan refers possibility performing manual scan user entire computer/device on-access scan refers ability product automatically scan every file creation subsequent modification term cloudav refers ability product automatically perform scans cloud term email security refers protection emails viruses malware antispam refers protection spam scam phishing attacks term web protection usually includes protection infected malicious urls phishing websites online identity protection privacy online banking protection many antivirus products use third-party antivirus engine means antivirus engine made another producer however malware signature and/or parts product may may done owner product list excludes windows phone 7 windows phone 8 support running protection programs
Computer security
arithmetic logic unit arithmetic logic unit alu combinational digital electronic circuit performs arithmetic bitwise operations integer binary numbers contrast floating-point unit fpu operates floating point numbers alu fundamental building block many types computing circuits including central processing unit cpu computers fpus graphics processing units gpus single cpu fpu gpu may contain multiple alus inputs alu data operated called operands code indicating operation performed alu output result performed operation many designs alu also status inputs outputs convey information previous operation current operation respectively alu external status registers alu variety input output nets electrical conductors used convey digital signals alu external circuitry alu operating external circuits apply signals alu inputs response alu produces conveys signals external circuitry via outputs basic alu three parallel data buses consisting two input operands b result output data bus group signals conveys one binary integer number typically b bus widths number signals comprising bus identical match native word size external circuitry e.g. encapsulating cpu processor opcode input parallel bus conveys alu operation selection code enumerated value specifies desired arithmetic logic operation performed alu opcode size bus width determines maximum number different operations alu perform example four-bit opcode specify sixteen different alu operations generally alu opcode machine language opcode though cases may directly encoded bit field within machine language opcode status outputs various individual signals convey supplemental information result current alu operation general-purpose alus commonly status signals end alu operation status output signals usually stored external registers make available future alu operations e.g. implement multiple-precision arithmetic controlling conditional branching collection bit registers store status outputs often treated single multi-bit register referred status register condition code register status inputs allow additional information made available alu performing operation typically single carry-in bit stored carry-out previous alu operation alu combinational logic circuit meaning outputs change asynchronously response input changes normal operation stable signals applied alu inputs enough time known propagation delay passed signals propagate alu circuitry result alu operation appears alu outputs external circuitry connected alu responsible ensuring stability alu input signals throughout operation allowing sufficient time signals propagate alu sampling alu result general external circuitry controls alu applying signals inputs typically external circuitry employs sequential logic control alu operation paced clock signal sufficiently low frequency ensure enough time alu outputs settle worst-case conditions example cpu begins alu addition operation routing operands sources usually registers alu operand inputs control unit simultaneously applies value alu opcode input configuring perform addition time cpu also routes alu result output destination register receive sum alu input signals held stable next clock allowed propagate alu destination register cpu waits next clock next clock arrives destination register stores alu result since alu operation completed alu inputs may set next alu operation number basic arithmetic bitwise logic functions commonly supported alus basic general purpose alus typically include operations repertoires alu shift operations cause operand b shift left right depending opcode shifted operand appears simple alus typically shift operand one bit position whereas complex alus employ barrel shifters allow shift operand arbitrary number bits one operation single-bit shift operations bit shifted operand appears carry-out value bit shifted operand depends type shift integer arithmetic computations multiple-precision arithmetic algorithm operates integers larger alu word size algorithm treats operand ordered collection alu-size fragments arranged most-significant ms least-significant ls vice versa example case 8-bit alu 24-bit integer codice_1 would treated collection three 8-bit fragments codice_2 ms codice_3 codice_4 ls since size fragment exactly matches alu word size alu directly operate piece operand algorithm uses alu directly operate particular operand fragments thus generate corresponding fragment partial multi-precision result partial generated written associated region storage designated multiple-precision result process repeated operand fragments generate complete collection partials result multiple-precision operation arithmetic operations e.g. addition subtraction algorithm starts invoking alu operation operands ls fragments thereby producing ls partial carry bit algorithm writes partial designated storage whereas processor state machine typically stores carry bit alu status register algorithm advances next fragment operand collection invokes alu operation fragments along stored carry bit previous alu operation thus producing another significant partial carry bit carry bit stored status register partial written designated storage process repeats operand fragments processed resulting complete collection partials storage comprise multi-precision arithmetic result multiple-precision shift operations order operand fragment processing depends shift direction left-shift operations fragments processed ls first ls bit partial—which conveyed via stored carry bit—must obtained ms bit previously left-shifted less-significant operand conversely operands processed ms first right-shift operations ms bit partial must obtained ls bit previously right-shifted more-significant operand bitwise logical operations e.g. logical logical operand fragments may processed arbitrary order partial depends corresponding operand fragments stored carry bit previous alu operation ignored although alu designed perform complex functions resulting higher circuit complexity cost power consumption larger size makes impractical many cases consequently alus often limited simple functions executed high speeds i.e. short propagation delays external processor circuitry responsible performing complex functions orchestrating sequence simpler alu operations example computing square root number might implemented various ways depending alu complexity implementations transition fastest expensive slowest least costly square root calculated cases processors simple alus take longer perform calculation multiple alu operations must performed alu usually implemented either stand-alone integrated circuit ic 74181 part complex ic latter case alu typically instantiated synthesizing description written vhdl verilog hardware description language example following vhdl code describes simple 8-bit alu mathematician john von neumann proposed alu concept 1945 report foundations new computer called edvac cost size power consumption electronic circuitry relatively high throughout infancy information age consequently serial computers many early computers pdp-8 simple alu operated one data bit time although often presented wider word size programmers one earliest computers multiple discrete single-bit alu circuits 1948 whirlwind employed sixteen math units enable operate 16-bit words 1967 fairchild introduced first alu implemented integrated circuit fairchild 3800 consisting eight-bit alu accumulator integrated-circuit alus soon emerged including four-bit alus am2901 74181 devices typically bit slice capable meaning carry look ahead signals facilitated use multiple interconnected alu chips create alu wider word size devices quickly became popular widely used bit-slice minicomputers microprocessors began appear early 1970s even though transistors become smaller often insufficient die space full-word-width alu result early microprocessors employed narrow alu required multiple cycles per machine language instruction examples includes popular zilog z80 performed eight-bit additions four-bit alu time transistor geometries shrank following moore law became feasible build wider alus microprocessors modern integrated circuit ic transistors orders magnitude smaller early microprocessors making possible fit highly complex alus ics today many modern alus wide word widths architectural enhancements barrel shifters binary multipliers allow perform single clock cycle operations would required multiple operations earlier alus
Computer architecture
kuka robot language kuka robot language also known krl proprietary programming language similar pascal used control kuka robots krl code consists two different files name permanent data file extension .dat movement command file extension .src krl four basic data types user also create custom data types using enumeration enumeration basic data types used create arrays structures motion commands support several types structures data formats etc robot joints a1-a6 external axis joints e1-e6 frame value sufficient specify tcp location orientation also determine unique robot arm pose additional info required status turn collection flags stored integer
Programming language topics
internet storm center internet storm center isc program sans technology institute branch sans institute monitors level malicious activity internet particularly regard large-scale infrastructure events isc evolved incidents.org site initially founded sans institute assist public-private sector cooperation y2k cutover 2000 incidents.org started cooperate dshield create consensus incidents database cid collected security information cooperating sites agencies mass analysis march 22 2001 sans cid responsible early detection lion worm attacks various facilities quick warning counter-efforts organized cid instrumental controlling damage done worm otherwise might considerably worse later dshield integrated closer incidents.org sans institute started sponsor dshield cid renamed internet storm center acknowledgement way uses distributed sensor network similar way weather reporting center detect track atmospheric storm provide warnings since time isc expanded monitoring operations website cites figure twenty million intrusion detection log entries per day continues provide analyses alerts security threats internet community last hours 2005 first weeks 2006 internet storm center went longest period time yellow infocon wmf vulnerability prominent feature isc daily handler diary prepared one 40 volunteer incident handlers summarized events day frequently first public source new attack trends actively facilitates cooperation soliciting information understand particular attacks better internet storm center currently staffed approximately 40 volunteers representing 8 countries many industries
Computer security
word embedding word embedding collective name set language modeling feature learning techniques natural language processing nlp words phrases vocabulary mapped vectors real numbers conceptually involves mathematical embedding space many dimensions per word continuous vector space much lower dimension methods generate mapping include neural networks dimensionality reduction word co-occurrence matrix probabilistic models explainable knowledge base method explicit representation terms context words appear word phrase embeddings used underlying input representation shown boost performance nlp tasks syntactic parsing sentiment analysis linguistics word embeddings discussed research area distributional semantics aims quantify categorize semantic similarities linguistic items based distributional properties large samples language data underlying idea word characterized company keeps popularized firth technique representing words vectors roots 1960s development vector space model information retrieval reducing number dimensions using singular value decomposition led introduction latent semantic analysis late 1980s 2000 bengio et al provided series papers neural probabilistic language models reduce high dimensionality words representations contexts learning distributed representation words bengio et al 2003 word embeddings come two different styles one words expressed vectors co-occurring words another words expressed vectors linguistic contexts words occur different styles studied lavelli et al 2004 roweis saul published science use locally linear embedding lle discover representations high dimensional data structures area developed gradually really took 2010 partly important advances made since quality vectors training speed model many branches many research groups working word embeddings 2013 team google led tomas mikolov created word2vec word embedding toolkit train vector space models faster previous approaches new word embedding techniques rely neural network architecture instead traditional n-gram models unsupervised learning one main limitations word embeddings word vector space models general possible meanings word conflated single representation single vector semantic space sense embeddings proposed solution problem individual meanings words represented distinct vectors space word embeddings n- grams biological sequences e.g dna rna proteins bioinformatics applications proposed asgari mofrad named bio-vectors biovec refer biological sequences general protein-vectors protvec proteins amino-acid sequences gene-vectors genevec gene sequences representation widely used applications deep learning proteomics genomics results presented asgari mofrad suggest biovectors characterize biological sequences terms biochemical biophysical interpretations underlying patterns thought vectors extension word embeddings entire sentences even documents researchers hope improve quality machine translation software training using word embeddings includes tomas mikolov word2vec stanford university glove allennlp elmo fasttext gensim indra deeplearning4j principal component analysis pca t-distributed stochastic neighbour embedding t-sne used reduce dimensionality word vector spaces visualize word embeddings clusters instance fasttext also used calculate word embeddings text corpora sketch engine available online
Computational linguistics
bulsemcor bulgarian sense-annotated corpus bulsemcor bulgarian български семантично анотиран корпус булсемкор structured corpus bulgarian texts lexical item assigned sense tag bulsemcor created department computational linguistics institute bulgarian language bulgarian academy sciences bulsemcor created part nationally funded project titled bulnet – lexico-semantic network bulgarian language 2005–2010 follows general methodology semcor combined specific principles corpus annotation consists 101,791 tokens covering excerpt bulgarian brown corpus modelled brown corpus important feature bulsemcor samples selected using heuristics provide optimal coverage ambiguous lexis bulsemcor manually sense-annotated according bulgarian wordnet size comparable contemporary semantically annotated corpora pool acceptable linguistic components semantic annotation consists associating lexical item corpus exactly one synonym set synset bulgarian wordnet best describes sense particular context selection best match among suggested candidates based set procedures synset members synset gloss explanatory definition position given candidate wordnet structure number annotated tokens 99,480 difference number tokens compared initial corpus due fact linguistic items simple word count 86,842 multiword expressions mwe 5,797 12,638 tokens words bulsemcor assigned sense according established practice simple content words content word classes typically nouns verbs annotated since 2000 development language resources broadened include annotation function words multiword expressions covering particular senses types words expressions respect bulsemcor annotation exhaustive hence provides greater opportunities linguistic observations non-linear programming nlp applications annotated items inherit linguistic information associated corresponding synset along morphological semanic tags may include annotation one following additional levels
Computational linguistics
symbiose web desktop symbiose web desktop web integrated development environment symbiose replicates desktop environment modern operating system webpage using javascript communicate remote server allows users save current desktop state return later much like hibernation feature many true operating systems integrate dropbox google drive ftp files web desktop software beta stage
Distributed computing architecture
trustwave holdings trustwave holdings information security company helps businesses fight cybercrime protect data reduce security risk company international headquarters located downtown chicago regional offices located london são paulo sydney company also operates security operations centers chicago denver manila minneapolis singapore sydney tokyo warsaw waterloo ontario trustwave currently company authorized pci forensic investigator geographic regions trustwave standalone business unit cyber security brand singaporean telecommunications company singtel group enterprise april 2011 trustwave holdings filed ipo though company standalone subsidiary singtel trustwave website says company 1,600 employees april 8 2015 sgt singapore telecommunications ltd singtel announced entered definitive agreement acquire trustwave holdings inc. fee 810 million—singtel 98 stake company leaving 2 trustwave ceo president according media reports singtel filings singapore exchange enterprise value trustwave time deal 850 million managed security services service involves remotely managing third-party products network access control siem united threat management companies wish outsource security needs according forrester wave managed security services north america q4 2014 trustwave market leader managed security services trustkeeper cloud-based platform ties together trustwave various managed security services trustkeeper businesses access variety trustwave apps ranging enterprise-class managed security services pci compliance automation tools designed help credit card merchants protect unauthorized access managed security testing application within trustkeeper provides interactive way view track penetration test reports alternative conventional pdf based reports earlier versions called trustwave pentest manager 2012 sc magazine europe innovation award secure web gateway formerly finjan appliance-based secure web gateway uses real-time code analysis technology url filtering antivirus scanning prevent malware web-based threats may 2011 m86 secure web gateway designated visionary 2011 gartner magic quadrant report secure web gateways secure email gateway formerly m86 mailmarshal email security solution available software cloud-based service protects malware spam data leakage also provides reporting analyzes inbound outbound content assists policy control april 2010 m86 mailmarshal smtp product designated visionary 2010 gartner magic quadrant report secure email gateways associated technologies spiderlabs advanced security services research team trustwave developed security researcher nicholas j. percoco team specializes forensic investigations penetration testing education services security research used update trustwave products services threat intelligence spiderlabs also authors trustwave global security report annual report detailing latest security trends risk areas spiderlabs also actively develops open source web application firewall modsecurity supplementary commercial rule set available purchase trustwave securebrowsing free security plug-in web browsers checks links real time using secure web gateway link web page given rating green indicating link safe red link safe february 2014 trustwave svp phillip j. smith offered expert testimony related data breaches malware part congressional hearing house committee energy commerce prepared testimony presented observations based company experience investigating thousands data breaches ongoing malware security research forms threat intelligence trustwave operates x.509 certificate authority ca used top level trust many web browsers operating systems applications trusted root ca 2011 trustwave sold certificate subordinate ca allowed customer present ssl certificates identifying arbitrary entities similar mechanism man middle attack type action similar practice running ssl proxy corporate network though case public subordinate ca valid anywhere used instead internal corporate-generated domain ca valid machines accept part organizational policy making risk abuse much higher though trustwave asserts special precautions put place ensure customer attached device particular customer-owned network acceptable customer impersonate entities intercept traffic independently verified trustwave unable disclose customer due non-disclosure agreement result brief discussion whether egregious enough action trustwave root ca removed mozilla firefox browser however action taken march 2014 trustwave named lawsuit filed trustmark national bank green bank n.a lawsuit alleges trustwave failed provide promised level security target failing meet industry security standards april 2014 notice dismissal filed plaintiffs effectively withdrawing earlier allegations trustwave chairman ceo president robert j. mccullen also stated letter contrary misstated allegations plaintiffs complaints target outsource data security obligations trustwave trustwave monitor target network trustwave process cardholder data target. 2018 gartner named trustwave leader gartner mq managed security service providers worldwide first vendor move leader quadrant since inception global report 2016 idc named trustwave leader idc marketscape emerging managed security services providers based industry analysis buyer perception 2015 gartner magic quadrant managed security services worldwide report evaluated 14 different global managed security service providers trustwave named industry challenger “ due access gained greater resources new markets resulting acquisition singtel increasing investments competing enterprise customers. ” 2014 industry analyst firm forrester research named trustwave one leaders managed security services market
Computer security
excite excite stylized excite internet portal launched 1995 provides variety content including news weather metasearch engine web-based email instant messaging stock quotes customizable user homepage currently operated iac applications formerly mindspark iac excite networks u.s. main excite site long personal start page called excite excite also operates e-mail service although longer open new customers original excite company founded 1994 went public two years later excite one recognized brands internet decade main portal site excite.com sixth visited website 1997 fourth 2000 company merged broadband provider home network together went bankrupt 2001 excite portal services acquired iwon.com ask jeeves website went steep decline popularity afterwards january 2019 excite.com ranks 3616th u.s. according alexa rankings popular excite site local japanese one ranks 240th japan excite originally started architext june 1993 garage cupertino california graham spencer joe kraus mark vanharen ryan mcintyre ben lutch martin reinfried students stanford university goal create software manage vast information world wide web july 1994 international data group paid us 80,000 develop online service january 1995 vinod khosla former stanford student partner venture capital firm kleiner perkins caufield byers arranged us 250,000 first round backing project us 1.5 million provided ten-month period soon thereafter geoff yang institutional venture partners introduced additional us 1.5 million financing excite formally launched october 1995 january 1996 george bell joined excite chief executive officer ceo excite also purchased two search engines magellan webcrawler signed exclusive distribution agreements netscape microsoft apple addition companies jim bellows 72 hired excite 1994 figure present content journalistic manner paid good journalists write brief reviews web sites however users wanted get directly content skipped reviews partnership bellows ended 1998 excite original website design mostly based orange color 1997 redesigned black yellow theme mostly continues day april 4 1996 excite went public initial offering two million shares offering however overshadowed biggest rival yahoo also went public time excite six founders became millionaires offering november 1996 america online aol agreed make excite exclusive search directory service return larger 20 percent share excite sale webcrawler june 1997 intuit maker quicken turbotax purchased 19 stake excite finalized seven-year partnership deal october 16 1997 excite purchased netbot comparison shopping agent time intuit announced launch excite business investing later year deal finalized ticketmaster provide direct online ticketing march 31 1998 excite reported net loss approximately 30.2 million according first quarter report enough available capital meet obligations december content excite portal collated 100 different sources excite first portal start offering free e-mail step followed rivals yahoo lycos november 1997 press release showed 11.8 million unique visitors excite network 28-day period september october december 1998 yahoo negotiations purchase excite 5.5 billion 6 billion however prompted kleiner perkins home network chairman ceo thomas jermoluk met excite chairman ceo george bell december 19 excite subsequently acquired home network january 19 1999 time excite sixth largest internet portal traffic one point microsoft also interested excite plans merge msn.com portal according justin rohrlich writing minyanville.com later 1999 two graduate students stanford university sergey brin larry page decided google search engine developed taking time using study went bell offered 1 million bell rejected offer later threw vinod khosla one excite venture capitalists office negotiated brin page 750,000 excite refusal buy became 900 billion company 2019 labeled rohrlich stupid business decision 2014 podcast later cnbc then-ceo excite george bell said deal fell apart larry page wanted excite search technologies replaced google bell agree us 6.7 billion merger excite home network 1999 became one largest mergers two internet companies time home high-speed internet services existing portal combined excite search engine portal move towards personalized web portal content following merger new company named excite home stock symbol company name regulatory filing records remained home corporation athm six months merger tom jermoluk stepped ceo excite home excite george bell president excite division home merger became new ceo combined excite home whilst jermoluk remained chairman board merger billed new media network 21st century following merger excite division purchased imall well online greeting card company blue mountain arts excite also acquired photo sharing company webshots excite furthermore paid sponsorship infiniti indy car driver eddie cheever jr. 2000 2001 racing seasons however merger excite home fell disastrously short expectations online advertising revenue plummeted cable network isp revenue continued grow september 21 2000 stock value dropped 90 george bell announced plans step ceo within six months april 23 2001 excite home announced patti s. hart former ceo telocity would become third ceo three years announcement george bell resigned left company completely company also reported first-quarter net loss 61.6 million compared loss 4.6 million period prior year search engine magellan excite purchased 1996 closed may 2001 june 11 2001 excite home announced raised 100 million financing promethean capital management angelo gordon co. part deal loan repayable immediately excite home stock delisted nasdaq loan structured note convertible shares excite interest rate zero august 20 year excite home replaced auditors ernst young pricewaterhousecoopers triggered demand promethean capital management angelo gordon co immediate repayment 50 million debt furthermore cox cable comcast announced would separate excite home first quarter 2002 september 13 2001 excite home sold blue mountain arts american greetings less 5 paid less two years earlier october 1 2001 excite home filed chapter 11 bankruptcy protection u.s. bankruptcy court northern district california company remaining 1,350 employees laid following months part agreement home national high-speed fiber network access would sold back corporation home liquidating trust became successor company excite home charged sale assets former company end 2001 webshots assets purchased company founders 2.4 million cash bankruptcy court despite financial problems excite network sites continued draw many visitors u.s. albeit behind aol time warner microsoft/msn yahoo collapse excite home iwon.com irvington new york–based venture surreptitiously commenced design new excite website iwon.com planned acquire excite.com domain name brand course bankruptcy proceedings iwon.com eventually made joint bid seattle infospace purchase domain name brand november 28 2001 court accepted bid gave iwon less three weeks launch new excite portal bill daugherty iwon founder co-chief executive time told new york times feel like guy lived hurricane got pounded pounded managed survive everyone else destroyed suddenly walk outside storm beachfront property excite us december 16 2001 iwon launched new excite portal transferred millions excite users new home iwon changed corporate name excite network continued operate excite iwon third portal myway outside united states excite italia took control portals uk germany spain france italy netherlands poland switzerland austria infospace part owned operated web search function excite excite database depreciated instead using overture inktomi search results along dmoz open directory directory dogpile metasearch news results proved short-sighted arrangement searching became big business internet ensuing years excite continued operate excite network acquired ask jeeves ask.com march 2004 ask jeeves promised rejuvenate iwon excite able ask jeeves management became distracted according east bay business times first search feature arms race google yahoo merger barry diller iac/interactivecorp announced march 2005 hopefully start invest get staff place changes portal properties want hope see revenue grow back latter half year said ask jeeves ceo steve berkowitz conference call analysts april 27 2005 may 20 2005 ask jeeves made two announcements regarding rejuvenation excite brand first announced acquired excite italia b.v. operator excite europe tiscali s.p.a. secondly company reported reached comprehensive settlement infospace regarding excite united states whereby ask jeeves infospace would share marketing costs revenue excite web search function regarding acquisition ask jeeves ceo steve berkowitz said look forward working infospace enhance search experience excite interests aligned october 17 2007 goadv media company specializing generation internet traffic announced completion acquisition european excite group companies excite never managed recover back heyday popularity remains notable japan however excite japan headquartered tokyo founded august 4 1997 partnership itochu excite home collapse itochu became majority shareholder excite japan 90 percent bid compete internet service providers like netzero juno online offered free low-cost dial-up access united states excite started offering no-pay service private customers partnering 1stup.com create freelane excite 1stup would allow excite customers download software order able log-on internet software would rotate series sponsored banner advertisements user computer surfed internet 1stup.com soon went business excite switched another partner named worldshare rebranding freelane freelane version 2.0 march 1 2001 freelane discontinued ticketsmate partnership excite sells tickets customers united states portal essentially ticket selling website users buy tickets search thousands events venues powerful search engine capabilities excite server utilized website help user search tickets events since 1999 excite also education portal used people search apply different degrees online courses excite education portal features list thousands educational institutes across america prospective students browse apply
Web technology
heritrix heritrix web crawler designed web archiving written internet archive available free software license written java main interface accessible using web browser command-line tool optionally used initiate crawls heritrix developed jointly internet archive nordic national libraries specifications written early 2003 first official release january 2004 continually improved employees internet archive interested parties heritrix main crawler used crawl content internet archive web collection many years largest contributor collection 2011 alexa internet alexa crawls web purposes using crawler named ia_archiver alexa donates material internet archive internet archive crawling using heritrix smaller scale starting 2008 internet archive began performance improvements wide scale crawling collect content number organizations national libraries using heritrix among older versions heritrix default stored web resources crawls arc file file format wholly unrelated arc file format format used internet archive since 1996 store web archives recently saves default warc file format similar arc precisely specified flexible heritrix also configured store files directory format similar wget crawler uses url name directory filename resource arc file stores multiple archived resources single file order avoid managing large number small files file consists sequence url records header containing metadata resource requested followed http header response arc files range 100 600 mb example heritrix includes command-line tool called arcreader used extract contents arc file following command lists urls metadata stored given arc file cdx format following command extracts hello.html example assuming record starts offset 140 tools heritrix comes several command-line tools tools available part internet archive warctools project tools internet archive links related tools
Web technology
richard fateman richard j. fateman born november 4 1946 professor emeritus computer science university california berkeley received bs physics mathematics union college june 1966 ph.d. applied mathematics harvard university june 1971 major contributor macsyma computer algebra system mit later franz lisp system current interests include scientific programming environments computer algebra systems distributed computing analysis algorithms programming measurement large systems design implementation programming languages optical character recognition 1999 inducted fellow association computing machinery richard fateman father musician johanna fateman
Programming language topics
john mcafee john david mcafee born september 18 1945 british-american computer programmer businessman founded software company mcafee associates 1987 ran 1994 resigned company mcafee associates achieved early success creators mcafee first commercial antivirus software business produces range enterprise security software company purchased intel 2011 spun back 2017 tpg capital owning majority stake though software always borne mcafee brand name mcafee wealth peaked 2007 100 million investments plummeted global financial crisis began year since leaving mcafee associates founded companies tribal voice makers powwow chat program quorumex future tense central among others involved leadership positions companies everykey mgt capital investments luxcore among others personal business interests include smartphone apps cryptocurrency yoga all-natural antibiotics resided number years belize later returned united states 2013 mcafee also political activist sought 2016 libertarian party nomination president united states 2016 election losing former new mexico governor gary johnson mcafee born cinderford forest dean gloucestershire united kingdom september 18 1945 u.s. army base american father stationed english mother raised salem virginia mcafee said feels much british american mcafee 15 father abusive alcoholic committed suicide received bachelor degree mathematics 1967 roanoke college subsequently awarded honorary sc.d degree 2008 mcafee employed programmer nasa institute space studies new york city 1968 1970 went univac software designer later xerox operating system architect 1978 joined computer sciences corporation software consultant worked consulting firm booz allen hamilton 1980–1982 1980s employed lockheed mcafee received copy brain computer virus began developing software combat viruses 1987 mcafee founded mcafee associates computer anti-virus company 1989 quit lockheed began working full-time mcafee associates initially operated home santa clara california company incorporated delaware 1992 mcafee resigned company 1994 two years mcafee associates went public mcafee sold remaining stake company network associates formed 1997 merger mcafee associates network general network associates company name retained seven years renamed mcafee inc august 2010 intel bought mcafee maintaining separate branding january 2014 announced mcafee-related products marketed intel security mcafee expressed pleasure name change saying everlastingly grateful intel freeing terrible association worst software planet unit spun intel april 2017 mcafee llc joint venture tpg capital intel business ventures founded mcafee include tribal voice developed one first instant messaging programs powwow 2000 invested joined board directors zone labs makers firewall software prior acquisition check point software 2003 august 2009 new york times reported mcafee personal fortune declined 4 million peak 100 million effect global financial crisis recession investments 2009 mcafee interviewed belize cnbc special bubble decade reported invested and/or built many mansions usa went unsold 2007 global recession hit report also discussed quest produce plants possible medicinal uses land belize february 2010 mcafee started company quorumex headquartered belize aimed produce commercial natural antibiotics based anti-quorum sensing technology june 2013 mcafee uploaded parody video uninstall mcafee antivirus onto youtube channel video mcafee criticized mcafee antivirus software snorting white powder stroked undressed scantily clad women video garnered 9 million views mcafee told reuters made video ridicule media negative coverage spokesman mcafee inc. called video statements ludicrous also 2013 mcafee started company future tense central aimed produce secure computer network device called d-central 2016 also serving incubator february 2014 mcafee announced cognizant application smartphones displays information permissions installed applications april 2014 cognizant renamed dcentral 1 android version released free google play def con conference las vegas nevada august 2014 warned americans use smartphones suggesting apps used spy clueless consumers read privacy user agreements january 2016 became chief evangelist security startup everykey february 2016 mcafee received media attention publicly volunteering decrypt iphone used san bernardino shooters avoiding need apple build backdoor mcafee later admitted claims simple cracking phone publicity stunt though still claimed could pull may 2016 mcafee appointed chief executive chairman ceo mgt capital investments technology holding company company initially stated would rename john mcafee global technologies although plan abandoned due dispute intel rights mcafee name mcafee changed mgt focus social gaming cybersecurity stating interview anti-virus software dead longer works new paradigm stop hacker getting damage soon joining mgt mcafee claimed team exploited flaw android operating system allowed read encrypted messages whatsapp gizmodo investigated claims reported mcafee sent reporters malware-infected phones make hack work mcafee responded accusations writing course phones malware malware got story release speaking google involves serious flaw android architecture mcafee also moved mgt mining bitcoin cryptocurrencies saying intended make money company increase mgt expertise dealing blockchains thought important cybersecurity extremely bullish bitcoin writing twitter july 2017 predicted price one bitcoin would jump 500,000 within three years eat dick national television november 2017 increased prediction 1 million august 2017 mcafee stepped ceo instead serving mgt chief cybersecurity visionary january 2018 left company altogether sides stated decision amicable mcafee saying wanted spend time cryptocurrencies company stated getting pressured potential investors disassociate mcafee august 13 2018 mcafee took position ceo luxcore cryptocurrency company focused enterprise solutions mcafee identifies libertarian advocating decriminalization cannabis end war drugs non-interventionism foreign policy free market economy redistribute wealth upholds free trade mcafee supports abolishing transportation security administration mcafee advocates increased cyber awareness action threat cyberwarfare mcafee advocated religious liberty saying business owners able deny service cases contradict religious beliefs one forcing buy anything choose one person another forced anything harming choice sell choice buy september 8 2015 mcafee announced would seek office president united states 2016 presidential election candidate newly formed political party called cyber party december 24 2015 re-announced candidacy bid saying would instead seek presidential nomination libertarian party campaign trail mcafee consistently polled among top three presidential candidates party rivals gary johnson austin petersen three candidates appeared libertarian party first nationally televised presidential debate march 29 2016 mcafee announced vice presidential choice would photographer former commercial real estate broker libertarian activist judd weiss mcafee announced plans run president 2020 presidential election primary platform promote use cryptocurrencies stated either seek nomination libertarian party form party mcafee contended taxes illegal claimed filed tax return eight years refers “ prime target ” us internal revenue service mcafee lives wife janice dyson lexington tennessee night mcafee arrived united states deported guatemala december 2012 solicited dyson prostitute south beach florida two spent night together mcafee dyson 30 years mcafee junior subsequently began relationship married 2013 mcafee originally took residence portland oregon 2013 2012 article mensa bulletin magazine american mensa mcafee stated developer first commercial anti-virus program made popular hacking target confiding hackers see hacking badge honor added security people buy computer equipment uses pseudonyms setting computers logging changes ip address several times day asked another occasion personally uses mcafee antivirus software mcafee replied take annoying mcafee claims former cocaine baron boston george jung writing official biography domain mcafee taught yoga written several books yoga june 22 2018 mcafee announced unconscious hospitalized two days vidant medical center greenville north carolina claimed due malicious tampering something ingested since december 2018 mcafee stated several times twitter 47 biological children april 30 2012 mcafee property orange walk town belize raided gang suppression unit belize police department time mcafee bed girlfriend mcafee said traumatized incident gsu press release stated mcafee arrested unlicensed drug manufacturing possession unlicensed weapon released without charge 2012 belize police spokesman raphael martinez confirmed mcafee neither convicted charged suspected november 12 2012 belize police started search mcafee person interest connection murder american expatriate gregory viant faull faull found dead gunshot wound november 11 2012 home island ambergris caye largest island belize faull neighbor mcafee november 2012 interview wired mcafee said always afraid police would kill thus refused routine questions since evaded belizean authorities belize prime minister dean barrow called mcafee extremely paranoid even bonkers mcafee fled belize sought questioning concerning murder magazine vice accidentally gave away mcafee location guatemalan resort early december 2012 photo taken one journalists accompanying mcafee posted exif geolocation metadata still attached guatemala mcafee asked chad essley american cartoonist animator set blog mcafee could write experience run mcafee appeared publicly guatemala city attempted seek political asylum december 5 2012 mcafee arrested illegally entering guatemala shortly afterward placed arrest board review mcafee plea asylum formed committee denied asylum taken holding facility detention center order await deportation belize december 6 2012 reuters abc news reported mcafee two minor heart attacks guatemalan detention center hospitalized mcafee lawyer stated client suffered heart attacks instead suffered high blood pressure anxiety attacks mcafee later said faked heart attacks held guatemala buy time attorney file series appeals ultimately prevented deportation belize thus hastening government decision send back united states december 12 2012 mcafee released detention guatemala deported united states january 2014 belizean police presented new accusations persisted seeking mcafee imprisonment crimes accused however auctioned mcafee seized assets home burned suspicious circumstances august 2 2015 mcafee arrested henderson county tennessee charges one count driving influence one count possession firearm intoxicated november 14 2018 circuit court orlando florida refused dismiss wrongful death lawsuit mcafee faull death january 2019 mcafee announced run u.s. authorities living internationally boat following convening grand jury indict wife four 2020 presidential campaign workers tax-related charges irs independently confirmed existence charges july 2019 mcafee members entourage arrested yacht docked puerto plata dominican republic suspicion carrying high-caliber weapons ammunition held four days released. showtime networks documentary portion mcafee life spent belize began airing september 2016 documentary covers allegations rape mcafee former business partner allison adonizio murders belizean david middleton american expat gregory faull interview bloomberg pimm fox kathleen hayes september 8 2016 mcafee claimed incidents fabricated saying belize third-world banana republic go make story want pay interviewees showtime march 27 2017 announced johnny depp would portray mcafee forthcoming film titled king jungle film focus mcafee life belize takes wired magazine writer tour compound glenn ficarra john requa direct film scott alexander larry karaszewski write script october 2018 announced michael keaton would replace johnny depp key role may 12 2017 mcafee interviewed abc 20/20 regarding alleged murder neighbor greg faull hour janice mcafee john wife also interviewed
Computer security
polyglot persistence polyglot persistence concept using different data storage technologies handle different data storage needs within given software application polyglot programming term coined neal ford 2006 expresses idea computer applications written mix different programming languages order take advantage fact different languages suitable tackling different problems complex applications combine different types problems picking right language job may productive trying solve aspects problem using single language concept applied databases application communicate different databases using best achieve end goal hence term polyglot persistence numerous databases available solve different problems using single database satisfy program requirements result non-performant jack trades master none solution relational databases example good enforcing relationships exist various data tables discover relationship find data different tables belong object sql join operation used might work data smaller size becomes problematic data involved grows larger graph database might solve problem relationships case big data might solve problem database transactions provided rdbm systems instead nosql document database might used store unstructured data particular part problem thus different problems solved different database systems within application
Databases
object design incorporated object design incorporated often called odi software company founded 1988 developed commercialized object database called objectstore object design founded several former symbolics employees including daniel weinreb based burlington massachusetts objectstore object-oriented database shipped 1990 1994 odi listed 1 inc. magazine list fastest-growing private companies u.s. major early customer telstra used map toll-free telephone numbers end point close caller example local taxi company chain restaurant odi went public 1996 listed nasdaq odis 1999 odi shipped excelon xml application development environment marketed integration server january 2000 odi renamed excelon focussed marketing xml integration software 2002 odi acquired progress software continued develop 2013 progress software sold objectstore product line among others aurea software inc. newly formed operating subsidiary esw capital investment arm trilogy enterprises part deal objectstore moved separate operating subsidiary esw capital
Databases
vigilant technology vigilant technology makes surveillance security systems digital recording systems video content analysis control centers vigilant supports tens thousands cameras airports governmental sites financial institutions correctional facilities casinos city centers vigilant founded february 1999 adi pinhas later formed superfish ronen saggir company formed develop surveillance products based digital video would convert analogue video digital format allowing user compress store retrieve images electronic format vigilant first company perform video compression dvd quality dsp digital signal processor founders group private investors provided seed capital company initially 1999 2000 focused research development vigilant made first sale late 2000 worked pelco us-based video security equipment company range projects vigilant raised capital two rounds 2000 2002 company also received us 2.1 million grant chief scientist fund israel assist research development costs december 2005 company raised £10 million listed london stock exchange ticker symbol vgt since november 2008 vigilant technology wholly owned subsidiary batm advanced communications company products include monitoring management services recording streaming hardware content analysis software ip cameras
Computer security
xbill xbill arcade style game x window system game features bespectacled character known bill spoof bill gates goal prevent bill legions clones installing wingdows virus cleverly designed resemble popular operating system parody windows variety computers running operating systems popular among linux gamers end 1990s beating quake though quake ii linux journal reader favourite linux game 1999 operating systems represented logos shown computer screens computers player must defend include pcs running linux bsd sparcstations solaris sgi irix workstations apple macintosh palmpilots nextcubes bill installs wingdows onto computer current operating system placed beside using mouse player must squash bill drag discarded operating systems back computers end level points accrued every computer still running original operating system later levels computers connected lan cables causing wingdows spread faster computers may also catch fire cured dragging buckets water onto game written brian wellington matias duarte summer 1994 originally written c++ code base later version 2.1 refactored c. game later end 1990s deliberately ported microsoft windows ports many platforms mac os x openmoko android maemo phones followed due open source nature re-implementations game also exist 2009 project resurrected xbill-ng similar concept lincity-ng xbill popular among linux gamers end 1990s beating quake though quake ii linux journal reader favourite linux game 1999 game holds four five stars linux game tome noted desktoplinux.com despite status always packaged linux distributions due disparaging content instance fedora integrate debian somewhat illustrating notoriety graphics game used website 2009 free software foundation campaign windows 7 sins
Operating systems
outpost firewall pro outpost firewall pro discontinued personal firewall developed agnitum founded 1999 st. petersburg russia outpost firewall pro monitors incoming outgoing network traffic windows machines outpost also monitors application behavior attempt stop malicious software covertly infecting windows systems agnitum called technology component control anti-leak control included hips-based host protection module product also includes spyware scanner monitor along pop-up blocker spyware filter internet explorer mozilla firefox outpost web surfing security tools included black-lists ips urls unwanted web page element filters ad-blocking technology altogether known web control version 7.5 adds new techniques help pc users block unknown new threats activation version 8 introduces improvements well windows 8 compatibility redesigned user interface version 8 also extends x64 host-based intrusion-prevention system hips support outpost firewall pro allows user specifically define pc application connects internet known rules wizard mode policy default behavior program mode outpost firewall pro displays prompt time new process attempts network access process requests connection covered pre-validated rules idea let user decide whether application allowed network connection specific address port protocol outpost firewall includes pre-set rules many popular applications users could optionally submit rules created first versions outpost firewall pro 1.0–4.0 allow users create plugins add third-party plugins meet specific needs later versions plugin programming interface outpost firewall pro users developed unofficial web forum fed agnitum since 2002 discuss product features support forum moderated experienced senior users outpost firewall pro offers help support technical advice program assistance outpost firewall pro self-protection technology aims detecting attempts modify disable services hinder program protection received accolades comparison testers capable sophisticated detecting known methods disabling without user permission testing site matousec.com performing test-set leak-tests known software including pc firewalls consistently gives outpost firewall pro highest ratings pc firewalls independent comparisons outpost firewall pro 30 awards 15 countries computer media test labs since 2002 product also licensed several security software publishers 2003–2010 sophos uk usa lavasoft sweden canon japan bullguard uk cat-quickheal india novell usa avg czech republic czech republic proland software india others outpost generate large number security alerts experts believe lead inexperienced end-user habitually dismissing alerts even important ones firewall preferred experienced users agnitum direction give end user complete control aspects system avoid unwanted changes malicious software disclosure personal information malware advanced security mode outpost component control notify user every time network enabled application changed component anti-leak control notify user whenever application performs potentially dangerous operation overwriting another application memory space practice result high number alerts quickly become intrusive mediate outpost includes option apply validated pre-sets automatically allow secure configuration yet provide ease use december 9 2015 yandex acquired agnitum order use technology yandex browser valid license holders given january 31 2016 exchange license keys 1 year license kaspersky internet security
Computer security
document structuring conventions document structuring conventions dsc set standards postscript based use comments primarily specifies way structure postscript file way expose structure machine-readable way postscript file conforms dsc called conforming document need structuring convention arises since postscript turing-complete programming language thus guaranteed method — short actually printing document — things like determining many pages long given document large given page skip particular page addition structure dsc comments exposing structure helps provide way e.g. intelligent print spooler ability rearrange pages printing page layout program find bounding box postscript file used graphic image collectively program takes postscript files input data called document manager order postscript print file properly distill pdf using adobe tools conform basic dsc standards dsc comments serve second function specifying way tell document manager certain things like inserting font postscript code collectively called resources file dsc comments serve second function akin preprocessing directives purely comments documents using kinds dsc comments require functioning document manager come intended sending directly printer work dsc basis encapsulated postscript eps files conforming documents restrictions set dsc comments expanded mechanism called open structuring conventions together eps specification form basis early versions adobe illustrator artwork file format basic premise dsc separation prolog static definitions script code affects job-specific printed output plus disallowing certain postscript operators deemed inappropriate page descriptions ensures basic level predictability postscript code thus forming basis document manageability optional additional layer document manageability provided separating script document setup section zero functionally independent pages optional trailer cleanup code “ zero pages ” dsc usually means “ one page without use postscript ‘ showpage ’ operator functional independence pages plus disallowing postscript operators pages section form basis page independence allows pages reordered independently randomly accessed imposed structure exposed delimiting postscript file dsc comments normally begin two percent signs followed keyword keywords need followed colon optional space character series arguments finally document marked conforming starting comment starting “ ps-adobe- ” followed dsc version number sections reusable postscript code modularized procsets procedure sets corresponding function libraries programming languages order ease generation postscript code procsets postscript resources example fonts omitted postscript file externally referenced directive-like dsc comment external referencing however work document manager understands dsc comments dsc version 3.0 released september 25 1992 specification states even though dsc comments layer communication beyond postscript language affect final output use considered good postscript language programming style thus postscript-producing programs output dsc-conformant comments along code although programs actually produce conforming documents dsc-conforming document one generated dvips might begin following meaning
Programming language topics
javascript templating javascript templating refers client side data binding method implemented javascript language approach became popular thanks javascript increased use increase client processing capabilities trend outsource computations client web browser popular javascript templating libraries angularjs backbone.js ember.js handlebars.js vue.js mustache.js frequent practice use double curly brackets i.e nowiki /nowiki call values given key data files often json objects examples use external file codice_1 following contents examples produce following html list templating becomes useful information distributed may change large maintained various html pages available human resources large enough require heavier server-side templating
Web technology
grace hopper grace brewster murray hopper december 9 1906 – january 1 1992 american computer scientist united states navy rear admiral one first programmers harvard mark computer pioneer computer programming invented one first linkers popularized idea machine-independent programming languages led development cobol early high-level programming language still use today prior joining navy hopper earned ph.d. mathematics yale university professor mathematics vassar college hopper attempted enlist navy world war ii rejected 34 years old instead joined navy reserves hopper began computing career 1944 worked harvard mark team led howard h. aiken 1949 joined eckert–mauchly computer corporation part team developed univac computer eckert–mauchly began developing compiler believed programming language based english possible compiler converted english terms machine code understood computers 1952 hopper finished program linker originally called compiler written a-0 system wartime service co-authored three papers based work harvard mark 1 1954 eckert–mauchly chose hopper lead department automatic programming led release first compiled languages like flow-matic 1959 participated codasyl consortium consulted hopper guide creating machine-independent programming language led cobol language inspired idea language based english words 1966 retired naval reserve 1967 navy recalled active duty retired navy 1986 found work consultant digital equipment corporation sharing computing experiences u.s. navy guided-missile destroyer named cray xe6 hopper supercomputer nersc lifetime hopper awarded 40 honorary degrees universities across world college yale university renamed honor 1991 received national medal technology november 22 2016 posthumously awarded presidential medal freedom president barack obama hopper born new york city eldest three children parents walter fletcher murray mary campbell van horne scottish dutch descent attended west end collegiate church great-grandfather alexander wilson russell admiral us navy fought battle mobile bay civil war grace curious child lifelong trait age seven decided determine alarm clock worked dismantled seven alarm clocks mother realized limited one clock preparatory school education attended hartridge school plainfield new jersey hopper initially rejected early admission vassar college age 16 test scores latin low admitted following year graduated phi beta kappa vassar 1928 bachelor degree mathematics physics earned master degree yale university 1930 1934 earned ph.d. mathematics yale direction øystein ore dissertation new types irreducibility criteria published year hopper began teaching mathematics vassar 1931 promoted associate professor 1941 married new york university professor vincent foster hopper 1906–1976 1930 divorce 1945 marry chose retain surname hopper tried enlist navy early world war ii rejected reasons age 34 old enlist weight height ratio low also denied basis job mathematician mathematics professor vassar college valuable war effort war 1943 hopper obtained leave absence vassar sworn united states navy reserve one many women volunteered serve waves get exemption enlist navy minimum weight reported december trained naval reserve midshipmen school smith college northampton massachusetts hopper graduated first class 1944 assigned bureau ships computation project harvard university lieutenant junior grade served mark computer programming staff headed howard h. aiken hopper aiken co-authored three papers mark also known automatic sequence controlled calculator hopper request transfer regular navy end war declined due advanced age 38 continued serve navy reserve hopper remained harvard computation lab 1949 turning full professorship vassar favor working research fellow navy contract harvard 1949 hopper became employee eckert–mauchly computer corporation senior mathematician joined team developing univac i. hopper also served univac director automatic programming development remington rand univac first known large-scale electronic computer market 1950 competitive processing information mark hopper recommended development new programming language would use entirely english words told quickly could n't computers n't understand english still persisted “ much easier people write english statement use symbols ” explained “ decided data processors ought able write programs english computers would translate machine code. ” idea accepted 3 years meantime published first paper subject compilers 1952 early 1950s company taken remington rand corporation working original compiler work done program known compiler first version a-0 1952 operational link-loader time referred compiler later said nobody believed running compiler nobody would touch told computers could arithmetic goes say compiler translated mathematical notation machine code manipulating symbols fine mathematicians good data processors symbol manipulators people really symbol manipulators become professional mathematicians data processors much easier people write english statement use symbols decided data processors ought able write programs english computers would translate machine code beginning cobol computer language data processors could say subtract income tax pay instead trying write octal code using kinds symbols cobol major language used today data processing 1954 hopper named company first director automatic programming department released first compiler-based programming languages including math-matic flow-matic spring 1959 computer experts industry government brought together two-day conference known conference data systems languages codasyl hopper served technical consultant committee many former employees served short-term committee defined new language cobol acronym common business-oriented language new language extended hopper flow-matic language ideas ibm equivalent comtran hopper belief programs written language close english rather machine code languages close machine code assembly languages captured new business language cobol went ubiquitous business language date among members committee worked cobol mount holyoke college alumnus jean e. sammet 1967 1977 hopper served director navy programming languages group navy office information systems planning promoted rank captain 1973 developed validation software cobol compiler part cobol standardization program entire navy 1970s hopper advocated defense department replace large centralized systems networks small distributed computers user computer node could access common databases located network developed implementation standards testing computer systems components significantly early programming languages fortran cobol navy tests conformance standards led significant convergence among programming language dialects major computer vendors 1980s tests official administration assumed national bureau standards nbs known today national institute standards technology nist accordance navy attrition regulations hopper retired naval reserve rank commander age 60 end 1966. ref name= urlattrition/retirement /ref recalled active duty august 1967 six-month period turned indefinite assignment retired 1971 asked return active duty 1972 promoted captain 1973 admiral elmo r. zumwalt jr. republican representative philip crane saw march 1983 segment 60 minutes championed joint resolution originating house representatives led promotion 15 december 1983 commodore special presidential appointment president ronald reagan remained active duty several years beyond mandatory retirement special approval congress effective november 8 1985 rank commodore renamed rear admiral lower half hopper became one navy female admirals following career spanned 42 years admiral hopper took retirement navy august 14 1986 celebration held boston commemorate retirement hopper awarded defense distinguished service medal highest non-combat decoration awarded department defense time retirement oldest active-duty commissioned officer united states navy 79 years eight months five days retirement ceremony aboard oldest commissioned ship united states navy 188 years nine months 23 days admirals william d. leahy chester w. nimitz hyman g. rickover charles stewart officers navy history serve active duty higher age leahy nimitz served active duty life due promotions rank fleet admiral following retirement navy hired senior consultant digital equipment corporation dec hopper initially offered job position rita yavinsky insisted applying position dec going typical formal interview process also sent letter yavinsky boss explaining would available alternating thursdays receiving high salary access unlimited expense account exhibited museum computing pioneer proposal hopper hired full-time senior consultant part position would report yavinsky position hopper represented company industry forums serving various industry committees along obligations retained position death age 85 1992 hopper goodwill ambassador primary activity capacity lectured widely early days computing career efforts computer vendors could take make life easier users visited digital engineering facilities generally received standing ovation conclusion remarks although longer serving officer always wore navy full dress uniform lectures allowed u.s. department defense regulation 32 cfr 53.2 2 important thing 've accomplished building compiler said training young people come know say 'do think say 'try back 'em need keep track get older stir 'em intervals n't forget take chances new year day 1992 hopper died sleep natural causes home arlington virginia 85 years age interred full military honors arlington national cemetery legacy inspiring factor creation grace hopper celebration women computing held yearly conference designed bring research career interests women computing forefront
Programming language topics
doto database doto database documentation oppressed online portal data hate-crime based religious identity happened india since 2014 website launched 7 march 2018 constitution club india new delhi inauguration ceremony attended ram punyani teesta setalvad saba naqvi zafar ul islam khan john dayal social activists documentation oppressed independent non-profit documentation center based new delhi run network civil society organizations national grassroot level like quill foundation human rights watch amnesty international chri people union civil liberties others doto database functions tracker violence site in-depth narratives database mixes crowd-sourcing model investigative editorial teams past years marked increase violence conducted certain sections society violence manifests different forms organized institutional violence state actions allied groups furtherance internalized biases primary objective doto database create common documentation platform civil society report hate crime incidents happening across india database document verifiable incidents targeted violence specific communities reported english urdu media well fact-finding civil society reports also provides platform in-depth narratives doto increase media reportage amalgamation crowd-sourcing model along investigative editorial teams easy-to-use model ultimately seeks make essential information accessible address number issues systemic violation fundamental rights erosion constitutional values deployment hate towards religious minorities india
Databases
cherokee web server cherokee open-source cross-platform web server runs linux bsd variants solaris windows lightweight high-performance web server/reverse proxy licensed gnu general public license goal fast fully functional yet still light major features cherokee include graphical administration interface named cherokee-admin modular light-weight design independent tests shown cherokee better performing apache serving static dynamic content cherokee maintained developed open source community configuration wizards provided automatically configure web server perform specific tasks run frameworks applications provide support php fastcgi ruby rails coldfusion glassfish django alfresco gnu mailman .net mono rtorrent symfony zend engine plus generic video streaming uwsgi last years cherokee adopted numerous electronic device makes iot technology manufacturers examples include gopro action cameras drones xiaomi action cameras digi international internet things kits atn corporation high-end rifle scopes defender security cameras etc since cherokee open source software require manufacturers license code way know many companies embedding cherokee products
Web technology
hypertalk hypertalk high-level procedural programming language created 1987 dan winkler used conjunction apple computer hypercard hypermedia program bill atkinson main target audience hypertalk beginning programmers hypertalk programmers usually called authors process writing programs scripting hypertalk scripts resembled written english used logical structure similar pascal programming language hypertalk supported basic control structures procedural languages repeat for/while/until if/then/else well function message handler calls function handler subroutine message handler procedure data types usually need specified programmer conversion happened transparently background strings numbers classes data structures traditional sense place special string literals lists items delimited commas later versions itemdelimiter property allowed choosing arbitrary character late 1980s apple considered using hypercard hypertalk scripting language standard language across company within classic mac os operating system well interprocess communication apple non-apple products company oppose development imitations like supercard created hypertalk standards committee avoid incompatibility language variants case-insensitive language initially interpreted gained just-in-time compilation hypercard 2.0 basic operations including mathematical computations hypertalk favored natural-language ordering predicates ordering used mathematical notation example hypertalk codice_1 assignment command variable placed end statement whereas traditional basic programming language others would accomplished writing hypertalk code side-effect creating variable theresult fly scripts could assign type value variable using codice_1 command making hypertalk weakly typed conversions variable types invisible automatic string 3 could multiplied number 5 produce number 15 number 5 concatenated onto string 3 produce string 35 hypertalk would complain unless types could automatically converted flow control logic generally similar common languages using codice_3 structure conditionals supporting loops based flexible codice_4 syntax comments prefaced two minus signs codice_5 hypercard primary user interface concept card display system emulated index card cards normally used store information similar record conventional flat-file database graphical layout card created using mouse placing various elements card text fields buttons master layout card known background shown behind transparent areas card objects placed background fields buttons would shared common layout among several cards card-specific content collection cards backgrounds associated data stored stored single file known stack cards collectively data-containing objects referred containers hypertalk functions scripts normally stored within codice_6 property available many stack containers scripts could access properties container corresponding instance variables using codice_7 codice_8 instructions script property held plain text special properties scripts could placed run text container including string variables imported stacks using codice_9 command script could even user-provided text typed on-screen text field arbitrary text could executed using codice_10 command manner similar dynamic sql key concept hypertalk way referred containers navigational system based visual hierarchy stack every container stack given unique id number created could also given name scripts could refer objects using either identifiers along object type specified using codice_11 operator operator used natural language syntax making easily readable self-documenting code instance script stored button card might wish take user-supplied text gathered using text field store text variable called thevalue various contextual aspects statements could inferred interpreter statement example script would running context button specific card identifier card understood refer card user interacting addition value text submitted user assumed main property target operations otherwise specified likewise card field assumed target command opposed background field information could also omitted even container types short forms programmers could use save typing thus code equivalent shorter form objects within given context—the card background instance—were also given runtime number based z-order screen assist using position navigation hypertalk also included variety ordinal cardinal referencing systems simplify syntax assuming field typehere field card code could also written choice addressing style left programmer often different styles used different statements order make code readable hypertalk included codice_12 container acted fashion codice_13 qualifier found object-oriented languages allowing simple access current container object less common codice_14 variable held value last operation certain built-in operators example uses codice_15 command display dialog box capture text typed accompanying text field dialog completed hitting clicking value assigned codice_14 pseudo-variable code copies value card field using codice_1 assignment operator containers given type also available collections pluralized version container type name—the collection fields card codice_18 collections containers properties key among codice_19 property widely used iterations similar tasks instance one wanted hide fields card could accomplished code code exposes another common feature hypertalk property might several names operators case codice_20 command associated codice_21 act setting value container codice_22 property thus codice_23 exactly equivalent codice_24 similar example codice_25 command stopped visual updating short form codice_26 codice_27 property hypercard itself—also container many examples sort syntactic sugar found hypertalk order simplify syntax improve readability common code hypercard 2.2 later collection collections also available container codice_28 allowed script address objects container single iterator notable feature hypertalk container model handling text every collection text whether literal string program text typed text field considered container multiple collections containers within allowed scripts parse text using navigational commands container instance parsing space-delimited data file one might want extract third column like syntax allowed script walk text find particular data example process treating text container known chunking functions chunk expressions sorts expressions used handle file manipulation along set file management functions following code opens known file reads extracts data closes file hypertalk also included functions chunking strings using substring-find operation using codice_29 operator following code finds examples given pattern using codice_29 part codice_31 loop codice_32 finds location pattern within string hypertalk used chunking system produce structures like arrays lists structure would created placing multiple data items variable separated commas various types data could imported hypertalk script using strings would get parsed required instance position objects screen defined pair numbers representing x coordinates relative upper left corner following code creates variable called pos holds coordinate pair manipulates re-position buttons card diagonal top-left bottom-right codice_33 chunking expression originally based comma delimiter later versions hypercard changed value codice_34 offering ability parse arbitrary lists structures hypertalk used object-oriented concept calling scripts objects stack sending events would processed handlers declared interest receiving events using codice_35 syntax instance gui containers could send codice_36 event mouse button clicked released top container script could capture events like events first sent script object created event instance user clicked button codice_36 event first sent button button script object codice_36 handler script passed card background stack stacks whose scripts explicitly imported using codice_9 command home stack user-selected always-open hypercard stack finally hypercard application many simple events like mouse clicks buttons script would placed directly within object question button instance one might use example code within button handler fashion case code called multiple locations used global handler event script could determine original sender event using codice_40 function likewise scripts could send events containers using codice_41 command using navigational code refer container holding handlers code combining hypertalk string processing codice_10 command allowed construction interactive interpreters placing text field card placing code field script codice_43 global property returns name line number last field clicked form like line 10 card field 4 code first selects text clicked line extracts line number local variable uses codice_10 run text hypercard script codice_45 message sent button user clicked codice_36 sent user released mouse inside trigger action similarly hypercard sent periodic codice_47 message codice_48 codice_49 ... various messages related navigation different cards hypercard stack well user input codice_50 codice_51 ... system events far scripters concerned main event loops like procedural programming languages unlike general rapid application development platforms hypercard stacks always looked like stacks menu bar hypercard programmer default—scripting could add delete modify menus single window fixed size early versions certain cases commands central operation part application directly available hypertalk good example creation new cards part application directly accessible hypertalk language new card could created using new card menu item could simulated code usingcodice_52 hypertalk called menu commands menu commands also invoked handlers hypertalk run custom code copy menu item selected one would place script stack using codice_53 handler examine codice_54 see copy hypertalk also provided script control built-in drawing tools simply scripting needed changes paint tools simulating mouse movements using codice_55 codice_56 commands although hypertalk language languished like hypercard received second lease life plugin protocol so-called external commands xcmds external functions xfcns native code containers attached stacks macintosh-specific resources single entry point return value xcmds xfcns could called like regular message function handlers hypertalk scripts also able send messages back hypercard application enterprising xcmd authors added advanced features like full color support colorizehc hypertint addcolor multiple special-purpose windows prompt tabloid textoid listoid showdialog megawindows drag drop support various hardware interfaces language various scripting languages taken cues hypertalk commonly regrouped loosely defined family named xtalk well second-level clones like many method names first popularized hypertalk made later languages codice_57 event handler javascript although asymetrix toolbook often also considered hypercard clone scripting language apparently bears little resemblance hypertalk clones dialects commonly referred moniker xtalk-languages added various features language expected modern programming language like exception handling user-defined object properties timers multi-threading even user-defined objects
Programming language topics
m86 security m86 security privately owned internet threat protection company specialized web email security products content filtering appliances company international headquarters located basingstoke development centers located california israel new zealand founded 1995 company changed name 8e6 technologies 2000 co-founder ceo ten years george shih developed many technologies used 8e6 internet filtering products originally effort provide “ pornography-free internet use children ” company offered filtering software computers used education environments later 8e6 technologies developed products manage internet access markets company internet filtering reporting monitoring appliances named “ best buy ” sc magazine 2007 2008 november 2008 8e6 technologies marshal limited provider email web security products merged became marshal8e6 george shih remained interim ceo former finjan ceo john vigouroux named position april 2009 november 2008 8e6 technologies company sold web filtering products marshal software provider integrated email web security products merged form marshal8e6 march 2009 marshal8e6 acquired avinti along behavior-based malware technology detecting blended threats occur email upon completion merger avinti ceo william kilmer joined marshal8e6 chief marketing officer part rebranding campaign marshal8e6 changed name m86 security september 2009 following november m86 security acquired finjan software along secure web gateway formerly finjan vital security product licenses patents real-time code analysis technology giving company malware detection prevention capabilities web gateway company previously announced john vigouroux ceo finjan software new ceo m86 security marshal trace labs finjan malicious code research center combined form m86 security labs researches reports web email-based security threats august 2010 m86 ranked number 1,230 inc. 5000 annual listing fastest private growing companies america march 6 2012 announced chicago based trustwave holdings would acquire m86 security march 19 2012 trustwave completed acquisition m86 security subsequently rebranded products operations trustwave name
Computer security
r-u-dead-yet r.u.d.y. short r u dead yet acronym used describe denial service dos tool used hackers perform slow-rate a.k.a “ low slow ” attacks directing long form fields targeted server known interactive console thus making user-friendly tool opens fewer connections website targeted long period keeps sessions open long feasible amount open sessions overtires server website making unavailable authentic visitors data sent small packs incredibly slow rate normally gap ten seconds byte intervals definite may vary avert detection victim servers types attacks may face issues able access particular website disrupt connection drastically slow network performance etc hackers use attacks different purposes targeting different servers hosts purposes include limited blackmail vengeance sometimes even activism rudy attack opens concurrent post http connections http server delays sending body post request point server resources saturated attack sends numerous small packets slow rate keep connection open server busy low-and slow attack behavior makes relatively difficult detect compared flooding dos attacks raise traffic volume abnormally
Computer security
resilient control systems modern society computerized digital control systems used reliably automate many industrial operations take granted power plant automobiles drive however complexity systems designers integrate roles responsibilities humans interact systems cyber security highly networked systems led new paradigm research philosophy next generation control systems resilient control systems consider elements disciplines contribute effective design cognitive psychology computer science control engineering develop interdisciplinary solutions solutions consider things tailor control system operating displays best enable user make accurate reproducible response design cyber security protections system defends attack changing behaviors better integrate widely distributed computer control systems prevent cascading failures result disruptions critical industrial operations context cyber-physical systems resilient control systems aspect focuses unique interdependencies control system compared information technology computer systems networks due importance operating critical industrial operations originally intended provide efficient mechanism controlling industrial operations development digital control systems allowed flexibility integrating distributed sensors operating logic maintaining centralized interface human monitoring interaction ease readily adding sensors logic software done relays isolated analog instruments led wide acceptance integration systems industries however digital control systems often integrated phases cover different aspects industrial operation connected network leading complex interconnected interdependent system control theory applied often nothing digital version analog counterparts dependence digital control systems upon communications networks precipitated need cybersecurity due potential effects confidentiality integrity availability information achieve resilience next generation control systems therefore addressing complex control system interdependencies including human systems interaction cyber security recognized challenge research resilience engineering last decade focused two areas organizational information technology organizational resilience considers ability organization adapt survive face threats including prevention mitigation unsafe hazardous compromising conditions threaten existence information technology resilience considered number standpoints networking resilience considered quality service computing considered issues dependability performance face unanticipated changes however based upon application control dynamics industrial processes functionality determinism primary considerations captured traditional objectives information technology considering paradigm control systems one definition suggested resilient control systems tolerate fluctuations via structure design parameters control structure control parameters however definition taken perspective control theory application control system consideration malicious actor cyber security directly considered might suggest definition effective reconstitution control attack intelligent adversaries proposed however definition focuses resilience response malicious actor consider cyber-physical aspects control system definition resilience considers benign malicious human interaction addition complex interdependencies control system application use term “ recovery ” used context resilience paralleling response rubber ball stay intact force exerted recover original dimensions force removed considering rubber ball terms system resilience could defined ability maintain desired level performance normalcy without irrecoverable consequences resilience context based upon yield strength ball control systems require interaction environment namely sensors valves pumps make industrial operation reactive environment control systems require awareness state make corrective changes industrial process maintain normalcy mind consideration discussed cyber-physical aspects human systems integration cyber security well definitions resilience broader critical infrastructure level following deduced definition resilient control system considering flow digital control system basis resilient control system framework designed referring left side fig 1 resilient control system holistically considers measures performance normalcy state space center understanding performance priority provide basis appropriate response combination human automation embedded within multi-agent semi-autonomous framework finally right information must tailored consumer address need position desirable response several examples scenarios resilience differs provides benefit control system design available literature primary tenets resilience contrasted traditional reliability presented considering integrated approach resilient control systems cyber-physical tenants complement fundamental concept dependable reliable computing characterizing resilience regard control system concerns including design considerations provide level understanding assurance safe secure operation industrial facility tenants discussed individually summarize challenges address order achieve resilience benign human ability quickly understand novel solutions provide ability adapt unexpected conditions behavior provide additional resilience control system reproducibly predicting human behavior continuing challenge ability capture historic human preferences applied bayesian inference bayesian belief networks ideally solution would consider direct understanding human state using sensors eeg considering control system design interaction goal would tailor amount automation necessary achieve level optimal resilience mixed initiative response presented human would actionable information provides basis targeted reproducible response contrast challenges prediction integration benign human control systems abilities malicious actor hacker undermine desired control system behavior also create significant challenge control system resilience application dynamic probabilistic risk analysis used human reliability provide basis benign actor however decidedly malicious intentions adversarial individual organization nation make modeling human variable objectives motives however defining control system response intentions malicious actor looks forward level recognized behavior gain advantage provide pathway undermining system whether performed separately preparation cyber attack system behaviors provide opportunity successful attack without detection therefore considering resilient control system architecture atypical designs imbed active passively implemented randomization attributes would suggested reduce advantage much current critical infrastructure controlled web interconnected control systems either architecture termed distributed control systems dcs supervisory control data acquisition scada application control moving toward decentralized state moving smart grid complex interconnected nature individual homes commercial facilities diverse power generation storage creates opportunity challenge ensuring resulting system resilient threats ability operate systems achieve global optimum multiple considerations overall efficiency stability security require mechanisms holistically design complex networked control systems multi-agent methods suggest mechanism tie global objective distributed assets allowing management coordination assets optimal benefit semi-autonomous constrained controllers react rapidly maintain resilience rapidly changing conditions establishing metric capture resilience attributes complex least considered based upon differences interactions interdependencies evaluating control cyber cognitive disturbances especially considered disciplinary standpoint leads measures already established however metric instead based upon normalizing dynamic attribute performance characteristic impacted degradation alternative suggested specifically applications base metrics resilience characteristics given follows type disturbance performance characteristics exist time data integrity time terms delay mission communications latency data terms corruption modification normalizing factors general idea base metric “ expected ” necessarily actual initiator degradation considering time metrics basis resilient un-resilient systems observed fig 2 dependent upon abscissa metrics chosen fig 2 reflects generalization resiliency system several common terms represented graphic including robustness agility adaptive capacity adaptive insufficiency resiliency brittleness overview definitions terms following explanations provided abscissa fig 2 recognized cyber cognitive influences affect data time underscores relative importance recognizing forms degradation resilient control designs cybersecurity single cyberattack degrade control system multiple ways additionally control impacts characterized indicated terms fundamental seem little value correlating impact terms like cost development use cases provide means relevance codified example given impact system dynamics data performance control loop directly ascertained show approach instability operational impact nature control systems implies starting point development resilience metrics control physical process based upon quantifiable performance measures including first principles stochastic ability provide measurement basis correlating operational performance adaptation also becomes starting point correlation data time variations come cognitive cyber-physical sources effective understanding based upon developing manifold adaptive capacity correlates design operational buffer power system manifold based upon real reactive power assets controllable latitude maneuver impact disturbances time modern distribution system mds assets aggregated individual contributions shown fig 3 figure assets include battery b alternate tie line source c asymmetric p/q-conjectured source distribution static synchronous compensator dstatcom e low latency four quadrant source energy limit 1 considering current digital control system designs cyber security systems dependent upon considered border protections i.e. firewalls passwords etc malicious actor compromised digital control system industrial operation man-in-the-middle attack data corrupted control system industrial facility operator would way knowing data compromised someone security engineer recognized attack occurring operators trained provide prompt appropriate response stabilize industrial facility likelihood corrupt data would lead operator reacting situation lead plant upset resilient control system per fig 1 cyber physical data fused recognize anomalous situations warn operator 2 society becomes automated variety drivers including energy efficiency need implement ever effective control algorithms naturally follow however advanced control algorithms dependent upon data multiple sensors predict behaviors industrial operation make corrective responses type system become brittle insofar unrecognized degradation sensor lead incorrect responses control algorithm potentially worsened condition relative desired operation industrial facility therefore implementation advanced control algorithms resilient control system also requires implementation diagnostic prognostic architectures recognize sensor degradation well failures industrial process equipment associated control algorithms world advancing automation dependence upon advancing technologies skill sets needed keep united states forefront innovation challenges may appear rooted design better means better control infrastructures greater safety efficiency generation use energy however evolution technologies developed achieve current design automation achieved complex environment cyber-attack human error design operation damaging storm wreak havoc infrastructure depend nation next generation systems need consider broader picture ensure path forward failures lead ever greater catastrophic events critical resource students tomorrow expected advance designs require perspective challenges contributions others fulfill need addressing need courses developed provide perspectives relevant examples overview issues provide opportunity create resilient solutions universities george mason university northeastern tie critical infrastructure operations important aspect courses development technologies designed set stage next generation automation become evident effective teams comprised several disciplines however developing level effectiveness time consuming done professional environment expend lot energy time provides little obvious benefit desired outcome clear earlier stem disciplines successfully integrated effective recognizing ’ contributions working together achieve common set goals professional world team competition venues resilience week natural outcome developing environment allowing interdisciplinary participation providing exciting challenge motivate students pursue stem education standards policy define resilience nomenclature metrics needed establish value proposition investment includes government academia industry ieee industrial electronics society taken lead forming technical committee toward end purpose committee establish metrics standards associated codifying promising technologies promote resilience automation effort distinct supply chain community focus resilience security efforts iso nist
Computer security
client computing client computer program part operation relies sending request another program computer hardware software accesses service made available server may may located another computer example web browsers clients connect web servers retrieve web pages display email clients retrieve email mail servers online chat uses variety clients vary depending chat protocol used multiplayer video games online video games may run client computer term client may also applied computers devices run client software users use client software client part client–server model still used today clients servers may computer programs run machine connect via inter-process communication techniques combined internet sockets programs may connect service operating possibly remote system internet protocol suite servers wait potential clients initiate connections may accept term first applied devices capable running stand-alone programs could interact remote computers via network computer terminals clients time-sharing mainframe computer one classification client computers devices either thick clients thin clients hybrid clients thick client also known rich client fat client client performs bulk data processing operations necessarily rely server personal computer common example fat client relatively large set features capabilities light reliance upon server example computer running art program krita sketchup ultimately shares result work network thick client computer runs almost entirely standalone machine save send receive files via network standard called workstation thin client minimal sort client thin clients use resources host computer thin client generally presents processed data provided application server performs bulk required data processing device using web application office web apps thin client hybrid client mixture two client models similar fat client processes locally relies server storing persistent data approach offers features fat client multimedia support high performance thin client high manageability flexibility device running online version video game diablo iii example hybrid client
Distributed computing architecture
advanced synchronization facility advanced synchronization facility asf proposed extension x86-64 instruction set architecture adds hardware transactional memory support introduced amd latest specification dated march 2009. still proposal stage released microprocessors implement extension asf provides capability start end abort transactional execution mark cache lines protected memory access transactional code regions contains four new instructions—codice_1 codice_2 codice_3 codice_4—and turns otherwise invalid codice_5-prefixed codice_6 codice_7 codice_8 instructions valid ones inside transactional code regions 256 levels nested transactional code regions supported codice_1 codice_2 instructions mark start end transactional code region inside transactional code regions codice_5-prefixed codice_12 codice_7 codice_8 instructions mark four cache lines protected memory access accesses processor cores protected cache lines result exceptions turn cause transaction aborts stores protected cache lines must performed using codice_15 instructions marked cache lines released protection codice_4 instruction transaction aborts generated hardware explicitly requested codice_3 instruction rolls back modifications protected cache lines restarts execution instruction following top-level codice_1 instruction
Computer architecture
dartmouth time sharing system dartmouth time-sharing system dtss operating system first developed dartmouth college 1963 1964 first successful large-scale time-sharing system implemented also system basic language developed dtss developed continually next decade reimplemented several generations computers finally shut 1999 professors john kemeny thomas kurtz dartmouth college purchased royal mcbee lgp-30 computer around 1959 programmed undergraduates assembly language kurtz four students programmed dartmouth algol 30 compiler implementation algol 58 programming language two students evolved scalp self contained algol processor language 1962-1964 kemeny freshman sidney marshall collaborated create dartmouth oversimplified programming experiment dope used large freshman courses kurtz approached kemeny either 1961 1962 following proposal dartmouth students would access computing free open-access could accomplished via creating time-sharing system kurtz learned colleague john mccarthy mit suggested n't guys timesharing although stated dtss inspired pdp-1-based time-sharing system bolt beranek newman evidence true 1962 kemeny kurtz submitted proposal development new time-sharing system nsf ultimately funded 1964 sufficient assurance dartmouth nsf would support system signed contract ge began preliminary work 1963 proposal funded particular evaluated candidate computers bendix ge ibm settled upon ge-225 system paired datanet-30 communications processor two-processor approach unorthodox kemeny later recalled time many experts ge elsewhere tried convince us route two-computer solution wasteful inefficient essence datanet-30 provided user-interface scheduler user programs ran ge-225 implementation began 1963 student team direction kemeny kurtz aim providing easy access computing facilities members college ge-225 datanet-30 computers arrived february 1964 became operational mid march may 1 1964 4:00 a.m. system began operations autumn 1964 hundreds freshman students began use system via 20 teletypes access hanover high school via one additional teletype later autumn ge-225 computer replaced faster ge-235 computer minimal issues summer 1965 system could support forty simultaneous users dartmouth document october 1964 later revised ge describes overall dtss architecture dtss design emphasized immediate feedback kemeny kurtz observed response time averages 10 seconds destroys illusion one computer consequence many dtss users believed terminal computer educational aims ease use priority dtss design dtss implemented world first integrated design environment ide line typed user beginning line number added program replacing previously stored line number anything else taken command immediately executed lines consisted solely line number n't stored remove previously stored line number method editing provided simple easy use service allowed large numbers teleprinters terminal units dartmouth timesharing system ide commands included commands often believed part basic language users fact part time sharing system also used preparing algol fortran programs via dtss terminals kemeny kurtz originally hoped ge would enter research partnership end kurtz student anthony knapp authored document proposed system design presented ge phoenix office 1962 however ge rejected partnership october 1962 proposal dartmouth framed solely commercial sale said ge dartmouth promoted operational dartmouth time sharing system october 1964 fall joint computer conference san francisco three teletypes connected dartmouth system hanover.. december 1964 january 1965 two dartmouth students installed working copies dtss basic ge computers phoenix early 1965 ge began advertise timesharing services ge-265 system ge 235 datanet 30 including basic dartmouth algol later renaming ge mark time-sharing system next years ge opened 25 computer centers united states elsewhere serving fifty thousand users computer history museum corporate histories collection describes ge mark history way 1966-1968 dtss reimplemented ge 635 still using datanet-30 terminal control ge 635 system delivered november 1966 october 1967 providing service based phase software jointly developed dartmouth ge ge subsequently marketed ge mark ii system parallel work dartmouth embarked 1967 development phase ii direction professor john kemeny programming carried students faculty phase ii dartmouth time-sharing system replaced phase 1st april 1969 dartmouth described 1969 new dtss architecture influenced three criteria new version completely different internally earlier dtss provided near-identical user interface enable smooth transition users course materials 635 version provided interactive time-sharing nearly 300 simultaneous users 1970s large number time operated eleven commercial academic sites u.s.a. canada europe evolved 1970s later versions moved honeywell 6000 series mainframes 1973 honeywell 716 communication processors 1974 1976 ge-635 system replaced honeywell 66/40a computer remained operation end 1999 dtss version 2 included novel form inter-process communication called communication files significantly antedated unix pipes design documents put conceptual origin sometime 1967 described briefly 1969 conference communication files supported read write close operations also synchronous asynchronous data transfer random access status inquiries out-of-band signaling error reporting access control precise semantics operation determined master process douglas mcilroy notes communication files akin plan 9 9p protocol familiar io notable application communication files support multi-user conferences behaved somewhat like conference phone calls implemented entirely user-space application programs mentioned hanover high school connected dtss system beginning next decade many high schools colleges connected dtss via kiewit network named peter kiewit donor funds kiewit computation center housed dtss computers staff schools connected dtss via one teletypes modems dial-up telephone lines time dartmouth ran active programs engage train high school teachers using computation within courses 1967 following high schools joined kiewit network hanover high school holderness school mascoma valley regional high school kimball union academy mount hermon school phillips andover academy phillips exeter academy st. paul school vermont academy.. group expanded dartmouth secondary school project funded nsf 1967-1968 added following new england high schools cape elizabeth high school concord high school hartford high school vermont keene high school lebanon high school loomis school manchester central high school rutland high school st. johnsbury academy south portland high school timberlane high school 1968-1970 dartmouth added number colleges kiewit network via regional college consortium included bates college berkshire community college bowdoin college colby junior college middlebury college mount holyoke college new england college norwich university university vermont vermont technical college 1971 kiewit network connected 30 high schools 20 colleges new england new york new jersey time dtss supporting 30,000 users 3,000 dartmouth college 1973 kiewit network expanded include schools illinois michigan upstate new york ohio montreal canada kemeny kurtz intended students technical nontechnical fields use dtss arranged second trimester freshman mathematics class include requirement writing debugging four dartmouth basic programs 1968 80 dartmouth students experience computer programming 80 classes included official computer use including engineering classics geography sociology spanish 57 dtss use courses 16 research 27 casual use entertainment university stated sense regarded frivolous kemeny kurtz believed activities encouraged users become familiar fear computer pleased find 40 faculty members—not technical fields—used dtss many students continued using system longer required kemeny wrote brochure describing system student could enter library borrow book without asking permission explaining purpose student may walk kiewit computation center sit console use time-sharing system one ask solving serious research problem homework easy way playing game football writing letter girlfriend 1967–68 school year dtss library 500 programs including kemeny kurtz reported many games addition 2,600 dartmouth users 5,550 people ten universities 23 high schools accessed dtss early 1970s campus 150 terminals 25 buildings including portable units patients campus infirmary 2,000 users logged dtss day 80 students 70 faculty used system year off-campus dartmouth educational time-sharing network included users 79 terminals 30 high schools 20 universities including middlebury college phillips andover mount holyoke college goddard college u.s merchant marine academy bates college dartmouth club new york dartmouth affiliate jersey city new jersey sharing dtss dartmouth people basic change system remained compatible older applications kemeny reported 1974 programs written 1964 would still run system allowed email-type messages passed users real-time chat via precursor unix talk program 1980 supported languages systems included 2000 project recreate dtss system simulator undertaken result dtss available microsoft windows systems apple macintosh computer
Operating systems
linux-libre linux-libre operating system kernel gnu package gnu project attempts keep linux-libre synchronization upstream development linux kernel removing software include source code source code obfuscated released proprietary license software components available source code called binary blobs mostly used proprietary firmware images linux kernel generally redistributable binary blobs give user freedom audit modify consequently redistribute modified versions linux kernel started include binary blobs 1996 work clear binary blobs began 2006 gnewsense find-firmware gen-kernel work taken blag linux distribution 2007 deblob linux-libre born linux-libre first released free software foundation latin america fsfla endorsed free software foundation fsf valuable component totally free linux distributions became gnu package march 2012 alexandre oliva project maintainer removal process achieved using script called deblob-main script inspired one used gnewsense jeff moe made subsequent modifications meet certain requirements use blag linux gnu distribution another script called deblob-check used check kernel source file patch compressed sources file still contains software suspected proprietary aside primary intended effect running system free software practical consequences removing device firmware user allowed study modify positive negative effects advantages include removal device firmware audited bugs security problems malicious operations backdoors fixed linux kernel maintainers even know possible entire system compromised malicious firmware without ability perform security audit manufacturer-provided firmware even innocent bug could undermine safety running system downside removing proprietary firmware kernel cause loss functionality certain hardware free software replacement available affects certain sound video tv tuner network especially wireless cards well devices possible free software replacement firmware provided substitute openfwwf b43 carl9170 ath9k_htc wireless card drivers source code precompiled packages deblobbed linux kernel available directly distributions use linux-libre scripts freed-ora subproject prepares maintains rpm packages based fedora also precompiled packages debian derived distributions ubuntu distros n't use packaged linux-libre instead completely deblob proprietary linux kernel tools make linux-libre source compiled resulting free linux kernel used default systems distributions linux default kernel used propose linux-libre alternative kernel
Computer architecture
default credential vulnerability default credential vulnerability type vulnerability commonly found affect devices like modems routers digital cameras devices pre-set default administrative credentials access configuration settings vendor manufacturer devices uses single pre-defined set admin credentials access device configurations potential hacker misuse fact hack devices credentials changed consumers several proof-of-concept poc well real world worms running across internet configured search systems set default username password voyager alpha force zotob myspooler examples poc malware scans internet specific devices try login using default credentials real world many new malware including mirai using vulnerability using compromised devices carrying distributed denial service ddos attacks one particular incident hacker able gain access control large number networks including university maryland baltimore county imagination capital market strategies l leveraging fact using default credentials netgear switch
Computer security
smurf attack smurf attack distributed denial-of-service attack large numbers internet control message protocol icmp packets intended victim spoofed source ip broadcast computer network using ip broadcast address devices network default respond sending reply source ip address number machines network receive respond packets large victim computer flooded traffic slow victim computer point becomes impossible work original smurf.c written dan moschuk aka tfreak late 1990s many ip networks would participate smurf attacks prompted would respond icmp requests sent broadcast addresses name comes idea small numerous attackers overwhelming much larger opponent see smurfs today administrators make network immune abuse therefore networks remain vulnerable smurf attacks fix two-fold another proposed solution network ingress filtering rejects attacking packets basis forged source address example configuring router forward packets broadcast addresses cisco router smurf amplifier computer network lends used smurf attack smurf amplifiers act worsen severity smurf attack configured way generate large number icmp replies victim spoofed source ip address fraggle attack variation smurf attack attacker sends large amount udp traffic ports 7 echo 19 chargen ip broadcast address intended victim spoofed source ip address works similarly smurf attack many computers network respond traffic sending traffic back spoofed source ip victim flooding traffic source code attack also released tfreak
Computer security
gordon–loeb model gordon–loeb /ˈgȯr-dən ˈlōb/ model mathematical economic model analyzing optimal investment level information security investing protect company data involves cost unlike investments usually generate profit however serve prevent additional costs thus important compare expensive protect specific set data potential loss case said data stolen lost damaged corrupted draft model company must possess knowledge three parameters much data worth much data risk probability attack data going successful last parameter gordon loeb defined vulnerability product said parameters provides medium money loss security investment model gather amount money company spends protecting information cases small fraction predicted loss example expected value loss following security breach specifically model shows generally inconvenient invest informatics security including cybersecurity computer security related activities amounts higher 37 predicted loss gordon–loeb model also shows specific level potential loss amount resources invest order protect information set always increase increase vulnerability said set thus companies enjoy greater economic returns investing cyber/information security activities aimed increase security data sets medium level vulnerability words investment safeguarding company data reduces vulnerability decreasing incremental returns example suppose estimated data value 1.000.000 euros attack probability 15 80 chance attack would successful case potential loss given product 1.000.000 euros x 0.15 x 0.8 120.000 euros according gordon loeb company investment security exceed 120.000 euros x 0.37 44.000 euros gordon–loeb model first published lawrence a. gordon martin p. loeb 2002 paper acm transactions information system security entitled economics information security investment paper reprinted 2004 book economics information security gordon loeb professors university maryland robert h. smith school business gordon–loeb model one well accepted analytical models economics cyber/information security literature model widely referenced academic practitioner literature model also empirically tested several different settings research mathematicians marc lelarge yuliy baryshnikov generalized results gordon–loeb model gordon–loeb model featured popular press wall street journal financial times
Computer security
gardening cryptanalysis cryptanalysis gardening act encouraging target use known plaintext encrypted message term used british government code cypher school bletchley park england world war ii schemes entice germans include particular words british called cribs encrypted messages term presumably came raf minelaying missions gardening sorties gardening standard raf slang sowing mines rivers ports oceans low heights possibly sea area around european coasts given code-name flowers vegetables technique claimed effective messages produced german navy enigma machines germans recently swept particular area mines analysts bletchley park need cribs might apparently several occasions request area mined would hopefully evoke encrypted messages local command mentioning minen german mines and/or location perhaps messages also headquarters minesweeping ships assign location mentioning worked often enough try several times crib-based decryption example chosen-plaintext attack plain text effectively chosen british injected ciphertext
Computer security
http flood http flood type distributed denial service ddos attack attacker manipulates http post unwanted requests order attack web server application attacks often use interconnected computers taken aid malware trojan horses instead using malformed packets spoofing reflection techniques http floods require less bandwidth attack targeted sites servers http flood http clients web browser interact application server send http requests request either “ get ” “ post ” aim attack compel server allocate many resources possible serving attack thus denying legitimate users access server resources get request used retrieve static content like images typically induces relatively low load server per request post requests likely require server perform kind processing looking items database therefore http post flood attacks typically impose higher load server per request http flood attacks use standard url requests hence quite challenging differentiate valid traffic one effective mitigation methods combination traffic profiling methods mainly includes identification ip reputation tracking abnormal actions employing progressive sanctuary challenges
Computer security
ffado free firewire audio drivers ffado project provide open-source drivers firewire sound interfaces linux project began freebob driver specifically firewire audio devices based technology made bridgeco use interface named bebob current version allows devices accessed via jack audio connection kit jack following presentation paper 2007 linux audio conference outlining future project march 26 2007 announced project would renamed ffado drivers rewritten include support firewire audio chipsets
Operating systems
computer online forensic evidence extractor computer online forensic evidence extractor cofee tool kit developed microsoft help computer forensic investigators extract evidence windows computer installed usb flash drive external disk drive acts automated forensic tool live analysis microsoft provides cofee devices online technical support free law enforcement agencies cofee developed anthony fung former hong kong police officer works senior investigator microsoft internet safety enforcement team fung conceived device following discussions 2006 law enforcement technology conference sponsored microsoft device used 2,000 officers least 15 countries case cited microsoft april 2008 credits cofee crucial new zealand investigation trafficking child pornography producing evidence led arrest april 2009 microsoft interpol signed agreement interpol would serve principal international distributor cofee university college dublin center cyber crime investigations conjunction interpol develops programs training forensic experts using cofee national white collar crime center licensed microsoft sole us domestic distributor cofee november 6 2009 copies microsoft cofee leaked onto various torrent websites analysis leaked tool indicates largely wrapper around utilities previously available investigators microsoft confirmed leak however spokesperson firm said anticipate possible availability cofee cybercriminals download find ways ‘ build around significant concern device activated plugged usb port contains 150 tools graphical user interface help investigators collect data software reported made three sections first cofee configured advance investigator selecting data wish export saved usb device plugging target computer interface generates reports collected data estimates cited microsoft state jobs previously took 3–4 hours done cofee little 20 minutes cofee includes tools password decryption internet history recovery data extraction also recovers data stored volatile memory could lost computer shut mid late 2009 tool named detect eliminate computer acquired forensics decaf announced uninvolved group programmers tool would reportedly protect computers cofee render tool ineffective alleged would provide real-time monitoring cofee signatures usb devices running applications cofee signature detected decaf performs numerous user-defined processes included cofee log clearing ejecting usb devices contamination spoofing mac addresses december 18 2009 decaf creators announced tool hoax part stunt raise awareness security need better forensic tools
Computer security
cdist cdist free software configuration management tool unix-like systems manages nodes ssh using bourne shell require additional software installed target nodes cdist differentiates competing configuration management systems choosing bourne shell primary language writing configuration scripts requiring effectively dependencies target nodes although cdist core written python interpreter required host machine target nodes cdist development started 2010 eth zurich actively developed maintained primarily nico schottelius steven armstrong major part discussion cdist happens mailinglist irc channel cstar freenode network cdist used various companies switzerland eth zurich oma browser project us germany france cdist zero dependency configuration management system requires ssh bourne-compatible shell target hosts provided default unix-like machines cdist used bootstrap configuration management systems cdist typically installed package like .deb .rpm rather via git commands run created checkout entry point configuration shell script conf/manifest/init called initial manifest cdist terms main components cdist called types bundle functionality types essentially consists number shell scripts define types type reuses code generated executed target host cdist split two components cdist core handles reading configuration communicating remote hosts like ansible cdist uses push model apply configuration changes cdist process host machine connects number remote nodes via ssh performs configuration updates nodes cdist configure multiple hosts parallel reduce time spent configuring configuration scripts define targets shall configured typically written bourne shell consists shell de facto language writing cdist configuration scripts scripts written language contain suitable shebang line shell scripting favored simple access environment variables read files execute system commands user configurable parts contained manifests gencode-scripts shell scripts shell scripts chosen unix system administrators usually proficient reading writing shell scripts furthermore shell also commonly available potential target systems thus avoiding need install additional software zero dependencies cdist reads configuration initial manifest conf/manifest/init hosts mapped types using types cdist called like normal programs manifests make use advanced parameter parsing well reading stdin dependencies expressed setting require environment variable access paths files within types given environment variables like ansible like cdist uses agentless push model configure nodes however ansible normally requires python targets whereas cdist ansible makes distinction roles written declarative yaml-based language modules written python cdist types serve purposes modules roles mostly written bourne shell cdist approach might preferrable shell familiar many system administrators never used configuration management system ansible declarative language arguably readable appropriate
Operating systems
csql csql open source main memory high-performance relational database management system developed sourceforge.net designed provide high performance sql queries dml statements disk i/o in-memory databases provide predictive response time suited real time near real time applications something called datablitz described 1998 project called dbcache done ibm presented 2004 c. mohan configured work transparent cache database management systems mysql postgresql circa 2009 version 3.3 released 2011 promoted company called lakshya bangalore existed 2013
Databases
client honeypot honeypots security devices whose value lie probed compromised traditional honeypots servers devices expose server services wait passively attacked client honeypots active security devices search malicious servers attack clients client honeypot poses client interacts server examine whether attack occurred often focus client honeypots web browsers client interacts servers part client honeypot example ftp ssh email etc. several terms used describe client honeypots besides client honeypot generic classification honeyclient term generally used accepted however subtlety honeyclient actually homograph could also refer first known open source client honeypot implementation see although clear context client honeypot composed three components first component queuer responsible creating list servers client visit list created example crawling second component client able make requests servers identified queuer interaction server taken place third component analysis engine responsible determining whether attack taken place client honeypot addition components client honeypots usually equipped sort containment strategy prevent successful attacks spreading beyond client honeypot usually achieved use firewalls virtual machine sandboxes analogous traditional server honeypots client honeypots mainly classified interaction level high low denotes level functional interaction server utilize client honeypot addition also newly hybrid approaches denotes usage high low interaction detection techniques high interaction client honeypots fully functional systems comparable real systems real clients functional limitations besides containment strategy exist high interaction client honeypots attacks high interaction client honeypots detected via inspection state system server interacted detection changes client honeypot may indicate occurrence attack exploited vulnerability client example change presence new altered file high interaction client honeypots effective detecting unknown attacks clients however tradeoff accuracy performance hit amount system state monitored make attack assessment also detection mechanism prone various forms evasion exploit example attack could delay exploit immediately triggering time bombs could trigger upon particular set conditions actions logic bombs since immediate detectable state change occurred client honeypot likely incorrectly classify server safe even though successfully perform attack client finally client honeypots running virtual machines exploit may try detect presence virtual environment cease triggering behave differently capture high interaction client honeypot developed researchers victoria university wellington nz capture differs existing client honeypots various ways first designed fast state changes detected using event based model allowing react state changes occur second capture designed scalable central capture server able control numerous clients across network third capture supposed framework allows utilize different clients initial version capture supports internet explorer current version supports major browsers internet explorer firefox opera safari well http aware client applications office applications media players honeyclient web browser based ie/firefox high interaction client honeypot designed kathy wang 2004 subsequently developed mitre first open source client honeypot mix perl c++ ruby honeyclient state-based detects attacks windows clients monitoring files process events registry entries integrated capture-hpc real-time integrity checker perform detection honeyclient also contains crawler seeded list initial urls start continue traverse web sites search client-side malware honeymonkey web browser based ie high interaction client honeypot implemented microsoft 2005 available download honeymonkey state based detects attacks clients monitoring files registry processes unique characteristic honeymonkey layered approach interacting servers order identify zero-day exploits honeymonkey initially crawls web vulnerable configuration attack identified server reexamined fully patched configuration attack still detected one conclude attack utilizes exploit patch publicly released yet therefore quite dangerous shelia high interaction client honeypot developed joan robert rocaspana vrije universiteit amsterdam integrates email reader processes email receives urls attachments depending type url attachment received opens different client application e.g browser office application etc monitors whether executable instructions executed data area memory would indicate buffer overflow exploit triggered approach shelia able detect exploits able actually ward exploits triggering spycrawler developed university washington yet another browser based mozilla high interaction client honeypot developed moshchuk et al 2005 client honeypot available download spycrawler state based detects attacks clients monitoring files processes registry browser crashes spycrawlers detection mechanism event based increases passage time virtual machine spycrawler operating overcome rather reduce impact time bombs wef implementation automatic drive-by-download – detection virtualized environment developed thomas müller benjamin mack mehmet arziman three students hochschule der medien hdm stuttgart summer term 2006 wef used active honeynet complete virtualization architecture underneath rollbacks compromised virtualized machines low interaction client honeypots differ high interaction client honeypots utilize entire real system rather use lightweight simulated clients interact server browser world similar web crawlers responses servers examined directly assess whether attack taken place could done example examining response presence malicious strings low interaction client honeypots easier deploy operate high interaction client honeypots also perform better however likely lower detection rate since attacks known client honeypot order detect new attacks likely go unnoticed also suffer problem evasion exploits may exacerbated due simplicity thus making easier exploit detect presence client honeypot honeyc low interaction client honeypot developed victoria university wellington christian seifert 2006 honeyc platform independent open source framework written ruby currently concentrates driving web browser simulator interact servers malicious servers detected statically examining web server ’ response malicious strings usage snort signatures monkey-spider low-interaction client honeypot initially developed university mannheim ali ikinci monkey-spider crawler based client honeypot initially utilizing anti-virus solutions detect malware claimed fast expandable detection mechanisms work started diploma thesis continued released free software gpl phoneyc low-interaction client developed jose nazario phoneyc mimics legitimate web browsers understand dynamic content de-obfuscating malicious content detection furthermore phoneyc emulates specific vulnerabilities pinpoint attack vector phoneyc modular framework enables study malicious http pages understands modern vulnerabilities attacker techniques spybye low interaction client honeypot developed niels provos spybye allows web master determine whether web site malicious set heuristics scanning content clamav engine thug low-interaction client honeypot developed angelo dell'aera thug emulates behaviour web browser focused detection malicious web pages tool uses google v8 javascript engine implements document object model dom important unique features thug activex controls handling module vulnerability module static dynamic analysis capabilities using abstract syntax tree libemu shellcode analyser thug written python gnu general public license yalih yet another low interaction honeyclient low interaction client honeypot developed masood mansoori honeynet chapter victoria university wellington new zealand designed detect malicious websites signature pattern matching techniques yalih capability collect suspicious urls malicious website databases bing api inbox spam folder pop3 imap protocol perform javascript extraction de-obfuscation de-minification scripts embedded within website emulate referer browser agents handle redirection cookies sessions visitor agent capable fetching website multiple locations bypass geo-location ip cloaking attacks yalih also generate automated signatures detect variations attack yalih available open source project minic low interaction client honeypot based wget retriever yara engine designed light fast suitable retrieval large number websites minic allows set simulate referer user-agent accept_language variables minic designed new zealand honeynet chapter victoria university wellington hybrid client honeypots combine low high interaction client honeypots gain advantages approaches honeyspider network hybrid client honeypot developed joint venture nask/cert polska surfnet projects goal develop complete client honeypot system based existing client honeypot solutions crawler specially bulk processing urls
Computer security
http tunnel http tunneling used create network link two computers conditions restricted network connectivity including firewalls nats acls among restrictions tunnel created intermediary called proxy server usually located dmz tunneling also allow communication using protocol normally ’ supported restricted network common form http tunneling standardized http connect method mechanism client asks http proxy server forward tcp connection desired destination server proceeds make connection behalf client connection established server proxy server continues proxy tcp stream client initial connection request http server simply proxies established tcp connection mechanism client behind http proxy access websites using ssl tls i.e https proxy servers may also limit connections allowing connections default https port 443 whitelisting hosts blocking traffic n't appear ssl client connects proxy server requests tunneling specifying port host computer would like connect port used indicate protocol requested connection allowed proxy connected specified host proxy return 2xx success response client proxied remote host data sent proxy server forwarded unmodified remote host client communicate using protocol accepted remote host example client starting ssh communications hinted port number initial connect request http tunnel also implemented using usual http methods post get put delete similar approach used bidirectional-streams synchronous http bosh special http server runs outside protected network client program run computer inside protected network whenever network traffic passed client client repackages traffic data http request relays data outside server extracts executes original network request client response request sent server repackaged http response relayed back client since traffic encapsulated inside normal get post requests responses approach works proxies firewalls
Computer security
windows server 2016 windows server 2016 server operating system developed microsoft part windows nt family operating systems developed concurrently windows 10 first early preview version technical preview became available october 1 2014 together first technical preview system center windows server 2016 released september 26 2016 microsoft ignite conference became generally available october 12 2016 two successors windows server 2019 windows server semi-annual channel excludes graphical user interface many older components windows server 2016 variety new features including microsoft announced new installation option nano server offers minimal-footprint headless version windows server excludes graphical user interface wow64 support 32-bit software windows installer support console login either locally via remote desktop connection management performed remotely via windows management instrumentation wmi windows powershell remote server management tools collection web-based gui command line tools however technical preview 5 microsoft re-added ability administer nano server locally powershell according microsoft engineer jeffrey snover nano server 93 lower vhd size 92 fewer critical security advisories 80 fewer reboots windows server nano server available microsoft software assurance customers cloud computing platforms microsoft azure amazon web services starting new feature release windows server version 1709 nano server installed inside container host microsoft reorganized satya nadella putting server system center teams together previously server team closely aligned windows client team azure team also working closely server team march 2017 microsoft demonstrated internal version server 2016 running armv8-a architecture reported microsoft working qualcomm centriq cavium thunderx2 chips according james vincent verge decision endangers intel dominance server cpu market however later inquiry microsoft revealed version windows server internal use impacts subscribers microsoft azure service public beta version windows server 2016 still called vnext branded windows server technical preview released october 1 2014 technical preview builds aimed toward enterprise users first technical preview first set expire april 15 2015 microsoft later released tool extend expiry date last second tech preview os may 2015 second beta version technical preview 2 released may 4 2015 third preview version technical preview 3 released august 19 2015 technical preview 4 released november 19 2015 technical preview 5 released april 27 2016 windows server 2016 insider preview build 16237 released windows insiders july 13 2017 windows server 2016 officially released microsoft ignite conference september 26 2016 unlike predecessor windows server 2016 licensed number cpu cores rather number cpu sockets—a change similarly adopted biztalk server 2013 sql server 2014 new licensing structure adopted windows server 2016 also moved away windows server 2012/2012r2 cpu socket licensing model amount cores covered one license limited windows server 2016 standard datacenter core licensing covers minimum 8 core licenses physical processor minimum 16 core licenses server core licenses sold packs two standard edition providing familiar rights run 2 virtualized os environments server goes 16 core licenses 2 processor server additional licenses required windows server 2016 windows server 2016 technical preview released october 1 2014 first beta version operating system made publicly available version number 6.4.9841 windows server 2016 technical preview 2 made available may 4 2015 version number 10.0.10074 similar jump significant part version number 6 10 seen windows 10 highlights version include third technical preview windows server 2016 made available august 19 2015 version number 10.0.10514 highlights version include fourth technical preview operating system made available november 19 2015 one year one month initial technical preview version number 10.0.10586 highlights include last technical preview windows server 2016 made available april 27 2016 version number 10.0.14300 highlights include windows server 2016 released manufacturing september 26 2016 bearing version number 10.0.14393 windows 10 anniversary update microsoft added following final touches windows server version 1709 based windows 10 fall creators update released october 17 2017 release dropped windows server 2016 name called windows server microsoft offered microsoft software assurance customers active windows server 2016 license system requirements first windows server product fall semi-annual channel sac release cadence product features server core nano server modes two server core mode os installed bare system nano server mode available operating system container windows server version 1803 based windows 10 april 2018 update second semi-annual channel release windows server also final version branched server 2016 codebase next release shares version number 1809 windows server 2019
Computer architecture
ext2fsd ext2fsd short ext2 file system driver free installable file system driver written c microsoft windows operating system family facilitates read write access ext2 ext3 ext4 file systems driver installed windows 2000 windows xp windows server 2003 windows vista windows 7 windows 8 windows 10 windows server 2008 windows server 2008 r2 support windows nt dropped version 0.30 program ext2mgr optionally installed additionally manage drive letters april 2019 main web site ext2fsd.com gone dark german computer magazine pc-welt reported frequent program crashes 2009 program able access ext3 partitions smoothly often led blue screen crashes type lead data loss example yet permanently stored data main memory program could access ext2 partitions without errors 2012 computerwoche warned access ext3 partitions harmless data loss may occur warning issued release version 0.69 n't use ext2fsd 0.68 earlier versions latest ubuntu debian systems ext2fsd 0.68 process ext4 64-bit mode enabled could corrupt data sorry disaster issue 'm working improvement unclear whether v0.69 corrects deficiency
Computer file systems
coldfusion markup language coldfusion markup language commonly known cfml scripting language web development runs jvm .net framework google app engine multiple commercial open source implementations cfml engines available including adobe coldfusion lucee new atlanta bluedragon offer java-based .net-based version railo open bluedragon well cfml server engines simplest form like many web scripting languages cfml augments standard html files database commands conditional operators high-level formatting functions elements produce web applications cfml also includes numerous constructs including coldfusion components cfcs cfml version objects allow separation business logic presentation cfml written using either tags cfscript resembles javascript ecma script pages cfml application include server-side cfml tags functions addition html tags modern cfml applications also tend cfcs accessed cfml pages executing business logic web browser requests page coldfusion application automatically pre-processed coldfusion application server cfml also used generate languages aside html xml javascript css despite name cfml markup language also sgml since certain core cfml features prevent complying cfml engine configured way certain file extensions server .cfm .cfc handed cfml engine processing case java-based engines accomplished via java servlets cfml engine processes cfml tags functions returns text outside cfml tags functions web server unchanged named cold fusion outset software created 1995 allaire corporation originally located minnesota later moved cambridge massachusetts finally newton massachusetts acquired macromedia 2001 allaire cold fusion thus became macromedia cold fusion release version 4 space name removed become coldfusion adobe acquired macromedia 2005 still actively developing coldfusion 1998 alan williamson scottish company n-ary began creating templating engine java simplify common programming tasks williamson using curly-brace notation instead tags saw example cfml solving similar problems although java using tag syntax started developing would eventually become bluedragon first java implementation cfml language coldfusion written c c++ version 6.0 — first java-based version coldfusion — released 2002 new atlanta licensed bluedragon around 2001 made available commercial product eventually creating .net implementation cfml open bluedragon fork commercial bluedragon product first released 2008 railo cfml engine began student project 2002 first launched commercial project 2005 railo announced making engine open source 2008 first open source version released 2009 june 18 2009 adobe announced cfunited conference formed cfml advisory committee would responsible guiding reviewing changes cfml language effort disbanded 2010 google group cfml conventional wisdom created forum open public discussions language engine features use dwindled since 2011 2012 opencfml foundation launched function push open-source cfml applications platforms former railo lead developer michael offner launched lucee fork railo london january 29 2015 backed community supporters members lucee association goal project provide functionality cfml using fewer resources giving better performance move cfml past roots modern dynamic web programming platform cfml tags similar format html tags enclosed angle brackets generally zero named attributes though tags e.g cfset cfif contain expression rather attributes many cfml tags bodies beginning end tags text processed example tags cfset cfftp never bodies required information goes beginning character ending character form tag attributes name/value pairs example legal tags body syntactically acceptable leave unclosed first example though many cfml developers choose self-close tags second example arguably make code legible even tag body including body may necessary instances attributes specify required information cases second example end tag hence tag body may omitted tag may self-closing following example various tags offer ability type-check input parameters e.g cffunction cfparam cfqueryparam programmer declares type specifically functionality used cfqueryparam secure web applications databases hackers malicious web requests sql injection nearly 100 tags many functions make heart cfml language following lists cfml tags function purpose cfml allows language extensions form custom tags tags created developer part cfml language custom tags regular cfml files intended invoked tags although possible treat template custom tag regular template custom tags written cfml typically invoked prefixing custom tag file name cf_ although ways invoke custom tags template invoked custom tag attributes used invoke tag available within tag attributes scope variables calling page accessible via caller scope example writing custom tag perform addition taking two attributes adding together tag would addition.cfm file could look like assuming tag directory file pre-defined customtags directory invoked thus cfx tags custom tags developed using java c++ prefixed cfx_ like cf_ java c++ tags added cfml runtime environment using cfml engine administrator editing configuration files cfml engines jsp tags also included cfml pages using cfimport tag coldfusion markup language includes set functions use perform logical arithmetic operations manipulate data cfcs provide typical features functionality provided object-oriented oop languages create cfc cfcs plain cfml within cfc cfml tag function custom tag components etc may used cfcs used various ways method contained cfc simply needs invoked cfinvoke tag create instance cfc invoke desired method destroy instance cfc cfinvoke takes name component minus .cfc extension method execute access returned data returnvariable attribute provides name variable contain whatever function returns cfcs created using four tags saved .cfc files invoked using cfinvoke tag example component temperature.cfc method ftoc converts temperature fahrenheit celsius test.cfm template invokes method converts 212 degrees fahrenheit outputs result cfcs may also instantiated objects assuming cfc file called person.cfc instance cfc would instantiated follows cfcs also form basis ability create web services cfml cfc created usual way attribute access= remote added function within cfc make function available called soap-based web service cfml engine auto-generates wsdl creates necessary stubs web service function
Programming language topics
qualcomm centriq centriq brand system chip soc semiconductor products designed marketed qualcomm data centers centriq central processing unit cpu uses arm risc instruction set multiple cpu cores single chip november 2014 qualcomm announced developing arm armv8-a microarchitecture based cpu purpose-built data centers december 2016 company announced demonstrated first multi-core cpus based custom arm armv8-a microarchitecture first centriq 2400 series products made available server manufacturers november 2017 first products qualcomm introduced falkor armv8-a microarchitecture chip 48 qualcomm custom designed falkor cores 2.6ghz six-channel ddr4 memory 60 mb l3 cache number reviews noted release centriq expected face significant competition established x86-64 data-center cpu manufacturers intel amd arm microarchitecture server products cavium thunderx2 addition competitive pressures noted running established workloads arm microarchitectures requires re-optimizing recompiling software x86-64 emulation presenting barrier entry potential customers
Computer architecture
north american chapter association computational linguistics north american chapter association computational linguistics naacl provides regional focus members association computational linguistics acl north america well central south america organizes annual conferences promotes cooperation information exchange among related scientific professional societies encourages facilitates acl membership people institutions americas provides source information regional activities acl executive committee naacl hosts annual professional conference north american city alternating years acl holds annual conference elsewhere current officers naacl include owen rambow chair lillian lee secretary christopher manning treasurer graeme hirst past chair
Computational linguistics
web2grid web2grid project aims support web 2.0 communities dynamically building necessary infrastructure needed processing high-end tasks community way content generated joint effort members web2grid technology enables community build required infrastructure joint community effort exploiting volunteer computing resources community members order achieve goal web2grid exploits sztaki desktop grid boinc 3g bridge technologies developed eu fp7 edges enabling desktop grids e-science eu fp7 edgi european desktop grid initiative projects project started 2009 technically coordinated prof. peter kacsuk head laboratory parallel distributed systems lpds mta-sztaki hungary web2 technologies assist assure resources desktop grid community voluntary settlement bases developed platform extended desktop grid systems offers back-end infrastructure operational requirements web2 portals systems combining web2 desktop grid technologies web2 extend capabilities community contents towards shared services help grid technologies project aims develop tools interfaces methodologies above-mentioned targeted services established closed local desktop grid open global desktop grid environments three main blocks project grid web2 connections two technologies last decades grid systems offered large-scale distributed computing storage services mainly academic university research area focus shifting towards services knowledge sharing extension application domain standardized access methods eliminating system heterogeneity grid point view project relies results eu fp7 supported edges enabling desktop grids e-science infrastructure project desktop grids system often based community offerings similar web2 content building solution edges project important grid/web2 integration web2grid project also extends edges technologies towards direction commercial grids web2 services owner server provides service framework real content shared maintained users generally due large number connections users web2 systems handle heavy data traffic complex relations may needs large computational power many cases web2 side numerous application topics large capacity solved grid technologies connection web2 grid realized well defined low-level application development interface api high-level graphical application development solutions project partners web2 applications come various fields justifies need development multi-level interfaces project benefits numerous eu fp6 eu fp7 project achievements connecting web2 communities grid technologies project aims achieve various social economical goals including following partners participate project
Distributed computing architecture
netbarrier x4 netbarrier x4 discontinued version intego netbarrier line firewall os x features cookie cleaner browser history cleaner internet traffic statistic internet bandwidth meter cookie filters information hiding firewall customizable already configured options restrictions network client local server server client customized customized option allows flexible firewall configuration netbarrier features integrated virusbarrier x6 longer sold standalone product
Computer security
bluedragon bluedragon coldfusion markup language cfml engine comparable adobe systems coldfusion licensed distributed new atlanta tagservlet ltd based scotland bluedragon also distributed supported bea systems oracle weblogic server server platform bluedragon applications run variety platforms including microsoft windows linux mac os x mostly compatible coldfusion mx 7 march 2008 new atlanta announced future versions bluedragon java ee editions would released open source products open source version released open bluedragon openbd december 2008 bluedragon available six editions first two editions standalone servers run windows linux os x bd j2ee cfml applications deployed j2ee server enabling integration cfml j2ee enabled coldfusion mx bd bea weblogic edition special edition based bd j2ee use bea weblogic server bd.net extends microsoft .net framework iis permit deployment cfml applications native ms .net web applications offering integration cfml asp.net possible coldfusion server jx j2ee ms .net bea weblogic editions bluedragon commercial products available 30-day unlimited trials convert single-ip developer edition expiration server edition hand free deployment—though hosting redeployment 6.2 release commercial use differences cfml tags supported free server edition supports odbc drivers ms windows mysql postgresql linux mac os x supports iis ms windows apache linux mac os x support secured ssl connections none limitations free server edition exist commercial server jx j2ee .net bea weblogic editions .net edition bluedragon runs microsoft .net platform bd.net enables cfml applications leverage .net platform allows integration cfml asp.net well .net objects open bluedragon open source version bluedragon released gnu general public license version 3 gplv3 chief differences open source j2ee version removal commercial libraries e.g. pdf generation jturbo jdbc driver microsoft sql server bluedragon administrator application runs standard j2ee application server tomcat jboss jetty original version bluedragon released 2002 myspace used .net version bluedragon power online applications 2007 though bluedragon 7.0 designed compatible adobe coldfusion mx 7.0.2 differences two cfml implementations bluedragon offers several advantages tags functions functionality found coldfusion similarly tags functions found coldfusion supported currently bluedragon new atlanta maintains complete list incompatibilities adobe coldfusion mx documentation number popular coldfusion frameworks fully supported bluedragon list useful resources developers see coldfusion development aids section
Programming language topics
page address register page address register par contains physical addresses pages currently held main memory computer system pars used order avoid excessive use address table operating systems par may check page number entries par simultaneously allowing retrieve pages physical address quickly par used single process used pages frequently referenced though pages may change process behaviour changes accordance principle locality example computer made use pars atlas
Operating systems
weplab weplab tool designed teach wired equivalent privacy wep wireless encryption protocol works explain security vulnerabilities protocol demonstrate attacks used compromise wep protected wireless network weplab designed crack wep keys analyze wireless security network educational point view author attempted make source code clear possible instead implementing optimizations would obfuscate weplab works unix-like systems like gnu/linux *bsd mac os x cygwin layer windows weplab tries break wep key using several known attacks
Computer security
windows ce 5.0 windows ce 5.0 codenamed macallan magellan brand gps units run successor windows ce 4.2 third release windows ce .net family first released july 9 2004 like predecessors windows ce 5.0 marketed towards embedded device market independent device vendors windows ce 5.0 billed low-cost compact fast-to-market real-time operating system available x86 arm mips superh microprocessor-based systems windows ce 5.0 builds previous windows ce releases adoption shared source since 2001 microsoft steadily expanding available windows ce source tree embedded system developers windows ce 5.0 open microsoft operating system date though system available shared source agreements developers freedom modify kernel level without need share changes microsoft competitors windows ce 5.x base os windows mobile 6.0 6.1 6.5 x86 platform windows ce 5.0 competes microsoft embedded operating systems windows xp embedded predecessor windows nt embedded platform builder ide windows ce 5.0 last builder tool available standalone product windows ce 5.0 currently available device emulator according microsoft windows ce preferable windows xp embedded situations demanding wireless multimedia requirements need met following primary considerations “ choosing right version ” also difference cost
Computer architecture
game oriented assembly lisp game oriented assembly lisp goal programming language dialect language lisp made video games developed andy gavin jak daxter team company naughty dog written using allegro common lisp used development entire jak daxter series games syntactically goal resembles lisp dialect scheme though many idiosyncratic object-oriented programming features classes inheritance virtual functions goal encourages imperative programming style programs tend consist sequence events executed rather functional programming style functions evaluated recursively diversion scheme allows side effects encourage imperative style goal run interpreter instead compiled directly playstation 2 machine code execute offers limited facilities garbage collection relying extensively runtime support offers dynamic memory allocation primitives designed make well-suited running constant memory video game console goal extensive support inlined assembly language code using special codice_1 form allowing programs freely mix assembly higher-level constructs within one function goal compiler implemented allegro common lisp supports long term compiling listener session gives compiler knowledge state compiled thus running program including symbol table addition dynamic linking allows function edited recompiled uploaded inserted running game without restart process similar edit continue feature offered c++ compilers allows programs replace arbitrary amounts code even entire object files interrupt running game debugger feature used implement code level streaming jak daxter games goal first use game predecessor language game oriented object lisp gool also developed andy gavin crash bandicoot game since naughty dog longer employs goal primary development maintenance engineer pressure new parent company sony share technology studios naughty dog transitioned away lisp however since resumed using scripting playstation 3 games including last us
Programming language topics
rogue access point rogue access point wireless access point installed secure network without explicit authorization local network administrator whether added well-meaning employee malicious attacker although technically easy well-meaning employee install soft access point inexpensive wireless router—perhaps make access mobile devices easier—it likely configure open poor security potentially allow access unauthorized parties attacker installs access point able run various types vulnerability scanners rather physically inside organization attack remotely—perhaps reception area adjacent building car park high gain antenna even several miles away prevent installation rogue access points organizations install wireless intrusion prevention systems monitor radio spectrum unauthorized access points presence large number wireless access points sensed airspace typical enterprise facility include managed access points secure network plus access points neighborhood wireless intrusion prevention system facilitates job auditing access points continuous basis learn whether rogue access points among order detect rogue access points two conditions need tested first two conditions easy test—compare wireless mac address also called bssid access point managed access point bssid list however automated testing second condition become challenging light following factors need cover different types access point devices bridging nat router unencrypted wireless links encrypted wireless links different types relations wired wireless mac addresses access points soft access points b necessity determine access point connectivity acceptable response time large networks c requirement avoid false positives negatives described false positives occur wireless intrusion prevention system detects access point actually connected secure network wired rogue frequent false positives result wastage administrative bandwidth spent chasing possibility false positives also creates hindrance enabling automated blocking wired rogues due fear blocking friendly neighborhood access point false negatives occur wireless intrusion prevention system fails detect access point actually connected secure network wired rogue false negatives result security holes unauthorized access point found connected secure network rogue access point first kind also called “ wired rogue ” hand unauthorized access point found connected secure network external access point among external access points found mischievous potential risk e.g. whose settings attract already attracted secure network wireless clients tagged rogue access point second kind often called evil twin soft access point soft ap set wi-fi adapter using example windows virtual wi-fi intel wifi makes possible without need physical wi-fi router share wired network access one computer wireless clients connected soft ap employee sets soft ap machine without coordinating department shares corporate network soft ap becomes rogue ap
Computer security
pooyan pooyan ported atari 2600 atari 8-bit family tandy color computer 2 commodore 64 sord m5 msx apple ii tandy trs-80 tomy tutor pv-1000 famicom player controls mama pig whose babies kidnapped pack wolves must rescue using bow arrow slabs meat controls consist two-position up/down joystick moves elevator mama pig rides button fires arrows throws meat level consists two rounds first wolves descend slowly high ledge using balloons player must shoot order drop ground wolves reach ground safely climb set ladders behind elevator try eat mama pig moves front second round wolves start ground inflate balloons order ascend cliff boulder resting push toward edge airborne wolves throw rocks rounds trying hit mama pig addition balloon carrying last boss wolf second round must shot several times order defeat reaches cliff player must defeat additional enemies facing boss slab meat occasionally appears top elevator range motion picking allows player throw distracting wolves on/near trajectory causing let go balloons crash ground bonus points stray balloons dropped fruits also shot extra points every second round bonus screen played first screen requires player defeat group wolves using meat second awards points shooting fruits thrown wolves two screens alternate level player loses one life mama pig hit rock eaten wolf ladders first round crushed boulder many wolves reach cliff push edge second round lives lost game ends game starts day met bear heard opening scene wolves kidnap mama babies first stage theme bears slight resemblance main theme music frogger another konami arcade game song part desecration rag operatic nightmare felix arndt portion mimics beginning antonín dvořák humoresque opus 101 number 7 second stage cleared second time part oh susanna heard pooyan included compilation disc konami 80 arcade gallery playstation emulated version game released 2006 playstation 2 japan part oretachi geasen zoku sono -series famicom port released virtual console japan series extra ops known pooyan missions involves shooting fulton surface-to-air recovery balloons carrying abducted soldiers air sound effects music arcade game used throughout mission largely identical bootleg sold name pootan david hanzman rochester ny usa scored world record 1,609,250 points arcade version pooyan december 16 1983
Computer architecture
asf+sdf meta environment asf+sdf meta-environment ide toolset interactive program analysis transformation combines sdf syntax definition formalism asf algebraic specification formalism technologies features components toolbus component interconnection architecture somewhat like d-bus corba based process algebra formalism aterms generic data representation format efficient terms resource usage due maximal subterm sharing automatic garbage collection used throughout tools toolset apis provided c java developers use applications
Programming language topics
gnustep renaissance gnustep renaissance development framework reads xml descriptions graphical user interfaces application bundle converts native widgets connections runtime either gnustep mac os x. gnustep renaissance written nicola pero alternative nib gorm files used interface builder gorm respectively unlike aforementioned formats renaissance generate interfaces run without modification either gnustep mac os x also uses feature called autolayout means localized strings manually resized january 2006 gnustep renaissance beta software graphical frontend renaissance yet exist stable release made since 2008 though downloadable binary rebuilt still previous version simple example interface specification assuming file application bundle named sample.gsmarkup loaded following objective-c code
Operating systems
ksplice ksplice open-source extension linux kernel allows security patches applied running kernel without need reboots avoiding downtimes improving availability technique broadly referred dynamic software updating ksplice supports patches make significant semantic changes kernel data structures ksplice implemented linux ia-32 x86-64 architectures developed ksplice inc. 21 july 2011 oracle acquired ksplice started offering support oracle linux support red hat enterprise linux dropped turned free 30-day trial rhel customers incentive migrate oracle linux premier support time use oracle unbreakable enterprise kernel uek became requirement using ksplice production systems ksplice available free desktop linux installations official support available fedora ubuntu linux distributions ksplice takes input unified diff original kernel source code updates running kernel memory using ksplice require preparation system originally booted running kernel needs special prior compiling example order generate update ksplice must determine code within kernel changed source code patch ksplice performs analysis executable linkable format elf object code layer rather c source code layer apply patch ksplice first freezes execution computer program running system verifies processors middle executing functions modified patch ksplice modifies beginning changed functions instead point new updated versions functions modifies data structures memory need changed finally ksplice resumes processor running left fully automatic ksplice design originally limited patches introduce semantic changes data structures since linux kernel security patches make kinds changes evaluation linux kernel security patches may 2005 may 2008 found ksplice able apply fixes 64 significant kernel vulnerabilities discovered interval 2009 major linux vendors asked customers install kernel update per month patches introduce semantic changes data structures ksplice requires programmer write short amount additional code help apply patch necessary 12 updates time period ksplice software created four mit students based jeff arnold master thesis later created ksplice inc. around may 2009 company mit 100k entrepreneurship competition cyber security challenge global security challenge whereas ksplice software provided open source license ksplice inc. provided service make easier use software ksplice inc. provided prebuilt tested updates red hat centos debian ubuntu fedora linux distributions virtualization technologies openvz virtuozzo also supported updates ubuntu desktop fedora systems provided free charge whereas platforms offered subscription basis 21 july 2011 oracle corporation announced acquired ksplice inc. time company acquired ksplice inc. claimed 700 companies using service protect 100,000 servers service available multiple linux distributions stated time acquisition oracle believes enterprise linux provider offer zero downtime updates explicitly oracle plan support use ksplice technology red hat enterprise linux existing legacy customers continue supported ksplice new customers accepted platforms ksplice available free fedora ubuntu january 2016 ksplice integrated oracle unbreakable enterprise kernel release 4 oracle linux 6 7 oracle redistribution red hat enterprise linux
Operating systems
linux spike trojan malware linux spike trojan malware widely known mrblack type malware infects routers eventually spreads routers incapsula internet security firm first saw malware december 2014 tool prone attack devices still use default credentials bot type malware allows attacker take control affected computer also known web robots bots usually part network infected machines known botnet typically made victim machines stretch across globe router infected attack injects malware order configure ddos attacks used mitm attacks cookie hijacking attacks targeted router infected mrblack regarded one widespread malware varieties infecting forty thousand routers
Computer security
socket 1 socket 1 originally called overdrive socket second series standard cpu sockets created intel various x86 microprocessors inserted upgrade intel first standard 168-pin pin grid array pga socket first official designation socket 1 intended 486 upgrade socket added one extra pin prevent upgrade chips inserted incorrectly socket 1 169-pin low insertion force lif zero insertion force zif 17×17 pin grid array pga socket suitable 5-volt 16 33 mhz 486 sx 486 dx 486 dx2 486 overdrive processors
Computer architecture
time pilot time pilot 夕イム・パイ口ツ卜 multidirectional shooter designed yoshiki okamoto released arcades konami 1982 distributed united states centuri engaging aerial combat player-controlled jet flies across open airspace scrolls indefinitely directions level themed different time period home ports atari 2600 msx colecovision released 1983 sequel time pilot '84 released arcades 1984 top view instead side view allows player shoot guided missiles drops time travel motif instead takes place science fiction-themed landscape player assumes role pilot futuristic fighter jet trying rescue fellow pilots trapped different time eras level player must fight hordes enemy craft defeat much stronger enemy ship player plane always remains center screen 56 enemy craft defeated mothership time period appears destroyed player time-travels next level level parachuting pilot occasionally appear rescuing pilot initially award 1,000 points increase 1,000 points consecutive rescue maximum 5,000 award reset 1,000 points upon losing life advancing level enemy formations appear level formations heralded series quick tones 2,000 points awarded entire formation destroyed within approximately 3 seconds extra lives usually given 10,000 per 50,000 scored thereafter first four levels common enemies motherships fire yellow bullets similar white bullets fired player except travel rather slowly 1910 level biplanes fire bombs addition yellow bullets bombs resemble tin cans initially fired upward accelerate downward moving faster fall bottom screen paths simulate gravity following parabolic trajectory thrown object despite fact player fly downward indefinitely never reach ground time gravity present 1940 planes slimmer biplanes blend background making tougher target level also features red-and-yellow supply planes fly horizontally across screen require multiple hits destroy fire player pose threat long player crash helicopters 1970 smaller airplanes fire bullets well homing missiles missiles travel faster player make sharp turns player destroy missiles shooting avoid turning sharply jets 1982 resemble player craft aggressive making easier player collide fire homing missles helicopters meaning typically missiles screen given time 1982 1970 2001 action shifts outer space enemies flying saucers saucers fire fast-travelling circular bullets blend background asteroids screen hurt player serve camouflage enemies missiles saucers bullets missiles shot destroyed according account yoshiki okamoto proposal time pilot initially rejected boss konami assigned okamoto work driving game instead okamoto secretly gave instructions programmer work idea pretending working driving game front boss fury 1983 clone computer shack trs-80 color computer two unrelated clones name released 1984 kingsoft space pilot commodore 64 superior software space pilot bbc micro remake game rumored works nintendo 64
Computer architecture
multikernel multikernel operating system treats multi-core machine network independent cores distributed system assume shared memory rather implements inter-process communications message-passing
Computer architecture
pssc labs pssc labs california-based company provides supercomputing solutions united states internationally products include high-performance servers clusters workstations raid storage systems scientific research government military entertainment content creators developers private clouds company implemented clustering software nasa goddard beowulf project supercomputers designed bioinformatics medical imaging computational chemistry scientific applications pssc labs founded 1984 larry lesser 1998 manufactured aeneas supercomputer dr. herbert hamber university california irvine physics astronomy department based linux maximum speed 20.1 gigaflops 2001 company developed cbest software packages utilities custom scripts used ease cluster administration process 2003 company released third version cluster management software support 32-bit 64-bit amd intel processors linux kernel open source tools 2005 pssc labs demonstrated new water-cooling technology high-performance computers acm/ieee supercomputing conference seattle washington 2007 company focused supercomputer development life sciences researchers announced technological solution full-genome data analysis including assembly read mapping analysis large amounts high-throughput dna rna sequencing data 2008 pssc labs designed powerserve quattro i/a 4000 supercomputer genome sequencing 2013 released cloudoop server platform big data analytics hadoop server offers 50tb storage space 1ru company joined cloudera partner program following year certified cloudoop 12000 2014 compatible cloudera enterprise 5 year mapr started using cloudoop 12000 platform record setting time series data base ingestion rate company joined hortonworks partner program 2015 company cloudoop 12000 certified compatible hortonworks hdp 2.2
Distributed computing architecture
ultima iii exodus ultima iii exodus third game series ultima role-playing video games exodus also name game principal antagonist final installment age darkness trilogy released 1983 first ultima game published origin systems originally developed apple ii exodus eventually ported 13 platforms including nes/famicom remake ultima iii revolves around exodus spawn mondain minax ultima ultima ii respectively threatening world sosaria player travels sosaria defeat exodus restore world peace ultima iii hosts advances graphics particularly animation adds musical score increases player options gameplay larger party interactivity game world ultima iii followed 1985 exodus featured revolutionary graphics time one first computer rpgs display animated characters also exodus differs previous games players direct actions party four characters rather one regular play characters represented single player icon move one however battle mode character represented separately tactical battle screen player alternates commands character order followed enemy character turn differs two previous games ultima series player simply depicted trading blows one opponent main map either defeated enemies overworld map seen least temporarily avoided enemies dungeons appear randomly without forewarning party four player uses chosen beginning game choice 11 classes fighter paladin cleric wizard ranger thief barbarian lark illusionist druid alchemist player also chooses among five races human elf dwarf bobbit fuzzy players assign points statistics strength dexterity intelligence wisdom races determine limitations maximum stat growth thus case intelligence wisdom maximum spellcasting ability character classes differ terms fighting skill magical abilities thieving abilities varying degrees proficiency fighters example use weapons armor lack thieving magic abilities clerics use maces chain armor clerical spells alchemists use daggers cloth armor half wizard spells half thieving abilities character begins level 1 increases individually maximum effective level characters 25 beyond point level continue increase however number hit points fixed 2550 maximum hit points character calculated following formula hp 100 l 50 l current level character character gained enough experience points must transact lord british character level aside ability talk townspeople commands used commands player use bribe steal fight bribing used make certain guards go away post steal used townspeople enemies result conflict townspeople caught player choose fight townsperson prompt guards chase characters always come parties eight difficult defeat also choose fight lord british killed thus resulting long drawn-out fight player ultimately lose lord british temporarily killed cannon fire ship castle moat exiting re-entering castle restores unlike two previous ultima games wire-frame first-person dungeons exodus dungeons solid-3d appearance integrated game plot dungeons necessary obtain certain marks needed finish game dungeon 8 levels deeper level challenging enemies note monsters spawned dungeons based character level overworld monsters rather based dungeon level encountered going deep certain dungeons may hard characters early stages game one find many chests gold weapons armor inside dungeons many trapped aside chests marks one find fountains dungeons heal cure poison peering gems allows see map given dungeon level torches light-casting spells necessary able see inside dungeons three modes travel game foot horseback boat getting around foot slow often lead monsters catching horseback gives advantage moving faster consuming less food making getting away unwanted fights easier getting boat requires players reach certain level pirate ships begin appearing pirate ship defeated boat belongs player obtaining boat necessary order visit island ambrosia reach exodus thus win game denying player ability see behind mountain peaks forests walls overland maps contain many small surprises hidden treasure secret paths out-of-the-way informants look game longer based certain characteristics apple ii hardware rather carefully designed screen layout beating game requires player get four marks four prayer cards get altar exodus insert cards particular order thus defeat exodus set earth story exodus returns player sosaria world game named chief villain exodus creation minax mondain series later describes neither human machine although demonic figure appears cover game exodus turns something like computer possibly artificial intelligence defeat player acquire four magic punch cards insert mainframe specific order beginning game exodus terrorizing land sosaria stronghold isle fire player summoned lord british defeat exodus embarks quest takes lost land ambrosia depths dungeons sosaria receive powerful magical branding marks find mysterious time lord finally isle fire confront exodus lair game ends immediately upon exodus defeat unlike many games genre exodus simply killed battle strong party adventurers puzzle-solving paying attention clues given throughout game end game players instructed report thy victory origin received certificate completion autographed richard garriott although last game series take place sosaria places game ambrosia isle fire make appearances later games ultima vii ultima online ultima iii first game series published richard garriott company origin systems ports appeared many different systems 120,000 copies ultima iii sold video magazine listed game seventh list best selling video games march 1985 ii computing listing fifth magazine list top apple ii games late 1985 based sales market-share data exodus credited game laid foundation role-playing video game genre influencing games dragon quest final fantasy turn exodus influenced wizardry richard garriot credited inspiration behind party-based combat game computer gaming world stated february 1994 exodus game became known ultima hundreds thousands cartridge gamers softline stated ultima iii far surpasses predecessors praising masterfully unified plot individual tactical combat magazine concluded game upgrades market several ways sets new standards fantasy gaming state art happily also shows us maturing artistic discipline part imaginative author computer gaming world scorpia 1983 called ultima iii unquestionably best series far ... many hours enjoyment frustration although criticized ending anticlimactic magazine patricia fitzgibbons 1985 reviewed macintosh version complimented graphics criticized audio stated game adequately use computer user interface describing using mouse aggravating fitzgibbons concluded even though mac conversion far ideal ultima iii enjoyable game well worth hefty price 1993 scorpia stated ultima iii best first trilogy surprisingly quiet nonviolent defeat villain presaged later games resolutions less combative spirit magazine stated february 1994 exodus really first ultima coherent plot beyond typical dungeon romp compute 1984 stated ultima iii ushers exciting new era fantasy role-playing combination superb graphics music excellent playability makes exodus modern-day masterpiece noted cloth map extensive documentation thrilling 3-d dungeons game use time spell system magazine concluded lord british outdone latest work art ... delight play info stated lord british latest offering also best ... many wonderful hours spent unravelling secrets magazine gave amiga version four stars compared five stars 64 version stating graphics user interface could better amiga-tized chicago tribune called ultima iii one best computer games providing epic adventure last months famitsu reviewed 1987 famicom remake scored 32 40 1984 softline readers named game third most-popular apple eighth most-popular atari program 1983 adventure game year prize computer gaming world nowiki /nowiki 1985 reader poll editors wrote although ultima iii well year feel still best game kind score 7.55 10 1988 ultima iii among first members computer gaming world hall fame honoring games rated highly time readers 1996 magazine ranked 144th best game time featuring one nastiest villains grace computer screen demon figure appeared front box caused religious fundamentalists protest made accusations game corrupting youth america encouraging satan worshiping along factors led richard garriott develop next game based virtues ultima series became famous
Computer architecture
dejagnu dejagnu framework testing programs main script called runtest goes directory looking configuration files runs tests given criteria purpose dejagnu package provide single front end tests part gnu project licensed gpl based expect turn based tcl current maintainers rob savoye ben elliston dejagnu strong history testing due tcl base tcl used extensively companies oracle sybase test products dejagnu allows work much structured tests grouped according tool testing test run merely calling root project directory look directory folders starting run .exp files folder one field dejagnu particularly well suited embedded system design allows testing done remotely development boards separate initialization files created operating system board mainly focuses embedded targets remote hosts dejagnu thus popular many gnu projects universities private companies essential files files set tool apache run tests apache
Programming language topics
fusebox programming fusebox web application framework cfml php originally released 1997 final version 5.5.2 released may 2012 january 2012 rights fusebox transferred teratech team five developers removed rights placed framework hands community fusebox intended easy learn provide benefits helping developers structure code set simple conventions fusebox also allowed advanced developers build large applications leveraging design patterns object-oriented programming techniques wish fusebox provided web application developers standardized structured way developing applications using relatively straightforward easy learn set core files encouraged conventions addition framework fusebox became closely associated web application development methodology developed proponents known flip fusebox lifecycle process many people refer fusebox methodology fact development framework flip however methodology framework ported used asp jsp lasso perl/cgi php well though cfml php versions fusebox versions gain momentum fusebox dealt primarily effort wiring together view states pages controller actions form submits etc front-end business-logic tier framework address creating maintaining business logic database interaction service layers original concepts behind fusebox based household idiom electrical fusebox controls number circuits one fuse fusebox web application requests routed single point usually codice_1 cfml processed fusebox core files application divided number circuits usually sub-directories intended contain related functionality circuit application divided small files called fuses perform simple tasks fusebox considered implementation front controller common design pattern urls within fusebox web application usually form codice_2 codice_3 name circuit codice_4 xml-defined method within circuit known fuseaction query-string variable name fuseaction vary depending configuration parameters applications using fusebox need use action variable fuseaction fusebox encourages enforce separation presentation logic business logic uses number file naming conventions encourage separation presentation files begin dsp display lay layout database access files begin qry query general business files begin act action typical file names format prefix filename like dsp_loginform.cfm additional naming conventions used fusebox developers common ones another concept fusebox encourages parameterize exit points web page coding variables set circuit control file exit points known xfas exit fuseactions idea parameterizing exit points web page flow control updated easily allowing reuse web pages fragments thereof associated framework strictly part concept fusedocs semi-formalized form documentation written xml specifies inputs outputs fuse file third-party tools available use fusedocs things like generate test harness code fusebox several major revisions years fusebox 3 control files written underlying programming language e.g. fbx_switch.cfm cfml fusebox 4 later versions use xml control files fusebox.xml circuit.xml framework components written using underlying programming language e.g fusebox5.cfm cfml theory helps improve tool support framework also allowed pre-parsing generation single template processing fuseaction greatly increasing performance fusebox 5.5 allows xml files omitted certain conventions followed fusebox 1 grew conversation cf-talk mailing list april 1998 steve nelson gabe roffman credited creating original fusebox though first fusebox program written josh cyr methodology constantly evolving beyond whitepaper handful examples official documentation existed developers exposed fusebox early days craig girard steve nelson along hal helms nat papovich wrote book fusebox methodology techniques published 2000 fusion authority programmers followed practices described book said fusebox 2 hal helms built upon fusebox 2 called ideas extended fusebox xfb fusebox 3 written primarily hal helms john quarto-von tivadar nat papovich effort leading members fusebox community incorporate xfb ideas reusable library known core files simple api allowed application code communicate core files upon release fall 2001 fusebox became framework rather methodology subsequent 3.01 release addressed minor issues fusebox 3 something sea-change fusebox 2 original principles remained relatively unchanged fusebox 2 fusebox 3 application structured differently fusebox 4 complete rewrite fusebox 3 license core files open source held private company owned hal helms john quarto-von tivadar fusebox corporation appears defunct corporation fusebox 4.1 introduced new xml grammar elements beyond available 4.0 let declare instantiate manipulate objects com java coldfusion components well web services features provided fusebox developers means tying object-oriented models i.e business-logic directly controllers however many fusebox developers used object-oriented highly structured models earlier versions fusebox current versions without use grammar elements 2006 fusebox corporation asked sean corfield take lead developing next iteration fusebox fusebox 5 another complete rewrite new features improved performance fusebox 5 nearly completely maintained backwards-compatibility fusebox 4.1 november 2006 fusebox corporation transferred ownership core files fusebox website teratech guidance teratech president fusebox speaker michael smith teratech announced fusebox remain open source seeking increase community involvement project fusebox 5.1 subsequent releases licensed apache source license 2.0 february 2007 members team fusebox met frameworks conference bethesda maryland created plan action community involvement using volunteers nine different areas fusebox release focused primarily adding set conventions allow creation fusebox applications without xml configuration files use new features instead xml called implicit fusebox release fusebox 5.5.1 march 2008 last release sean corfield august 2008 adam haskell took development became frustrated fusebox organization attempted branch new framework called fuseng ng next generation star trek reference fuseng quickly lost steam ended without release january 2012 team five community developers led john blayter announced fusebox mailing list obtained rights copyright fusebox teratech framework code copyright removed available github encourage community participation fusebox 5.6 goals announced never implemented
Programming language topics
ultima first age darkness ultima later known ultima first age darkness simply ultima first game ultima series role-playing video games created richard garriott originally released apple ii first published united states california pacific computer company registered copyright game september 2 1980 officially released june 1981 since release game completely re-coded ported many different platforms 1986 re-code ultima commonly known available version game ultima revolves around quest find destroy gem immortality used evil wizard mondain enslave lands sosaria gem possession killed minions roam terrorize countryside player takes role stranger individual summoned another world end rule mondain game follows endeavors stranger task involves progressing many aspects game play including dungeon crawling space travel game one first definitive commercial computer rpgs considered important influential turning point development genre throughout years come addition influences rpg genre also first open-world computer game world ultima presented variety different ways overworld projected topdown third-person view dungeons displayed first-person one-point perspective scenarios player character controlled keyboard directional arrows shortcut keys used commands attack b board character creation start ultima unlike simplified version traditional tabletop role-playing games player presented number points distribute various statistics affect competence certain aspects gameplay example adding points strength statistic increase amount damage inflicted foe adding points charisma results cheaper deals merchants portion character creation completed player given choice four races human elf dwarf bobbit hobbit-like creature depending race picked points added various statistics e.g elves receive points agility statistic dwarves receive strength points race chosen player given list four classes choose distribute additional points appropriate statistics classes fighter cleric wizard thief player also asked choose gender player character though stat difference simple sprite character looks four statistics used gameplay hit points food experience points coin gold original release hit points determine health character fewer hp character closer death hit points obtained variety ways including acts emerging alive dungeon giving tribute payment one eight lords sosaria food consumed every two tiles character moves except castles towns food supply drops zero character die food bought towns prevent situation occurring experience points received successfully battle monsters determine character levels one thousand points needed progress new level vital item near end game obtained player reached eighth level coin used buy things game world weapons spells food obtained defeating monsters rescuing princesses castles game also sports arcade-like first-person space shooter section gameplay element appeared ultima subsequent games series player participates real-time space combat environment confronted enemy spaceships must shoot order progress along story richard garriott says added wanted fill every space disk everything possibly could ultima set fictional world sosaria land broken four different continents land ruled total eight different lords two world four land masses four continents contain two castles quests obtained player two types quests given castles—one entails visiting certain location main map killing specific type monster dungeons fulfilling former type quest gives stat boosts latter gains player important item needed reach endgame also variety towns different goods services purchased world dungeons explored populated forests mountain ranges lakes oceans towns exactly alike original release game dungeons maps different designed rather randomly created castles differ different quests may assigned 1986 remake variety added appearance content towns castles sosaria inhabited numerous monsters beasts attack player character sight also ruins places interest continent usually somewhat hard-to-reach places small islands player enter order receive rewards usually form weapon statistic boost order solve quests two main characters featured ultima mondain evil wizard antagonist induced reign terror world sosaria protagonist character player choosing game features lord british richard garriott first game akalabeth introduction characters iolo shamino three characters become staples nearly future ultima games see list ultima characters story ultima revolves around evil wizard mondain rule kingdom sosaria according game back story mondain created evil gem 1000 years ago granted immortality since mondain released monsters beasts upon land ravage villages towns sosaria cause nobles bicker amongst effort stop mondain dominion lord british searches person bring wizard end call answered player player informed way defeat mondain travel back time kill gem immortality created majority game spent searching time machine way activate four lords game one realm hold gem allow time machine work four gems found exchange gem lord ask player complete quest involves traveling dungeon killing specific creature achieved lord hand gem time machine also needs found purchasing space shuttle traveling outer space prerequisite —the player must become space ace destroying 20 enemy ships order complete game task completed rescuing princess reveal location time machine always appears north castle princess held prisoner main character travel back time face mondain completed gem immortality destroying gem requirement beating game well killing wizard mondain dead player transported one thousand years future rewarded lord british richard garriott started development ultima unexpected success previous game large sections akalabeth used subroutines within ultima create first-person dungeon sections game towns quests plot user interface added original akalabeth code ultima completed star wars elements also added including spaceships lightsabers development ultima done garriott freshman year university texas help friend ken w. arnold finished less year ultima coded applesoft basic apple ii computer arnold wrote code assembly language tile-based graphics system first game genre unlike akalabeth commercial sale afterthought hobbyist endeavor ultima approached much professional attitude right start project game first planned called ultimatum discovered name already use board game company shortened ultima garriott later commented title wrote first game course idea would ever second california pacific computer company published ultima 1981 apple ii june 1982 sold 20,000 copies went sell 50,000 copies sierra online re-released ultima atari 8-bit computers 1986 origin systems completely re-coded game assembly re-released 1986 remake re-coded entirely assembly significantly improved running speed able handle superior graphics small cosmetic changes content also made addition another castle map variant three new city maps introduction traveling monsters outdoors section division money player separate copper silver gold coins first released apple ii december 23 1986 ultima first age darkness ports commodore 64 dos/ega also released many subsequent releases made later years including 1989 version msx2 published japan pony canyon well apple ii specific port late 1994 vitesse 1997 dos/ega version ultima released electronic arts part ultima collection softline stated 1981 ultima seems best available apple ii role-playing game magazine called graphics impressive concluded retails 39.95 well worth price computer gaming world 1991 1993 called game truly epic scope stating among first outdoor settings npc conversations noting unbalanced combat system magazine concluded ultima classic missed
Computer architecture
lemmatisation lemmatisation lemmatization linguistics process grouping together inflected forms word analysed single item identified word lemma dictionary form computational linguistics lemmatisation algorithmic process determining lemma word based intended meaning unlike stemming lemmatisation depends correctly identifying intended part speech meaning word sentence well within larger context surrounding sentence neighboring sentences even entire document result developing efficient lemmatisation algorithms open area research many languages words appear several inflected forms example english verb 'to walk may appear 'walk 'walked 'walks 'walking base form 'walk one might look dictionary called lemma word association base form part speech often called lexeme word lemmatisation closely related stemming difference stemmer operates single word without knowledge context therefore discriminate words different meanings depending part speech however stemmers typically easier implement run faster reduced accuracy may matter applications fact used within information retrieval systems stemming improves query recall accuracy true positive rate compared lemmatisation nonetheless stemming reduces precision true negative rate systems instance document indexing software like lucene store base stemmed format word without knowledge meaning considering word formation grammar rules stemmed word might valid word 'lazy seen example stemmed many stemmers 'lazi purpose stemming produce appropriate lemma – challenging task requires knowledge context main purpose stemming map different forms word single form rules-based algorithm dependent upon spelling word sacrifices accuracy ensure example 'laziness stemmed 'lazi stem 'lazy trivial way lemmatization simple dictionary lookup works well straightforward inflected forms rule-based system needed cases languages long compound words rules either hand-crafted learned automatically annotated corpus morphological analysis published biomedical literature yield useful results morphological processing biomedical text effective specialised lemmatisation program biomedicine may improve accuracy practical information extraction tasks
Computational linguistics
repair permissions repairing disk permissions troubleshooting activity commonly associated macos operating system apple efficacy repairing permissions troubleshoot application errors debated bsd layer macos responsible file-system security including management unix posix permissions model applications depend correct assignment interpretation permissions order function properly repairing permissions involves checking permissions set files folders volume macos installed list correct posix permissions correcting discrepancies list correct permissions compiled consulting various bill-of-materials .bom files typically files stored within reduced-size installer package .pkg files receipts folder local library directory /library/receipts volume checked whenever user installs software uses macos installer package format bill-of-materials file created consulted future permission repair files whose permissions incorrectly altered administrator administrator operating root privileges poorly designed installer package installed similar privileges cause wide array problems ranging application errors inability boot macos repairing permissions become necessary become increasingly less versions panther 10.3 os x el capitan apple introduced security feature called system integrity protection enabled root privileges longer able change system files folders including permissions permissions repairs instead performed automatically upon system installs updates end disk utility well corresponding diskutil command-line utility lost ability repair permissions systems prior os x el capitan permissions repair performed selecting startup volume clicking repair disk permissions button first aid section disk utility operation also performed using diskutil command-line utility el capitan user instead use two command-line utilities pkgutil repair particular packages /usr/libexec/repair_packages repair standard set system packages cases user disable system integrity protection change permissions system files directories macos sierra /usr/libexec/repair_packages available permissions also repaired using third-party utilities apotek applejack prosoft engineering drive genius
Operating systems
ultima ii revenge enchantress ultima ii revenge enchantress released august 24 1982 apple ii usco pa-317-502 second role-playing video game ultima series second installment ultima age darkness trilogy also official ultima game published sierra on-line controversy sierra royalties pc port game led series creator richard garriott start company origin systems plot ultima ii revolves around evil enchantress minax taking world exacting revenge player player defeat mondain player travels time acquire means defeat minax restore world peace ultima ii larger game world ultima hosts advances graphics gameplay gameplay similar previous game series scope game bigger several places explore even though like solar system planets dungeons towers required complete game game player travel several different time periods earth using time doors periods time legends mythological period pangea 300 250 million years ago b.c 1423 dawn civilization a.d. 1990 aftermath 2112 player also travel space planets solar system visited game story player learns lover dark wizard mondain enchantress minax threatening earth disturbances space-time continuum player must guide hero time solar system order defeat evil plot young minax survived mentor lover death hands stranger went hiding several years later minax got older powerful mondain minax wanted avenge death lover used time doors created mondain defeat travel time legends place located origin times sent evil minions different time eras also used dark powers disturb fabric time influence men ultimately destroyed far future nearly wiping humanity lord british called hero crush minax evil plans stranger answered british call game begins stranger starting quest defeat minax minax castle named shadow guard reached time doors similar moongates later games even enchanted ring required pass force fields inside hero hunts sorceress time legends pursues teleports throughout castle destroys quicksword enilno even though ultima set fictional land sosaria ultima ii borrowed characters story ultima relocated earth garriott explained narrative perspective earth needed used basis comparison due time travel element later games ultima series ret-conned assumed ultima ii actually happened sosaria earth create continuity among games ultima ii garriott first program wrote completely assembly language instead interpreted basic playing speed reaction time vastly improved original release ultima since garriott attending university texas time took almost two years create ultima ii including learning assembly one month tom luhrs author popular apple ii arcade game apple-oids ultima ii first game series include cloth map inside box would become staple franchise map illustrated time doors linked inspired one seen film time bandits time doors california pacific computer published garriott first two games financial difficulties pay full royalties publishers approached garriott insisted including map sierra on-line agreed provided garriott left university technical assistance developed first major assembly-language project two versions map produced first version heavier thicker material map found large boxed 8 x11 apple ii atari 800 versions game later production runs game featured much smaller box lighter weight map despite reservations richard garriott chuck bueche original apple ii version game copy-protected using sierra new spiradisc system original apple ultima ii received audiovisual upgrade 1989 bringing graphics date recent games series much done ultima enhanced version available part ultima trilogy i-ii-iii box set released year discontinued months later commodore ibm versions ultima trilogy include original unenhanced versions game respective platforms game re-released several times later cd-rom pc compilations including 1998 ultima collection re-releases missing necessary map files planets earth however map planet x intact game still winnable modern fast computers also generate divide zero error attempting run game issues addressed fan patches created voyager dragon fan series available website exodus project game known run without errors acceptable speed dosbox environment provided missing map files present ultima ii first game series officially ported platforms apple ii atari version released late 1983 several months apple original requires atari 800 810 disk drive game mostly direct port apple ii utilizing computer high resolution graphics works similar manner apple ii hgr mode otherwise take advantage atari advanced features c64 port apparently released programmer credited bobbit could finish consequence missing gameplay elements also simplified title screen text characters instead dragon graphic versions otherwise commodore 64 version takes advantage platform advanced graphics sound ibm version ultima ii dos game run self-booting disk unusual game released 1983 supports cga graphics pc speaker sound also uses cpu timing hence run fast anything except 8088 pc ultima ii designed dos 1.x support subdirectories save games must directory game files pc port also prone generating divide zero errors crashing dos prompt 1985 sierra released port ultima ii macintosh 128/512 along ultima iii would classic ultima games available macintosh family game compatible mac os versions system 6 run system 7.5 patch atari st port one earliest commercially released games system coming shortly computer june 1985 launch utilizes mostly simple block graphics little enhancement st hardware capabilities runs within tos self-booting disk atari st games softline 1983 stated ultima ii continues interplanetary saga creative programming flair far beyond scope fantasy adventure games magazine concluded lord british another greater hit hands ... ultimate real-time type fantasy games micro computer gaming world 1983 gave ultima ii positive review noting many improvements predecessor particularly amount detail magazine praised large size game world even though little necessary complete game suggesting additional scenarios would added leading ultimate quest 1991 1993 magazine scorpia called good sequel original game k-power gave game 7 points 10 magazine described animated graphic adventure game stated ultima ii sophisticated quicker pace predecessor fascinating world concluded game unique storyline original pc magazine gave ultima ii 15.5 points 18 also praising game great big wonderful world ultima ii sold 50,000 1982 100,000 copies date nominated best adventure game home computer 1983 origins game fair losing knight diamonds
Computer architecture
link register link register special-purpose register holds address return function call completes efficient traditional scheme storing return addressed call stack sometimes called machine stack link register require writes reads memory containing stack save considerable percentage execution time repeated calls small subroutines link register used many instruction set architectures powerpc arm pa-risc architectures sparc register purpose another name case output register 7 o7 usage link register general-purpose register done instruction set architectures allows faster calls leaf subroutines subroutine non-leaf passing return address register still result generation efficient code thunks e.g function whose sole purpose call another function arguments rearranged way subroutines benefit use link register saved batch callee-used registers—e.g arm subroutine pushes registers 4-7 along link register lr single instruction codice_1 pipelining memory writes required
Computer architecture
job entry subsystem 2/3 job entry subsystem jes component ibm mainframe operating systems responsible managing batch workloads modern times two distinct implementations job entry system called jes2 jes3 designed provide efficient execution batch jobs job processing divided several phases provide parallelism pipelining phases include input processing jobs read interpreted execution phase jobs run output processing job output printed stored dasd jobs phase execution usually said reside particular queue example jobs currently executing execution queue improve i/o efficiency jes performs spooling provides multiple jobs simultaneous access common storage volume jes uses structure called checkpoint backup information currently executing jobs associated output checkpoint used restore jobs output event unexpected hardware software failures although jes2 jes3 provide core functionality certain features may present one jes differences one jes may favored certain customer installations jcl used define jobs jes2 jes3 small changes usually need made jcl get job written one jes run os/360 batch job processing limited operational flexibility performance addressed two field-developed packages called houston automatic spooling priority hasp attached support processor asp hasp developed ibm federal systems division contractors johnson space center houston originally managed job scheduling print punch output single os/360 computer multi access spool capability added let peer computers share common job queue print/punch output queues introduction system/370 1972 ibm rewrote hasp become standard part system renamed job entry subsystem 2 jes2 introduced os/vs2 release 2 also known mvs 1973 many years hasp labels removed source code messages issued jes2 still prefixed codice_1 several jes2 commands continue support specification either codice_2 codice_3 maintain backwards compatibility asp initially stood attached support processor developed provide efficient use multiple os/360 systems shared workload allowed one central system distribute jobs multiple connected systems asp announced march 1967 year reported running stably asp evolved design 7094/7044 direct coupled system using data channel data channel communication attaching ibm 7044 peripheral processor throughput doubled typical asp configuration small mainframe 360/40 called support system controlled one 360/65 larger processors called main systems computers connected selector channels host attached channel-to-channel adapters early form short distance point-to-point computer networking asp required purchase additional computer manage input output hosts running job workload economically justified high cost standalone byte-multiplexor channels needed drive printers punched card reader devices 360/50 smaller systems built-in byte multiplexor channel whereas faster 360/65 larger systems required relatively expensive standalone unit using asp made possible avoid cost byte multiplexor channel offloading job scheduling print card handling also offloaded functions larger machines increased reliability another advantage offset added hardware cost one main systems could fail taken offline maintenance without taking whole complex asp primarily targeted large government agencies defense contractors might many six 360/65s scheduled managed separate asp machine uncommon variant local asp lasp single large machine asp functions running machine 1970s notable installation asp princeton university controlling ibm 360/91 mainframe 1973 ibm rewrote asp renamed jes3 supporting mvs also jes os/vs1 often referred jes1 addition master mstr subsystem built modern z/os operating system start jobs run outside control jes including primary jes source code provided ibm customers asp hasp many customers made substantial enhancements programs incorporated official product far installations made use hasp asp contemporary z/os systems many jes2 installations jes3 unique history ibm continues ship jes2 jes3 source code instead object code unlike components operating system improve maintainability serviceability user-written enhancements jes provides set exit points pass control jes user programs key points processing extensions provide custom functionality special commands custom print page headings non-standard job processing 2017 ibm released statement direction jes2 strategic jes meaning future development efforts focused jes2 rather jes3 ibm reassured customers jes3 continue supported end-of-support date announced february 2019 ibm announced z/os 2.5 expected released 2021 last version z/os include jes3
Operating systems
ultima iv quest avatar ultima iv quest avatar first released 1985 apple ii fourth series ultima role-playing video games first age enlightenment trilogy shifting series hack slash dungeon crawl gameplay age darkness predecessors towards ethically-nuanced story-driven approach ultima iv much larger game world predecessors overworld map sixteen times size ultima iii puzzle-filled dungeon rooms explore ultima iv advances franchise dialog improvements new means travel exploration world interactivity 1996 computer gaming world named ultima iv 2 best games time list pc designer richard garriott considers game among favorites ultima series ultima iv followed release 1988 ultima iv among computer role-playing games perhaps first game story center asking player overcome tangible ultimate evil defeat members triad evil previous three ultima games world sosaria underwent radical changes geography three quarters world disappeared continents rose sank new cities built replace ones lost eventually world unified lord british rule renamed britannia lord british felt people lacked purpose great struggles triad concerned spiritual well-being unfamiliar new age relative peace proclaimed quest avatar needed someone step forth become shining example others follow unlike rpgs game set age darkness prosperous britannia resembles renaissance italy king arthur camelot object game focus main character development virtuous life—possible land peace—and become spiritual leader example people world britannia game follows protagonist struggle understand exercise eight virtues proving understanding virtues locating several artifacts finally descending dungeon called stygian abyss gain access codex ultimate wisdom protagonist becomes avatar conversely actions game could remove character gained virtues distancing construction truth love courage greater axiom infinity—all required complete game though avatarhood exclusive one chosen person hero remains known avatar throughout later games time passes increasingly regarded myth instead simply choosing stats assign points first three ultima games players asked various ethical dilemmas gypsy fortune-teller using remotely tarot-like cards eight virtues situations one correct resolution rather players must rank eight virtues whichever stands highest priority determines type character play example choosing compassion creates bard honor paladin sacrifice tinker also first ultima playing human necessary eliminating races elves dwarves bobbits found previous games however even first three ultima could chosen player characters never non-player characters non-human races although profession embodies particular virtue become avatar player must achieve enlightenment eight virtues virtue affects npcs interact player enlightenment virtues achieved player actions well meditation shrines shrines virtues scattered britannia requiring player possess corresponding virtue rune allowing entry meditation correctly repeating virtue mantra three times shrine player gains insight ultimately enlightenment virtue seer hawkwind lord british castle provides player feedback progress virtues offering advice actions improve standing eight virtues informing ready visit shrine elevation chastising character hath strayed far path avatar player may encouraged give alms poor improve sacrifice never flee battle improve honor players equally able lower virtue in-game actions stealing crops food lowering honesty selecting bragging response dialog certain characters lowers humility actions minor effect virtue progress certain actions immediate devastating effect player progress multiple virtues attacking npc sleep technically game similar although much larger first ultima feature real conversation system whereas npcs earlier games would give one canned answer talked players could interact specifying subject conversation subject determined either standard set questions name job health information gleaned previous answers characters many sub-quests arranged around users playing game second time could save considerable time knowing answers key questions frequently required travel another city talk another npc least one case player asked sent may require yet another round trip cities another addition dungeon rooms uniquely designed combat areas dungeons supplemented standard combat randomly appearing enemies ultima iv open world game quests completed order fetch quests although turn-based game clock runs game running player act npcs monsters may move time passes time important aspect game certain actions performed certain times world britannia first introduced full world map series greatly change later games player may travel britannia foot horseback across sea ship air lighter air device speed ease travel affected mode travel well terrain wind eight virtues avatar relationship three principles truth love courage gameplay designed around follows richard garriott stated receive customer feedback first three games neither california pacific computer sierra on-line forwarded mail company released ultima iii garriott—who attended interdenominational christian sunday school teenager—realized partly letters enraged parents earlier games immoral actions like stealing murder peaceful citizens necessary least useful actions order win game features might objectionable garriott stated wanted become good storyteller make certain story content 90 games including first three ultima games called go kill evil bad guy stories said ultima iv first one ethical overtones also better told story shay addams garriott official biographer wrote decided people going look hidden meaning work n't even exist would introduce ideas symbols meaning significance deemed worthwhile give something could really think encourage sense responsibility character actions players intended feel playing transported fantasy realm separate person garriott removed gameplay elements believed would prevent players identifying personally character playing non-human retrospect 1up.com described ultima iv direct barb self-appointed moral crusaders sought demonize rpgs complained irony seeing 'evil rpg better present christian admonition back faith works quiet modesty bible-waving watchdog decrying medium seems lost game moral dilemmas designed give players opportunity reap temporary rewards amoral behavior realize later penalized garriott hoped would approach later dilemmas thoughtfulness near end game took advantage encourage players overthink puzzles question morality choices one point players seemingly required murder innocents revealed demons disguise though one playtester threatened quit dilemma garriott refused remove game reasoning served purpose provoking emotional response concept virtues inspired tv show avatars hindu mythology described avatars master 16 different virtues eight virtues used game derived combinations truth love courage set motivators garriott found worked best also found one favorite films wizard oz game took two years develop twice garriott described playtesting slightly rushed make christmas season one finish playing game time went publishing like contemporary origin games ultima iv developed apple ii series ported computers partially garriott apple ii user/coder partially developing games first made ports easier garriott said 1984 commodore 64 atari 8-bit sprites hardware sound chips made porting apple far difficult perhaps even impossible ... apple version never get done like previous games ultima iv permit saving dungeons technical limitations garriott described non-trivial ankh used onward symbol avatar virtuous path chosen garriott saw film logan run like previous ultima richard garriott wrote core code however games getting complex one person handle required call outside assistance programming tasks familiar music optimized disk routines ultima iv first game series require 64k apple ii primarily targeted newer apple iie iic although still capable running apple ii+ language card used boost system 64k garriott still using ii+ time happened ultima iii ultima iv also included support mockingboard sound card enabled apple ii users 3-voice music custom disk routines allowed ultima iv faster disk access previous games also important growing size game caused use two floppy disks instead one dialog two npcs apple ii release accidentally entered leaving default test states one npcs elusive game provided player final answer would require complete game character responding properly players forced guess correct answer find sources outside game complete bug would later acknowledged ultima v npc appears admits mistake player c64 port first series take full advantage computer hardware rather simply converting sound graphics apple ii include in-game music came two 1541 disks like apple ii side 1 disk 1 labeled program copy protected disk sides overworld town dungeon user instructed make backups ultima iv also added support two disk drives case user would keep overworld side disk 1 drive 0 flip town/dungeon disk needed drive 1 overworld disk also used load/save player progress one biggest criticisms c64 port lack disk fast loader made extremely slow disk access speed-optimized disk routines apple version ultima iv final game series ported atari 8-bit family game still designed support 48k atari 800 even though four models 64k/128k atari 8-bit computers released one 64k-upgradable model starting two half years earlier order fit game 48k atari 8-bit version cut music support reason 48k made requirement instead 64k requirement apple ii version whereas earliest apple ii models upgradable 64k atari 400/800 officially upgradable 48k since apple version programmed require 64k apple 6502 code ported create atari 8-bit commodore 64 version would required extra programming selectively use 48k/64k including music support 64k machines since atari 8-bit market smallest installed bases game initially released special support provided similar reasons game distributed earliest 90k atari 810 disk format require disk drive upgrade players thus occupies four disks instead two disks apple ii commodore 64 versions similar c64 port ibm version ultima iv released two years 8-bit versions takes proper advantage hardware first time instead rushed conversion apple ii ega tandy graphics support added well proper hard disk support game finally supported dos 2.x subdirectories however music ibm version even though tandy 1000 series 3-voice sound chip atari st version ultima iv released 1987 amiga version 1988 extremely similar pc port fully utilize machines respective hardware features particular amiga version 16-color graphics although amiga could display 64 screen without using copper processor make color palette changes however atari st version support midi music one could play music connected midi synthesizer sampler ports made use mouse limited use native operating system windowing environment mouse cursor support dialog boxes requesting disks etc. like ultima iii ultima iv released nes fci pony canyon version titled ultima quest avatar released 1990 nes port ultima iv different versions graphics completely redone music dialogue options greatly reduced among gameplay changes player seven recruitable characters player party time one could versions character four player could would stay hostel castle britannia requiring player return change characters however combat system fairly close personal computer games additional option use automated combat additionally spell-casting simplified removing need mix spells puzzles removed well port also replaced character julia tinker male character named julius changes done memory limitations single cartridge instead multiple floppy diskettes ultima iv quest avatar master system ultima ported sega platform released 1990 ported published sega port features completely re-drawn graphics although unlike nes port style retained origin version simpler conversation system unlike nes version uses regular ultima iv background music although master system easily capable displaying complex first-person scenes found ultima iv see phantasy star version dungeons viewed top-down perspective much like ultima vi released year seems cartridges produced european market contain multi-lingual english french german manual books original version well folded paper map books different colour three editions blue uk version fully translated fit inside game box graphical error version gypsy picture man mustache even though gypsy referred throughout text xu4 cross-platform game engine recreation ultima iv development dreamcast linux mac os x risc os windows two remakes using neverwinter nights engine online version written adobe flash march 2011 electronic arts sent dmca cease desist notice fan project 2015 also fan-made remaster project commodore 64 version game released source code github addressing bugs improving aspects game ultima iv available free gog.com publisher ip owner electronic arts released game freeware 2011 promote free-to-play remake would release 2013 garriott stated 1985 interview working ultima iv part 2 ultima v ultima v appeared global sales ultima iv surpassed 400,000 copies mid-1989 scorpia computer gaming world 1986 called incredible game criticizing fact experience came combat stated became tedious scorpia concluded waiting classic ... go get game became first replace —the top-rated adventure game five years—in magazine reader poll named ultima iv game year 1986 1987 scorpia cited ultima iv taking genre away hack slash— first time crpg whose focus character development many monsters kill much loot pick —in 1991 1993 called favorite game 1994 stated maybe nothing ever surpass retiring reviewing games called all-time number one favorite rpg june 1986 dragon hartley pattie lesser called ultima iv impressive complex adventure date total adventuring environment takes place across entire continent september 1986 issue mike gray lauded game best computer simulation true fantasy role-playing experience ever seen apple ii commodore 64 128 treasure hoard computer frp games complete unless get hands one praised ultima iv incredible find store ’ pass ... ’ discouraged takes find copy — search easy one compared awaits start quest avatar famitsu reviewed nes/famicom version scored 31 40 ultima iv top game billboard list software best sellers february march 1986 co-creator dave arneson 1988 wrote ultima iv games stood pretty much alone quirks instead trend setters crpg industry games follow innovations score 7.80 10 1988 ultima iv among first members computer gaming world hall fame games rated highly time readers 1990 game received third-highest number votes survey readers all-time favorites 1996 magazine ranked second-best video game time second most-innovative computer game 2013 ign placed ultima iv 26 list top 100 rpgs time 2015 peter tieryas tor.com stated nes version represented different type ideal ... make narrative determine course journey engendering sense immersion effect making feel like control previous rpg
Computer architecture
socket 2 socket 2 one series cpu sockets various x86 microprocessors inserted updated socket 1 added support pentium overdrive processors socket 2 238-pin low insertion force lif zero insertion force zif 19×19 pin grid array pga socket suitable 5-volt 25 66 mhz 486 sx 486 dx 486 dx2 486 overdrive 63 83 mhz pentium overdrive processors
Computer architecture
apache hama apache hama distributed computing framework based bulk synchronous parallel computing techniques massive scientific computations e.g. matrix graph network algorithms top level project apache software foundation created edward j. yoon named short hadoop matrix inspired google pregel large-scale graph computing framework described 2010 hama also means hippopotamus korean language 하마 following trend naming apache projects animals zoology apache pig hama consists three major components bspmaster groomservers zookeeper bspmaster responsible bsp master multiple grooms started script bsp master starts rpc server groom servers groom servers starts bsppeer instance rpc proxy contact bsp master started groom periodically sends heartbeat message encloses groom server status including maximum task capacity unused memory time bsp master receives heartbeat message brings up-to-date groom server status bsp master makes use groom servers status order effectively assign tasks idle groom servers returns heartbeat response contains assigned tasks others actions groom server fifo job scheduler simple task assignment algorithms groom server shortly referred groom process performs bsp tasks assigned bspmaster groom contacts bspmaster takes assigned tasks reports status means periodical piggybacks bspmaster groom designed run hdfs distributed storages basically groom server data node run one physical node zookeeper used manage efficient barrier synchronisation bsppeers
Distributed computing architecture
national information governance board health social care national information governance board health social care nigb established united kingdom section 157 health social care act 2008 effect october 2008 range advisory functions relating information governance january 2009 nigb also gained functions section 251 nhs act 2006 previously held patient information advisory group piag abolition functions advise secretary state health use powers set aside common law duty confidentiality england identifiable patient information needed consent practicable 1 april 2013 nigb functions monitoring improving information governance practice transferred care quality commission established national information governance committee oversee work functions relating section 251 nhs act 2006 access people personal confidential information research purposes transferred health research authority confidentiality advisory group key functions nigb excerpted legislation definition “ relevant information ” legislation covers patient information information obtained generated course provision health service information obtained generated course exercise local social services authority england adult social services functions areas nigb functions e delegated nigb ethics confidentiality committee ecc functions primarily related applications use identifiable patient information without consent specific circumstances within bounds section 251 nhs act 2006 applications considered piag nigb passed health research authority confidentiality advisory group cag 1 april 2013 nigb also replaced care record development board crdb closed september 2007 nigb subsequently maintained nhs care record guarantee originally developed crdb developed companion social care record guarantee nigb consisted chair number public members appointed nhs appointments commission number representative members appointed secretary state health range stakeholder organisations representatives several stakeholder organisations served corresponding advisers nigb typically attended meetings regular observers meetings included representatives information commissioner office devolved uk administrations ecc consisted chair number members appointed nigb advice nhs appointments commission approved independent assessor ecc chair two ecc members also nigb members 1 june 2011 31 march 2013 dame fiona caldicott chair nigb succeeding harry cayton chaired nigb since inception members nigb ecc widely distributed nationally attended meetings nigb office since september 2011 based skipton house london se1 nigb staff team predominantly based office result health social care act 2012 nigb abolished effect 1 april 2013 functions delegated ecc respect research transferred health research authority nhs commissioning board responsible providing advice guidance nhs bodies functions transferred national information governance committee hosted care quality commission
Databases
front line video game game created tetsuya sasaki influenced space invaders galaga 1985 ikari warriors follows conventions established front line including vertically scrolling levels entering/exiting tanks dying occupied tank destroyed playing lone soldier player ultimate objective lob hand grenade enemy fort first fighting infantry units battling tanks finally reaching opponent compound player begins two weapons pistol grenades ammo limit player advanced far enough enemy territory tank warfare stage player hijack tank fight enemy tanks two types tanks available light tank armed machine gun heavy tank armed cannon light tank nimble easily destroyed enemy heavy tank slower sustain one hit light tank second hit light tank destroy single shot heavy tank destroy either type tank partially damaged tank evacuated player jump back resume normal operation however either type tank player must exit vehicle within seconds struck fatal shot player exit tank explodes loses life extra life awarded 10,000 15,000 none thereafter tank battle continues player reaches enemy fort fort brick-barricaded tank fires mortar rounds player attempts take order destroy tank player must toss grenade brick barricade accomplished foot done tank explode enemy soldier wave white flag signalling surrender plus 1,000 bonus points game repeats infantry level enemy soldiers become increasingly quicker deadlier successive rounds points multiplied based level played following release coin-op arcade platform game ported colecovision console pc-8801 sharp x1 computers 1983 atari 2600 msx 1982 fm-7 nintendo famicom 1985. famicom version taito first game console 1983 arcade awards front line runner-up coin-op game year behind pole position award given electronic games stated arcade approach dirty business infantry combat forces player keep moving firing constantly action non-stop attractive shoot 'em game boy color spin-off entitled sgt rock frontline published taito 2000 game follows template original arcade game set within dc comics universe arcade original included taito memories gekan playstation 2 console 2005 taito legends 2 playstation 2 xbox windows platforms 2006 famicom version released virtual console service japan june 5 2007 wii january 15 2014 nintendo 3ds
Computer architecture
handwritten biometric recognition handwritten biometric recognition process identifying author given text handwritten biometric recognition belongs behavioural biometric systems based something user learned handwritten biometrics split two main categories static mode users writes paper digitize optical scanner camera biometric system recognizes text analyzing shape group also known off-line dynamic mode users writes digitizing tablet acquires text real time another possibility acquisition means stylus-operated pdas dynamic recognition also known on-line .dynamic information usually consists following information better accuracies achieved means dynamic systems technological approaches exist handwritten biometric recognition confused optical character recognition ocr goal handwritten biometrics identify author given text goal ocr recognize content text regardless author
Computer security
killbit killbit security feature web browsers based microsoft trident engine internet explorer activex containers respect killbit microsoft office killbit instructs activex control container never use specific piece activex software whether third-party microsoft identified class identifier clsid main purpose killbit close security holes vendor discovers security hole specific version activex control request microsoft put killbit killbit updates typically deployed microsoft windows operating systems via windows update flag windows registry identifies clsid unsafe clsid type guid acts serial number software question must exist piece software behaves activex control activex container finds clsid killbit entry matches clsid software software blocked running activex container vendor wants release updated version release different clsid internet explorer html application host also respects killbit processing object tag html processing scripts html
Operating systems
high-level data link control high-level data link control hdlc bit-oriented code-transparent synchronous data link layer protocol developed international organization standardization iso standard hdlc iso/iec 13239:2002 hdlc provides connection-oriented connectionless service hdlc used point-to-multipoint connections via original master-slave modes normal response mode nrm asynchronous response mode arm rarely used used almost exclusively connect one device another using asynchronous balanced mode abm hdlc based ibm sdlc protocol layer 2 protocol ibm systems network architecture sna extended standardized itu lap link access procedure ansi named essentially identical version adccp hdlc specification specify full semantics frame fields allows fully compliant standards derived derivatives since appeared innumerable standards adopted x.25 protocol stack lapb v.42 protocol lapm frame relay protocol stack lapf isdn protocol stack lapd original iso standards hdlc following iso/iec 13239:2002 current standard replaced specifications hdlc inspiration ieee 802.2 llc protocol basis framing mechanism used ppp synchronous lines used many servers connect wan commonly internet similar version used control channel e-carrier e1 sonet multichannel telephone lines cisco hdlc uses low-level hdlc framing techniques adds protocol field standard hdlc header hdlc frames transmitted synchronous asynchronous serial communication links links mechanism mark beginning end frame beginning end frame identified done using unique sequence bits frame delimiter flag encoding data ensure flag sequence never seen inside frame frame begins ends frame delimiter frame delimiter end frame may also mark start next frame synchronous asynchronous links flag sequence binary 01111110 hexadecimal 0x7e details quite different flag sequence consists six consecutive 1-bits data coded ensure never contains five 1-bits row done bit stuffing time five consecutive 1-bits appear transmitted data data paused 0-bit transmitted receiving device knows done seeing five 1-bits row following 0-bit stripped received data instead sixth bit 1 either flag seventh bit 0 error seventh bit 1 latter case frame receive procedure aborted restarted flag next seen bit-stuffing serves second purpose ensuring sufficient number signal transitions synchronous links data nrzi encoded 0-bit transmitted change signal line 1-bit sent change thus 0 bit provides opportunity receiving modem synchronize clock via phase-locked loop many 1-bits row receiver lose count bit-stuffing provides minimum one transition per six bit times transmission data one transition per seven bit times transmission flag frames transmitted simplex full-duplex synchronous link frame delimiter continuously transmitted link generates one two continuous waveforms depending initial state hdlc specification allows 0-bit end frame delimiter shared start next frame delimiter i.e 011111101111110 hardware support half-duplex multi-drop communication several transmitters share line receiver line see continuous idling 1-bits inter-frame period transmitter active hdlc transmits bytes data least significant bit first confused little-endian order refers byte ordering within multi-byte field using asynchronous serial communication standard rs-232 serial ports synchronous-style bit stuffing inappropriate several reasons instead asynchronous framing uses control-octet transparency also called byte stuffing octet stuffing frame boundary octet 01111110 0x7e hexadecimal notation control escape octet value 0x7d bit sequence '10111110 rs-232 transmits least-significant bit first either two octets appears transmitted data escape octet sent followed original data octet bit 5 inverted example byte 0x7e would transmitted 0x7d 0x5e 10111110 01111010 reserved octet values xon xoff escaped way necessary abort sequence 0x7d 0x7e ends packet incomplete byte-stuff sequence forcing receiver detect error used abort packet transmission chance partial packet interpreted valid receiver contents hdlc frame shown following table note end flag one frame may beginning start flag next frame data usually sent multiples 8 bits variants require others theoretically permit data alignments 8-bit boundaries frame check sequence fcs 16-bit crc-ccitt 32-bit crc-32 computed address control information fields provides means receiver detect errors may induced transmission frame lost bits flipped bits extraneous bits however given algorithms used calculate fcs probability certain types transmission errors going undetected increases length data checked errors fcs implicitly limit practical size frame receiver calculation fcs match sender indicating frame contains errors receiver either send negative acknowledge packet sender send nothing either receiving negative acknowledge packet timing waiting positive acknowledge packet sender retransmit failed frame fcs implemented many early communication links relatively high bit error rate fcs could readily computed simple fast circuitry software effective forward error correction schemes widely used protocols synchronous data link control sdlc originally designed connect one computer multiple peripherals via mutidrop bus original normal response mode master-slave mode computer primary terminal gives peripheral secondary terminal permission speak turn communication either primary terminal frames include one address secondary terminal primary terminal assigned address distinction commands sent primary secondary responses sent secondary primary reflected encoding commands responses indistinguishable except difference direction transmitted normal response mode allows secondary-to-primary link shared without contention primary give secondaries permission transmit one time also allows operation half-duplex communication links long primary aware may transmit given permission secondary asynchronous response mode hdlc addition use full-duplex links retaining primary/secondary distinction allows secondary transmit time thus must mechanism ensure multiple secondaries try transmit time one secondary asynchronous balanced mode adds concept combined terminal act primary secondary unfortunately mode operation implementation subtleties common frames sent care whether command response frame essential ones notably unnumbered frames frame p/f bit set address field received frame must examined determine whether contains command address received response address received terminal means address field optional even point-to-point links needed disambiguate peer talked hdlc variants extend address field include source destination addresses explicit command/response bit three fundamental types hdlc frames may distinguished general format control field also extended 2-byte forms frames least significant bit rightmost table sent first poll/final single bit two names called poll part command set primary station obtain response secondary station final part response set secondary station indicate response end transmission cases bit clear bit used token passed back forth stations one token exist time secondary sends final received poll primary primary sends poll received final back secondary timeout indicating bit lost operating combined station important maintain distinction p f bits may two checkpoint cycles operating simultaneously p bit arriving command remote station response p bit f bit arriving response frames contain receive sequence number n r n r provides positive acknowledgement receipt i-frames side link value always first frame yet received acknowledges frames n values n r −1 modulo 8 modulo 128 received indicates n next frame expects receive n r operates way whether part command response combined station one sequence number space incremented successive i-frames modulo 8 modulo 128 depending number bits sequence number 7 127 i-frames may awaiting acknowledgment time information frames i-frames transport user data network layer addition also include flow error control information piggybacked data sub-fields control field define functions least significant bit first transmitted defines frame type 0 means i-frame except interpretation p/f field difference command frame response frame p/f 0 two forms exactly equivalent supervisory frames 's-frames used flow error control whenever piggybacking impossible inappropriate station data send s-frames hdlc information fields although hdlc-derived protocols use information fields multi-selective reject s-frame control field includes leading 10 indicating s-frame followed 2-bit type poll/final bit 3-bit sequence number 4-bit padding field followed 7-bit sequence number first least significant 2 bits mean s-frame frames include p/f bit receive sequence number described except interpretation p/f field difference command frame response frame p/f 0 two forms exactly equivalent unnumbered frames u-frames used link management also used transfer user data exchange session management control information connected devices u-frames contain information field used system management information user data first 2 bits 11 mean u-frame 5 type bits 2 p/f bit 3 bit p/f bit create 32 different types u-frame link configurations categorized either three link configurations additional link configuration disconnected mode mode secondary station initialized primary explicitly disconnected mode secondary responds almost every frame mode set command disconnected mode response purpose mode allow primary reliably detect secondary powered otherwise reset minimal set required operation hdlc module end transmits ua frame request accepted request rejected sends dm disconnect mode frame unnumbered frames identified low two bits 1 p/f flag leaves 5 bits frame type even though fewer 32 values use types different meanings depending direction sent command response relationship disc disconnect command rd request disconnect response seems clear enough reason making sarm command numerically equal dm response obscure ui uih xid test frames contain payload used commands responses sm command frmr response also contain payload
Internet protocols
foundation kit foundation kit foundation short objective-c framework openstep specification provides basic classes wrapper classes data structure classes framework uses prefix ns nextstep next/sun_microsystems class common base class objective-c hierarchies provides standard methods working objects managing memory associated querying class used string manipulation representing unicode string typically using utf-16 internal format nsstring immutable thus initialized modified nsmutablestring modifiable version nsvalue wrapper class c data types nsnumber wrapper class c number data types int double float data structures foundation kit hold objects primitive types wrappers nsvalue nsnumber used data structures dynamic array objects supporting constant-time indexing nsarray immutable version initialized objects modified nsmutablearray may modified adding removing objects associative data container key-value pairs unique keys searching element addition removal case nsmutabledictionary faster-than-linear however order elements within container guaranteed associative container unique keys similar nsdictionary difference members contain data object wrapper raw byte data object type dynamically allocate manage data refer data owned managed something else static numeric array classes store times dates represent calendrical information offer methods calculating date time differences together nslocale provide methods displaying dates times many formats adjusting times dates based location world foundation kit part cocoa api beginning successor openstep/mach framework deviated openstep compliance places incompatible foundation kit cocoa touch api framework based macos foundation openstep foundation kit implemented gnustep base package implementation mostly comparable 4 classes missing aims comparable openstep api later macos additions foundation kit implemented cocotron open-source implementation cocoa purefoundation open-source implementation foundation implements foundation wrapping core foundation like cocoa rather create separate foundation scratch like gnustep cocotron swiftfoundation apple open-source swift implementation foundation api platforms objective-c runtime
Operating systems
art recovery group art recovery international previously art recovery group private company provides due diligence dispute resolution art recovery services international art market cultural heritage institutions headquartered venice italy company founded 2013 initially specialising recovery stolen claimed works art 2015 company launched artclaim database new art market due diligence resource online-resource developed soza technical ltu technologies introducing image-recognition technology commercial due diligence first time 2016 non-profit company based us formed artclaim database became artive.org art recovery international established 2013 christopher a. marinello lawyer specialising recovery stolen claimed works art prior founding company marinello formerly general counsel art loss register marinello responsible virtually successful art recoveries art loss register 2006-2013 2013 marinello became dissatisfied methods alr chairman julian radcliffe decided form art recovery business stolen art database cases clients followed art recovery international enjoyed almost immediate success acclaim company services provided law enforcement agencies pro-bono basis since establishment art recovery overseen number high-profile recovery cases including works 2015 company launched artclaim database new due diligence resource international art market web-based platform introduced image-recognition technology searches item registrations order improve accuracy efforts reduce trade illicit art october 2015 artclaim database awarded wealth management innovator year spear wealth management awards 2016 non-profit company based us formed artclaim database became artive.org art recovery group ceo christopher a. marinello one world leading practitioners restitution recovery stolen claimed works art involved recovery 500 million worth art high-profile stolen art cases around world marinello also represented heirs paul rosenberg recovery efforts art works looted second world war may 2015 marinello oversaw recovery painting henri matisse discovered munich home cornelius gurlitt behalf rosenberg family 2013 marinello co-founded annual art crime cultural heritage symposium new york university school professional studies
Databases
ibm systems network architecture systems network architecture sna ibm proprietary networking architecture created 1974 complete protocol stack interconnecting computers resources sna describes formats protocols piece software implementation sna takes form various communications packages notably virtual telecommunications access method vtam mainframe software package sna communications sna made public part ibm advanced function communications announcement september 1974 included implementation sna/sdlc synchronous data link control protocols new communications products supported ibm 3704/3705 communication controllers network control program ncp system/370 vtam software cics ims announcement followed another announcement july 1975 introduced ibm 3760 data entry station ibm 3790 communication system new models ibm 3270 display system sna mainly designed ibm systems development division laboratory research triangle park north carolina usa helped laboratories implemented sna/sdlc details later made public ibm system reference library manuals ibm systems journal sna still used extensively banks financial transaction networks well many government agencies ibm still providing support sna one primary pieces hardware 3745/3746 communications controller withdrawn market ibm estimated 20,000 controllers installed however ibm continues provide hardware maintenance service microcode features support users robust market smaller companies continues provide 3745/3746 features parts service vtam also supported ibm ibm network control program ncp required 3745/3746 controllers 2008 ibm publication said ibm mid-1970s saw mainly hardware vendor hence innovations period aimed increase hardware sales sna objective reduce costs operating large numbers terminals thus induce customers develop expand interactive terminal-based systems opposed batch systems expansion interactive terminal-based systems would increase sales terminals importantly mainframe computers peripherals partly simple increase volume work done systems partly interactive processing requires computing power per transaction batch processing hence sna aimed reduce main non-computer costs difficulties operating large networks using earlier communications protocols difficulties included result running large number terminals required lot communications lines number required today especially different types terminals needed supported users wanted use different types applications .e.g cics tso location purely financial terms sna objectives increase customers spending terminal-based systems time increase ibm share spending mainly expense telecommunications companies sna also aimed overcome limitation architecture ibm system/370 mainframes inherited system/360 cpu could connect 16 i/o channels channel could handle 256 peripherals i.e maximum 4096 peripherals per cpu time sna designed communications line counted peripheral thus number terminals powerful mainframes could otherwise communicate limited improvements computer component technology made feasible build terminals included powerful communications cards could operate single standard communications protocol rather stripped-down protocol suited specific type terminal result several multi-layer communications protocols proposed 1970s ibm sna itu-t x.25 became dominant later important elements sna include sna removed link control application program placed ncp following advantages disadvantages sna core designed ability wrap different layers connections blanket security communicate within sna environment would first connect node establish maintain link connection network negotiate proper session handle flows within session level different security controls govern connections protect session information network addressable units sna network components assigned address send receive information distinguished follows sna essentially offers transparent communication equipment specifics impose constraints onto lu-lu communication eventually serves purpose make distinction lu types application must take functionality terminal equipment account e.g screen sizes layout within sna three types data stream connect local display terminals printers sna character string scs used lu1 terminals logging sna network unformatted system services uss 3270 data stream mainly used mainframes system/370 successors including zseries family 5250 data stream mainly used minicomputers/servers system/34 system/36 system/38 as/400 successors including system ibm power systems running ibm i. sna defines several kinds devices called logical unit types primary ones use lu1 lu2 lu6.2 advanced protocol application application conversations term 37xx refers ibm family sna communications controllers 3745 supports eight high-speed t1 circuits 3725 large-scale node front-end processor host 3720 remote node functions concentrator router vtam/ncp pu4 nodes attached ibm token ring networks share local area network infrastructure workstations servers ncp encapsulates sna packets token-ring frames allowing sessions flow token-ring network actual encapsulation decapsulation takes place 3745 mainframe-based entities looked alternatives 37xx-based networks ibm partnered cisco mid-1990s together developed data link switching dlsw dlsw encapsulates sna packets ip datagrams allowing sessions flow ip network actual encapsulation decapsulation takes place cisco routers end dlsw peer connection local mainframe site router uses token ring topology connect natively vtam remote user end connection pu type 2 emulator sna gateway server connects peer router via router lan interface end user terminals typically pcs 3270 emulation software defined sna gateway vtam/ncp pu type 2 definition becomes switched major node local vtam without ncp line connection defined using various possible solutions token ring interface 3745 3172 lan channel station cisco escon-compatible channel interface processor
Operating systems
listserv term listserv written registered trademark licensee l-soft international inc. listserv used refer electronic mailing list software applications general properly applied early instances software allows sender send one email list transparently sends addresses subscribers list original listserv software bitnic listserv also known bitnic listserv 1984–1986 allowed mailing lists implemented ibm vm mainframes developed ira fuchs daniel oberst ricky hernandez 1984 mailing list service known listserv bitnic also known listserv bitnic quickly became key service bitnet network provided functionality similar unix sendmail alias sendmail subscriptions managed manually 1986 éric thomas developed independent application originally named revised listserv also known revised listserv first automated mailing list management application prior revised listserv email lists managed manually join leave list people would write human list administrator ask added removed process got time-consuming discussion lists grew popularity 1987 users bitnic listserv migrated thomas version listserv freeware 1986 1993 commercial product developed l-soft company founded listserv author éric thomas 1994 free version limited ten lists 500 subscribers downloaded company web site several list management tools subsequently developed lyris listmanager 1997 sympa 1997 gnu mailman 1998 1986 éric thomas developed concept automated mailing list manager whilst student ecole centrale paris developed software known listserv early software features allowed joining leaving list without need human administration also list owner could add remove subscribers edit templates welcome system messages amongst innovations listserv introduced double opt-in 1993 first spam filter 1995 release thomas listserv 1986 listserv bitnic enhanced provide automatic list management abandoned months later bitnic installed thomas listserv name bitnic thomas products unrelated neither product based product code though electronic mailing lists also known email lists popular continue used today due ease use listserv registered trademark u.s. patent trademark office 1995 based use since 1986 registered swedish patent registration office prv 2001 jurisdictions using word listserv describe different product generic term email-based mailing list kind trademark misuse standard generic terms electronic mailing list elist email list list email list manager email list software software product manages list nevertheless generic use term common times version 15.0 individual user passwords stored clear available users listed site managers postmasters application configuration thus allowing unethical managers attackers compromise site easily try reuse username password sites passwords hashed protect since version 15.5 released 2007 listserv available several licensing options listserv lite free edition non-commercial hobby use listserv lite smaller workloads listserv standard full-featured version listserv hpo high performance option listserv maestro customized targeted email publishing reporting list currently-supported operating systems found http //lsoft.com/products/listserv_os.asp
Internet protocols
gary kildall gary arlen kildall may 19 1942 – july 11 1994 american computer scientist microcomputer entrepreneur created cp/m operating system founded digital research inc. dri kildall one first people see microprocessors fully capable computers rather equipment controllers organize company around concept also co-hosted pbs tv show computer chronicles although career computing spanned two decades mainly remembered connection ibm unsuccessful attempt 1980 license cp/m ibm personal computer gary kildall born grew seattle washington family operated seamanship school father joseph kildall captain norwegian heritage mother emma half-swedish gary grandmother born långbäck sweden skellefteå municipality emigrated canada 23 years age gary attended university washington uw hoping become mathematics teacher became increasingly interested computer technology receiving degree fulfilled draft obligation united states navy teaching naval postgraduate school nps monterey california within hour drive silicon valley kildall heard first commercially available microprocessor intel 4004 bought one processors began writing experimental programs learn processors worked intel consultant days kildall briefly returned uw finished doctorate computer science 1972 resumed teaching nps published paper introduced theory data-flow analysis used today optimizing compilers continued experiment microcomputers emerging technology floppy disks intel lent systems using 8008 8080 processors 1973 developed first high-level programming language microprocessors called pl/m created cp/m year enable 8080 control floppy drive combining first time essential components computer microcomputer scale demonstrated cp/m intel intel little interest chose market pl/m instead kildall wife dorothy established company originally called intergalactic digital research later renamed digital research inc market cp/m advertisements hobbyist magazines digital research licensed cp/m imsai 8080 popular clone altair 8800 manufacturers licensed cp/m became de facto standard support increasing number hardware variations response kildall pioneered concept bios set simple programs stored computer hardware rom eprom chip enabled cp/m run different systems without modification cp/m quick success took kildall surprise slow update high density floppy disks hard disk drives hardware manufacturers talked creating rival operating system kildall started rush project develop cp/m 2 1981 peak popularity cp/m ran 3,000 different computer models dri 5.4 million yearly revenues ibm presided john r. opel approached digital research 1980 bill gates suggestion negotiate purchase forthcoming version cp/m called cp/m-86 ibm pc gary left negotiations wife dorothy usually colleague developer mp/m operating system tom rolander used gary private airplane deliver software manufacturer bill godbout ibm representatives would explain purpose visit insisted dorothy sign non-disclosure agreement advice dri attorney gerry davis dorothy refused sign agreement without gary approval gary returned afternoon tried move discussion ibm forward accounts disagree whether signed non-disclosure agreement well ever met ibm representatives various reasons given two companies failing reach agreement dri products might unwilling sell main product ibm one-time payment rather usual royalty-based plan dorothy might believed company could deliver cp/m-86 ibm proposed schedule company busy developing implementation pl/i programming language data general also possible ibm representatives might annoyed dri spent hours considered routine formality according kildall ibm representatives took flight florida night dorothy took vacation negotiated flight reaching handshake agreement ibm lead negotiator jack sams insisted never met gary one ibm colleague confirmed sams said time accepted someone else group might flight noted flew back seattle talk microsoft sams related story gates already agreed provide basic interpreter several programs pc gates impression story gary capriciously went flying would later tell reporters sams left gates task finding usable operating system weeks later proposed using operating system 86-dos—an independently developed operating system implemented kildall cp/m api—from seattle computer products scp paul allen negotiated licensing deal scp allen 86-dos adapted ibm hardware ibm shipped ibm pc dos kildall obtained copy pc dos examined concluded infringed cp/m asked gerry davis legal options available davis told intellectual property law software clear enough sue instead kildall threatened ibm legal action ibm responded proposal offer cp/m-86 option pc return release liability kildall accepted believing ibm new system like previous personal computers would significant commercial success ibm pc introduced ibm sold operating system unbundled option one operating system options pc dos priced us 40 pc dos seen practically necessary option software titles required without ibm pc limited built-in cassette basic cp/m-86 shipped months later six times expensive 240 sold poorly dos enjoyed far less software support loss ibm deal gary dorothy found pressure bring experienced management gary influence company waned worked various experimental research projects version cp/m multitasking mp/m implementation logo programming language hoped logo educational dialect lisp would supplant basic education seeing demonstration apple lisa kildall oversaw creation dri graphical user interface called gem novell acquired dri 1991 deal netted millions kildall kildall also pursued computing-related projects outside dri seven years 1983 1990 co-hosted public television program side called computer chronicles followed trends personal computing 1984 started another company activenture adapted optical disc technology computer use early 1985 renamed knowledgeset released first computer encyclopedia june 1985 cd-rom version grolier academic american encyclopedia named electronic encyclopedia later acquired banta corporation kildall final business venture known prometheus light sound pls based austin texas developed home pbx system integrated land-line telephones mobile phones kildall colleagues recall creative easygoing adventurous addition flying loved sports cars auto racing boating lifelong love sea although kildall preferred leave ibm affair past known work afterward continually faced comparisons bill gates well fading memories contributions legend grew around fateful ibm-dri meeting encouraged gates various journalists suggesting kildall irresponsibly taken day recreational flight became tired constantly refute story later years occasional private expressions bitterness overshadowed microsoft kildall annoyed university washington asked distinguished graduate attend computer science program anniversary 1992 gave keynote speech gates dropout harvard response started writing memoir computer connections memoir distributed friends expressed frustration people seem value elegance software said gates divisive manipulative user taken much industry appendix called dos plain simple theft first 26 system calls worked cp/m accused ibm contriving price difference pc dos cp/m-86 order marginalize cp/m journalist harold evans used memoir source chapter kildall 2004 book made america concluding microsoft robbed kildall inventions ibm veterans pc project disputed book description events microsoft described one-sided inaccurate august 2016 kildall family made first part memoir available public selling dri novell made kildall wealthy man moved west lake hills suburb austin austin house lakeside property stalls several sports cars plus video studio basement kildall owned flew learjet least one boat lake austin also participated volunteer efforts assist children hiv/aids owned mansion panoramic ocean view pebble beach california near headquarters dri july 8 1994 kildall fell monterey california biker bar hit head exact circumstances injury remain unclear alcoholic later years various sources claimed fell chair fell steps assaulted walked franklin street bar grill wearing harley-davidson leathers checked hospital twice died three days later community hospital monterey peninsula autopsy next day conclusively determine cause death cp/m usenet faq says concussed fall died heart attack connection two unclear buried evergreen washelli memorial park north seattle following announcement kildall death bill gates commented one original pioneers pc revolution creative computer scientist excellent work although competitors always tremendous respect contributions pc industry untimely death unfortunate work missed march 1995 kildall posthumously honored software publishers association software information industry association contributions microcomputer industry april 2014 city pacific grove installed commemorative plaque outside kildall former residence also served early headquarters digital research
Operating systems
mark kriegsman mark edwin kriegsman born 1966 american entrepreneur computer programmer inventor writer director engineering veracode lives massachusetts favorite person world daughter eleanor kriegsman writing porting open-source software 30 years founded ran pioneering software companies including document.com later acquired merrill clearway technologies acquired mirror image internet college kriegsman worked cognitive systems inc. started notable ai researcher roger schank developing large scale rule-based statistical text-processing ai systems later integrated three technologies paper wrote ieee designing document management systems interleaf led found first startup document.com founding clearway kriegsman senior developer stake later acquired symantec clearway created firesite web accelerator content delivery network early webarcher internet search tool late 1998 clearway involved early ad-blocking controversy release ad blocking web software adscreen angered user base spurred lively discussion role advertisements web publishing based user feedback clearway pulled adscreen two days later kriegsman active participant several often overlapping areas software development one founders veracode reflecting long-standing interest software security also however interested secure information sharing open-access movement outspoken skeptic sees shady business practices computer industry kriegsman fascination computers caught attention local newspaper 1979 13 lucy meyer new jersey summit herald reported mark ... likes make programs sometimes patterns sometimes short programs 'that pop head parlayed skill interest writing computer games age 15 released first game starblaster later second panic button graduated hampshire college amherst massachusetts studied cognitive science graduation kriegsman worked cognitive systems inc. later went found several successful technology companies starting document.com later including clearway veracode kriegsman descendant william bradford leader plymouth colony massachusetts well early santa fe merchants willi flora spiegelberg willi mayor santa fe 1884–1886 kriegsman holds following patents patents concerning content delivery networks systems patent concerning dynamic web page assembly caching
Computer security
allegro common lisp allegro common lisp programming language integrated development environment ide developed franz inc dialect language lisp commercial software implementation language common lisp allegro cl provides full american national standards institute ansi common lisp standard many extensions including threads clos streams clos mop unicode ssl streams implementations various internet protocols opengl interface first version allegro common lisp finished end 1986 originally called extended common lisp allegro cl available many operating systems including microsoft windows 32/64-bit many unix unix-like 32-bit 64-bit including macos intel 32/64-bit linux 32/64-bit freebsd 32-bit solaris x64 sparc 32/64-bit unicos uts internationalization localization support based unicode supports various external text encodings provides string character types based universal coded character set 2 ucs-2 allegro cl used without integrated development environment ide available windows linux macos version 8.2 ide written allegro cl includes development tools including editor interface designer allegro cl used deliver applications allegro cl available freeware free express edition limits like constrained heap space non-commercial use customers get access much source code allegro cl allegro cl includes implementation prolog object caching database called allegrocache recent release allegro cl 10.1 supports symmetric multiprocessing allegro cl used implement various applications
Programming language topics
king valley ii king valley ii seal el giza game msx1 msx2 computers konami sequel king valley 1985 msx2 version saw release japan goes rare contest version contest making levels games built-in level editor held four japanese msx magazines two msx.fan beep winners contest received gold cartridge twenty custom stages custom levels saved either disk tape levels interchangeable msx1 msx2 versions far far future inter-planetary archaeologist vick xiii makes choking discovery pyramids earth malfunctioning devices alien origin enough energy destroy earth vick switch core functions el giza game consists six pyramids wall engravings color pattern every pyramid contains 10 levels idea game collect crystals called soul stones level solving different puzzles evading killing enemies using many tools weapons available unlock exit door take next level later konami game nintendo ds reuses stage musics search secret spell sandfall egyptian area game msx 2 version game except minor changes like music remixed items backgrounds recolored
Computer architecture
pass hash cryptanalysis computer security pass hash hacking technique allows attacker authenticate remote server service using underlying ntlm lanman hash user password instead requiring associated plaintext password normally case example security obscurity merely kicks road moving goalposts replaces need stealing plaintext password merely stealing hash using authenticate attacker obtains valid user name user password hash values somehow using different methods tools able use information authenticate remote server service using lm ntlm authentication without need brute-force hashes obtain cleartext password required technique published attack exploits implementation weakness authentication protocol password hash remain static session session password next changed technique performed server service accepting lm ntlm authentication whether runs machine windows unix operating system systems services using ntlm authentication users passwords never sent cleartext wire instead provided requesting system like domain controller hash response challenge-response authentication scheme native windows applications ask users cleartext password call apis like lsalogonuser convert password one two hash values lm nt hashes send remote server ntlm authentication analysis mechanism shown cleartext password required complete network authentication successfully hashes needed attacker hashes user password need brute-force cleartext password simply use hash arbitrary user account harvested authenticate remote system impersonate user words attacker perspective hashes functionally equivalent original passwords generated pass hash technique originally published paul ashton 1997 consisted modified samba smb client accepted user password hashes instead cleartext passwords later versions samba third-party implementations smb ntlm protocols also included functionality implementation technique based smb stack created third-party e.g. samba others reason suffered series limitations hacker perspective including limited partial functionality smb protocol continued evolve years means third parties creating implementation smb protocol need implement changes additions protocol introduced newer versions windows smb historically reverse engineering complex time consuming means even performing ntlm authentication successfully using pass hash technique tools like samba smb client might implemented functionality attacker might want use meant difficult attack windows programs use dcom rpc also attackers restricted using third-party clients carrying attacks possible use built-in windows applications like net.exe active directory users computers tool amongst others asked attacker user enter cleartext password authenticate corresponding password hash value 2008 hernan ochoa published tool called pass-the-hash toolkit allowed 'pass hash performed natively windows allowed user name domain name password hashes cached memory local security authority changed runtime user authenticated — made possible 'pass hash using standard windows applications thereby undermine fundamental authentication mechanisms built operating system tool also introduced new technique allowed dumping password hashes cached memory lsass.exe process persistent storage disk quickly became widely used penetration testers attackers hash harvesting technique advanced previously used techniques e.g dumping local security accounts manager database sam using pwdump similar tools mainly hash values stored memory could include credentials domain users domain administrators logged machine example hashes authenticated domain users stored persistently local sam also dumped makes possible penetration tester attacker compromise whole windows domain compromising single machine member domain furthermore attack implemented instantaneously without requirement expensive computing resources carry brute force attack toolkit subsequently superseded windows credential editor extends original tool functionality operating system support antivirus vendors classify toolkit malware attacker carry pass-the-hash attack must obtain password hashes target user accounts end penetration testers attackers harvest password hashes using number different methods system using lm ntlm authentication combination communication protocol smb ftp rpc http etc risk attack exploit difficult defend due possible exploits windows applications running windows used attacker elevate privileges carry hash harvesting facilitates attack furthermore may require one machine windows domain configured correctly missing security patch attacker find way wide range penetration testing tools furthermore available automate process discovering weakness machine single defense technique thus standard defense depth practices apply – example use firewalls intrusion prevention systems 802.1x authentication ipsec antivirus software reducing number people elevated privileges pro-active security patching etc preventing windows storing cached credentials may limit attackers obtaining hashes memory usually means target account must logged machine attack executed allowing domain administrators log systems may compromised untrusted create scenario administrators hashes become targets attackers limiting domain administrator logons trusted domain controllers therefore limit opportunities attacker principle least privilege suggests least user access lua approach taken users use accounts privileges necessary complete task hand configuring systems use lm ntlm also strengthen security newer exploits able forward kerberos tickets similar way limiting scope debug privileges system may frustrate attacks inject code steal hashes memory sensitive processes restricted admin mode new windows operating system feature introduced 2014 via security bulletin 2871997 designed reduce effectiveness attack
Computer security