text
stringlengths
6
1.88M
source
stringclasses
13 values
waterbed theory waterbed theory observation ascribed larry wall systems human computer languages contain minimum amount complexity attempting push complexity system one place invariably cause complexity pop elsewhere behavior likened waterbed mattress contains certain amount water possible push mattress one place displaced water always cause mattress rise elsewhere water compress impossible push waterbed everywhere volume water remains constant waterbed theory cited significant part design philosophy perl 6
Programming language topics
dnscrypt dnscrypt network protocol authenticates encrypts domain name system dns traffic user computer recursive name servers originally designed frank denis yecheng fu although multiple client server implementations exist protocol never proposed internet engineering task force ietf way request comments rfc dnscrypt wraps unmodified dns traffic client dns resolver cryptographic construction order detect forgery though n't provide end-to-end security protects local network man-in-the-middle attacks also mitigates udp-based amplification attacks requiring question least large corresponding response thus dnscrypt helps prevent dns spoofing dnscrypt also used access control done comodo cdome shield product addition private deployments dnscrypt protocol adopted several public dns resolvers vast majority members opennic network well virtual private network vpn services opendns part cisco announced first public dns service supporting dnscrypt december 2011 shortly followed cloudns australia march 29 2016 yandex announced support dnscrypt protocol public dns servers well web browser later infoblox announced activetrust cloud leveraging dnscrypt secure dns communications october 2016 adguard added dnscrypt dns filtering module users could move isps custom adguard dns servers online privacy ad blocking quad9 public dns resolver service run not-for-profit organization contributed ibm packet clearing house global cyber alliance announced support dnscrypt september 2018 servers support secure protocol mentioned dnscrypt creators ’ list dnscrypt used either udp tcp cases default port 443 even though protocol radically differs https instead relying trusted certificate authorities commonly found web browsers client explicitly trust public signing key chosen provider public key used verify set certificates retrieved using conventional dns queries certificates contain short-term public keys used key exchange well identifier cipher suite use clients encouraged generate new key every query servers encouraged rotate short-term key pairs every 24 hours queries responses encrypted using algorithm padded multiple 64 bytes order avoid leaking packet sizes udp response would larger question leading server respond short packet whose tc truncated bit set client retry using tcp increase padding subsequent queries versions 1 2 protocol use x25519 algorithm key exchange eddsa signatures well xsalsa20-poly1305 xchacha20-poly1305 authenticated encryption dnscrypt protocol also used access control accounting accepting predefined set public keys used commercial dns services identify customers without rely ip addresses
Internet protocols
mustache template system mustache web template system implementations available actionscript c++ clojure coffeescript coldfusion common lisp dart delphi erlang fantom go haskell io java javascript julia lua .net objective-c ocaml perl php pharo python r racket ruby rust scala smalltalk swift tcl cfengine xquery mustache described logic-less system lacks explicit control flow statements like else conditionals loops however looping conditional evaluation achieved using section tags processing lists lambdas named mustache heavy use braces resemble sideways moustache mustache used mainly mobile web applications mustache-1 inspired ctemplate et started github distribution end 2009 first version template engine implemented ruby running yaml template texts preserved main principles input data class input data characterized mvc-view mustache template nothing reference methods input data view logic decisions code contained view markup ex output xml contained template mvp context input data mvp- presenter mustache template mvp- view simplest template hello template section tag text codice_1 boolean value section tag acts like conditional codice_1 array acts like foreach loop template escaped codice_3 contains html wo n't escaped syntax highlighting available atom coda emacs textmate vim visual studio code mustache templates support built many web application frameworks ex cakephp support javascript includes client-side programming many javascript libraries ajax frameworks jquery dojo yui well server-side javascript using node.js commonjs many mustache engine implementations available meet common specification see external links — final users results common syntax march 2011 last spec_version 1.1.2 mustache engines v1.x architecture render method mustache_compiler class parser class mustache inspired numerous javascript template libraries forked original simplicity add certain functionality use handlebars.js self-described br handlebars.js extension mustache templating language created chris wanstrath handlebars.js mustache logicless templating languages keep view code separated like know handlebars differs predecessor h1 /h1 h2 /h2 using context var context mustache would require either block nested object flattening context thus would h1 /h1 h2 /h2
Web technology
chattr bsd-like systems including macos always analogous command set attributes command specifically meant display specific options command used instead solaris commands specifically meant manipulate used instead unices general analogous commands similar-sounding commands hp-ux aix exist unrelated functions among things command useful make files immutable password files certain system files erased software upgrades attributes manipulate originally specific second extended filesystem family ext2 ext3 ext4 available part e2fsprogs package however functionality since extended fully partially many systems including xfs reiserfs jfs ocfs2 btrfs file system includes attribute functionality including codice_1 flag turns built-in copy-on-write cow feature btrfs due slower performance associated cow form command form command gnu 1.41.3 attributes include command specific particular file systems ufs bsd systems apfs hfs+ smb afp fat macos support least flags form command bsd-like systems general default user-level command specifically meant display flags file command either codice_13 codice_14 depending system flags passed traditional attributes set cleared super-user also set cleared owner file attributes include bsd systems offer additional flags like offline snapshot sparse uarchive see references
Computer file systems
circuit breaker design pattern circuit breaker design pattern used modern software development used detect failures encapsulates logic preventing failure constantly recurring maintenance temporary external system failure unexpected system difficulties assume application connects database 100 times per second database fails application designer want error reoccur constantly also want handle error quickly gracefully without waiting tcp connection timeout generally circuit breaker used check availability external service external service database server web service used application circuit breaker detects failures prevents application trying perform action doomed fail safe retry implementations circuit breaker design pattern need retain state connection series requests must offload logic detect failures actual requests therefore state machine within circuit breaker needs operate sense concurrently requests passing one way achieved asynchronously multi-node clustered server state upstream service need reflected across nodes cluster therefore implementations may need use persistent storage layer e.g network cache memcached redis local cache disk memory based record availability application external service circuit breaker records state external service given interval external service used application storage layer queried retrieve current state safe say benefits outweigh consequences implementing circuit breaker negatively affect performance much depends storage layer used generally available resources largest factors regard type cache example disk-based vs. memory-based local vs. network following sample implementation php proof concept stores status mysql server shared memory cache apc following script could run set interval crontab
Programming language topics
d-grid d-grid initiative german grid initiative government project fund computer infrastructure education research e-science germany uses term grid computing d-grid started september 1 2005 six community projects integration project dgi well several partner projects d-grid integration project intended integrate community projects d-grid integration project acted service provider science community germany project office located institute scientific computing iwr forschungszentrum karlsruhe resources ensure sustainable grid infrastructure provided four work packages six community projects participated d-grid initiative astrogrid-d also referred german astronomy community grid gacg joint research project thirteen astronomical institutes grid-oriented computer science groups supported supercomputing centers main objective astrogrid-d integration german research facilities unified nationwide research infrastructure field astronomy goal improve efficiency usability hardware software resources including computer clusters astronomical data archives observational facilities robotic telescopes astrogrid-d supports standards international virtual observatory alliance ivoa cooperates closely international projects grid development astrogrid-d managed astrophysical institute potsdam aip collaborative climate community data processing grid c3-grid scientific researchers trying understand earth system including subsystems like oceans atmosphere biosphere last decades amount data increased enormously field climate research one hand due rapid rise computing power scientists able use models higher resolution perform long term simulations scientists able couple models mentioned subsystems complex cumulative simulations producing petabytes output collected distributed data archives hand monitoring earth satellites results second huge data stream climate research uniform access distributed data available creates bottleneck scientific research c3-grid proposes link distributed data archives management c3-grid alfred wegener institute polar marine research awi bremerhaven gdi-grid geodateninfrastrukturen-grid spatial data infrastructure grid project focuses solutions efficient integration processing geodata based gis sdi technologies project integrate gdi grid technologies working gdi-grid infrastructure thus demonstrate complementarity fields science distributed geospatial data—currently accessed via standardized gis sdi services—will build basis endeavour data basis put use processing merging data creating standards-based multi-functional generic sdi services project focuses data models services workflows spatial data infrastructures services integration processing management spatial data developed implemented within d-grid infrastructure proof concept given using number representative scenarios emergency routing disaster management flood simulation sound propagation simulation project managed university hanover regional computing center lower saxony rrzn hep-grid project focused high energy physics nuclear well astroparticle physics main task hep-grid optimize data analysis using distributed computing storage resources project developments extensions grid middleware enabling grids e-sciencee project european grid infrastructure large hadron collider lhc computing grid lcg project provide significant improvements data analysis experiments currently taking data planned proposed international linear collider ilc hep-grid deutsches elektronen synchrotron desy german electron synchrotron hamburg collaborates eight german research facilities universities set associate partners ingrid community project field grid computing engineering sciences ingrid aims enable engineering projects grid-based applications allow common efficient use common compute software resources grid technologies promised combine competences modeling simulation optimization five typical applications foundry technologies metal forming technologies groundwater flow transport turbine simulation fluid-structure interaction considered showcases cover three central areas computationally intensive engineering applications coupled multi-scale problems coupled multi-discipline problems distributed simulation-based optimization particular adaptive scalable process models grid based runtime environments tasks developed support virtual prototyping optimization scientific engineering operational sequences emphasis project project management ingrid provided high performance computing center höchstleistungsrechenzentrum stuttgart hlrs university stuttgart joint project medigrid unifies research institutes medicine biomedical informatics life sciences consortium partners industry healthcare research facilities main goal medigrid development aggrid middleware integration platform enabling escience services biomedical life science project formed four modules middleware ontology resource fusion escience developed grid infrastructure biomedical users user communities represented three research modules biomedical informatics image processing clinical research sugi sustainable grid infrastructure gap project german grid initiative major task disseminate knowledge grid technology enhance use thus sugi addresses academic computing centers well enterprises still adopted grid technology supported providing grid resources services experiences d-grid projects made available institutions thus sugi offers training courses attends external courses create video audio recordings provide online d-grid communities via scaling training infrastructure sugi-portal sugi claimed develop training systems grid middleware simplify installation servicing procedures work development evaluation legal organizational structures grid technologies developed natural life sciences opportunities deploying grid computing e-science concepts areas well textgrid grid project humanities uses buzzword e-humanities textgrid promised create grid-based infrastructure collaborative editing annotation analysis publication specialist texts researchers philology linguistics related fields addition providing comprehensive toolset project establishes open platform projects plug textgrid valuegrids developed service level management service value networks supposed enable providers software-as-a-service solutions utilize grid infrastructures leverage german national grid infrastructure valuegrids project partners sap ag coordinator conemis ag ibm deutschland research development gmbh university freiburg karlsruhe institute technology several partner projects involved d-grid e-science project wisent wissensnetz energiemeteorologie promised optimize cooperation scientific organizations energy meteorology employing grid technologies main focus research influence weather climate transformation transport utilisation energy 100 german research facilities funded 20 billion euros 3 years german federal ministry education research
Distributed computing architecture
d3dx computing d3dx direct3d extension deprecated high level api library written supplement microsoft direct3d graphics api d3dx library introduced direct3d 7 subsequently improved direct3d 9 provides classes common calculations vectors matrices colors calculating look-at projection matrices spline interpolations several complicated tasks compiling assembling shaders used 3d graphic programming compressed skeletal animation storage matrix stacks several functions provide complex operations 3d meshes like tangent-space computation mesh simplification precomputed radiance transfer optimizing vertex cache friendliness strip reordering generators 3d text meshes 2d features include classes drawing screen-space lines text sprite based particle systems spatial functions include various intersection routines conversion from/to barycentric coordinates bounding box sphere generators d3dx library contains pre-written routines things common 2d/3d applications games since direct3d api relatively low-level using d3dx library usually much simpler 2012 microsoft announced d3dx would deprecated windows 8 sdk along development frameworks xna shader effects texture management geometry optimizations mesh models available separate sources published codeplex mathematical constructs d3dx like vectors matrices would consolidated xnamath directxmath spherical harmonics math provided separate source d3dx library follows com object oriented programming model functionality accessed using c++-like interfaces id3dxeffect interface used compiling binding fx shaders .fx supports automatic mapping named shader parameters hardware constant registers parameter pools mapping textures available samplers specifying 'techniques modifying render states id3dxfont interface used draw 2d text see also d3dxcreatetext creates 3d meshes text id3dxline interface used drawing anti-aliased screen-space lines pattern id3dxmesh interface used storage meshes mesh optimization vertex cache friendliness strip reordering functions d3dx operate interface example d3dxcomputetangentframe creating tangent-space frame effects like normal parallax mapping descendant class id3dxpmesh geometry simplification used precomputed radiance transfer technique similar spherical harmonics lighting used precomputed global illumination soft ambient lighting id3dxsprite interface c++ class used drawing 2d image screen known sprite computer graphics directx 7 typically done using directdraw api deprecated programmer typically needs call id3dxsprite object begin method set render state world transform 2d drawing call draw method add textures list drawn finally call end method draw images screen restore original graphics state common criticism d3dxsprite slow issue addressed direct3d 9 computes tangent-space frame mesh used effects like normal/bump mapping parallax mapping anisotropic lighting models handles vertices tangent-space discontinuities making duplicates thus solving hairy ball problem n't handle reversed uv winding faces models mirrored texture mapping may run lighting troubles
Operating systems
wizardry proving grounds mad overlord wizardry proving grounds mad overlord first game wizardry series role-playing video games developed andrew greenberg robert woodhead 1980 norman sirotek formed sir-tech software inc. launched beta version product 1980 boston computer convention final version game released 1981 game one first dungeons dragons-style role-playing games written computer play first game offer color graphics also first true party-based role-playing video game game eventually ended first trilogy also included proving grounds needs completed order create party could play remainder trilogy starting town represented text-based menu player creates party six characters assortment five possible races humans elves dwarves gnomes hobbits three alignments good neutral evil four basic classes fighter priest mage thief four elite classes bishop priest mage spells samurai fighter mage spells lord fighter priest spells ninja fighter thief abilities unlocked characters progressed sufficiently good evil characters normally assigned party characters equipped basic armor weaponry party descends dungeon trebor castle consists maze ten levels progressively challenging last classes multiple spells seven levels characters learn advance style play employed game come termed dungeon crawl goal subsequent role-playing video games find treasure including ever potent items gain levels experience killing monsters face evil arch-wizard werdna bottom level retrieve powerful amulet goal levels find elevator stairs going next level without killed process graphics original game extremely simple today standards screen occupied text 10 devoted first-person view dungeon maze using high-resolution line graphics standards day however graphics improved text-only games far common monsters encountered dungeon maze disappears replaced picture one monsters combat 1 4 groups monsters game lack automap feature invented time release practically forces player draw map level graph paper included box walk 20x20 dungeon maze step step – failing often results becoming permanently lost many locations maze permanent darkness spell upon square making player walk blindly teleport spell sending player new location magic spell used determine current location party higher levels teleport spell used quickly transition maze levels care necessary teleporting player must enter level coordinates teleport number steps north south east west current location easily possible land trap solid stone ending game original releases wizardry also announce player teleported play resumes one step forward taken game unforgiving difficulty players save progress within dungeon must exit dungeon first event total party kill play resumed however new party may recover bodies items dead adventurers later wizardry games made easier restarting point dungeon characters died take hundreds hours finish game wizardry saves player party game progress onto scenario disk booting new one may created blank floppy disk existing one used completion proving ground mad overlord necessary play sequels wizardry ii iii since require characters first game imported scenario disk series exploits involves identification ability bishops allows characters gain massive experience points gold according co-author robert woodhead cheats actually bug caused game lack bounds-checking disabled fit within 48k ram ibm pc version game released bug declared feature deliberately included andrew greenberg cornell university student began project development 1978 game early playable state fall 1979 became popular among fellow students wizardry drew influences earlier games plato system notably 1977 role-playing game oubliette initially coded applesoft basic greenberg woodhead rewrote ucsd pascal basic proved slow playable wait run-time system available early 1981 publishing game took two half man-years complete delay benefited wizardry permitting almost one year playtesting game balancing release distinguishing others ultima frederick sirotek norman businessman father company financier insisted packaging documentation professional also distinguishing game others sold ziploc bags commodore 64/128 versions wizardry 1-3 share common code base apple originals use run-time 6502 pascal interpreter provides support overlays low-level functions interface hardware uscd pascal also used ibm versions x86 version interpreter lengthy load time extensive disk access problem wizardry however commodore versions particularly suffer provided variety workarounds c128 mode vdc memory used store overlays reus supported c64 c128 mode wizardry 2-5 also detect 16k 64k vdc memory present use 1571 drive burst mode faster load time werdna trebor names greenberg woodhead spelled backwards names also appear initials i.e. acg rjw map eighth ninth floors sir-tech published wizardry revision 2 1982 implemented number near features john m. morrison space gamer 50 commented time old disk wearing definitely recommend sending 5 transfer backup characters 'll get revision 2 boot wizardry shipped september 1981 almost immediately became hit popular apple ii game year 30 june 1982 sold 24,000 copies making one best-selling computer rpgs north america time comparison temple apshai 1979 sold 30,000 copies 1981 sold 20,000 copies time electronic games described wizardry 1983 without doubt popular fantasy adventure game apple ii present time wizardry eventually sold 200,000 copies course three years outselling original ultima time based sales market-share data video magazine listed wizardry tenth list best selling video games february 1985 ninth best seller list march 1985 ii computing listing wizardry third list top apple ii games october–november 1985 behind zork sargon iii ahead zaxxon ultima iii within months wizardry release least two commercial game trainers appeared despite sir-tech denouncing use game also perhaps first strategy guide wizisystem promised average player could succeed game successful easy-to-follow format child psychiatrist reported success using game therapy game eventually led series eight games spanning twenty years helped set genre standards intuitive layout interface forrest johnson reviewed wizardry space gamer 46 johnson commented wizardry represents leap computer game design certainly best d-style computer game market game reviewed 1982 dragon 65 bruce humphrey humphrey stated much good game difficult decide begin concluded describing easily beaten solved recommend anyone tired mediocre programs ho-hum dungeon encounters computer gaming world year praised one all-time classic computer games complex yet playable major faults minor one described review ease parties initially killed macintosh version game known fans macwizardry reviewed 1986 dragon nowiki /nowiki first role computers column reviewers called macwizardry delightful reintroduction marvelous classic subsequent column reviewers gave mac version game 4 5 stars jerry pournelle named one two games month march 1986 writing n't know fascination wizardry describe objective terms seems boring—which certainly witness time eaten month wizardry series ported various japanese computers nec pc-8801 became popular along ultima inspired jrpg series like dragon quest final fantasy 1984 softline readers named game popular apple program time game top-rated adventure five years computer gaming world reader poll ultima iv replaced 1986 score 7.69 10 1988 wizardry among first members magazine hall fame honoring games rated highly time readers magazine 1982 review predicted 1990 game received ninth-highest number votes survey computer gaming world readers all-time favorites 1991 1993 magazine scorpia wrote mainly hack-and-slash still grand expedition even today 1996 magazine named wizardry 16th best game ever editors wrote seminal dungeon romp rpg sent ad fans scrambling buy apple iis
Computer architecture
shedun shedun family malware software also known kemoge shiftybug shuanet targeting android operating system first identified late 2015 mobile security company lookout company affecting roughly 20,000 popular android applications lookout claimed hummingbad malware also part shedun family however claims refuted avira protection labs stated shedun family malware detected cause approximately 1500-2000 infections per day three variants virus known share roughly ~80 source code mid 2016 arstechnica reported approximately 10.000.000 devices would infected malware new infections would still surging malware primary attack vector repackaging legitimate android applications e.g facebook twitter whatsapp candy crush google snapchat adware included app remains functional released third party app store downloaded application generates revenue serving ads estimated amount 2 us per installation users get rid virus without getting new device way get rid malware root affected devices re-flash custom rom addition shedun-type malware detected pre-installed 26 different types chinese android-based hardware smartphones tablet computers shedun-family malware known auto-rooting android os using well-known exploits like exynosabuse memexploit framaroot causing potential privilege escalation serving trojanized adware install within system partition operating system even factory reset remove malware infected devices shedun malware known targeting android accessibility service well downloading installing arbitrary applications usually adware without permission classified aggressive adware installing potentially unwanted program applications serving ads april 2016 shedun malware security researchers considered next impossible remove entirely avira security researcher pavel ponomariov specialized android malware detection tools mobile threats detection mobile malware detection automation research published in-depth analysis computer virus
Computer security
google daydream daydream virtual reality vr platform developed google built android mobile operating system versions nougat 7.1 later compatible phones follow platform software hardware specifications thus designated daydream-ready used google daydream view virtual reality head-mounted display mount daydream platform announced google i/o developer conference may 2016 first vr headset released november 10 2016 daydream company second vr platform following google cardboard low-cost system intended encourage interest vr built compatible mobile apps rather operating system confused daydream screensaver feature introduced android 4.2 2012 renamed screen saver 2016 launch vr platform first-generation google daydream view announced october 4 2016 daydream-ready smartphones placed front compartment daydream view viewed vr headset two lenses view distinguished previous vr head mounts constructed light-weight cloth material well featuring capacitive nubs nfc chip simplify process setting virtual reality viewing daydream view released november 10 2016 daydream view launched slate color option two new color choices crimson snow became available december 8 2016 review google daydream view adi robertson verge wrote headset best mobile headset 'd ever used complimenting squishy foam-and-fabric body significantly smaller lighter portable samsung gear vr design keeps lenses relatively protected travel also liked device weight distribution writing rests weight forehead cheeks option 've found comfortable allows wear easily hours time also praised material particularly plastic sliders rather velcro patches head strap writing allows wider range sizes avoids gathering lint view overall design could almost pass airplane sleep mask meaning avoids looking ostentatiously high-tech intimidating google daydream headsets packaged wireless controller controller used interacting virtual world button presses waving device on-board sensors used track orientation controller approximate position user hand daydream view controller stored inside headset use controller touch pad two circular buttons one functioning home button one functioning app-specific button two volume buttons along status light controller rechargeable charges via usb-c. support pages google notes daydream view n't include charger cables instead directs users purchase google store may 2016 google i/o developer conference google announced virtual reality vr mode called daydream would coming new android release nougat vr mode lets players use virtual reality apps including youtube google maps street view google play movies tv google photos immersive view google recruited media companies like netflix ubisoft entertainment apps january 2017 google opened daydream program third-party developers second-generation daydream view unveiled made google 2017 event first time available three colors namely charcoal fog coral largely similar first-generation improvements including slightly altered design improved lenses wider field view hand augmented reality major upgrade exclusive second-generation design released 19 october 2017 launch price us 99 lenovo mirage solo headset announced ces 2018 first standalone headset running google daydream platform powered qualcomm snapdragon 835 system-on-chip 4 gb ram 64 gb internal storage expandable microsd dual mics 3.5mm headphone jack 2560 x 1440 lcd screen 4,000 mah battery highlight feature support google worldsense improved position tracking technology headset designed coupled mirage camera point-and shoot 180-degree 3d vr camera two lenses capture 4k lenovo released device may 2018 price 399 daydream work certain newer phones specific components google announced google i/o conference eight hardware partners make daydream-ready phones samsung htc lg xiaomi huawei zte asus alcatel phones dedicate processing power daydream mode order reduce latency prevent nausea sundar pichai expects 11 android smartphones support daydream vr sale end 2017 following phones confirmed daydream-ready google play movies app daydream developed maintained google discontinued june 2019
Operating systems
fairyland story gameplay often compared taito platform games bubble bobble newzealand story liquid kids japanese msx version developed published hot-b released 1987 sharp x68000 port developed published 1991 sps fairyland story would included arcade game collections taito legends 2 taito memories jokan taito legends power-up 2003 port japanese mobile phones made available i-mode ezweb network services fairyland story platform arcade game player controls witch ptolemy series single-screen stages objective defeat enemies screen ptolemy main weapon projectile magic temporarily transform enemies large cakes caked form enemies destroyed either magic attacks dropped platform possibly squashing enemies squashing one enemy results award points sometimes extra bonuses 2000 points awarded squashing enemy cake additional enemy doubling number points awarded two enemies killed one spot coin appear spot may collected additional points collected multiply points long player n't lose life ptolemy enemies based upon typical fantasy beings include orcs pig-like soldiers salamanders dragon-like creatures breath fire wizards mages make ptolemy shrink disappear clerics bishops multiply golems wraiths hooded creatures phase ptolemy magic ptolemy takes long clear level last remaining enemy eventually enemy disappear without award points however ptolemy takes long clear one enemy level flying devil named horned appears kill ptolemy devil invulnerable ptolemy magic way survive ptolemy kill remaining enemies game element similar beluga skel monsta fish limit time allowed level later taito game bubble bobble ptolemy deaths animated different ways depending enemy kills sometimes collect utility bonuses increase power range magic short offensive bonuses usually result cake-ification destruction on-screen enemies various intervals levels intermission screen appears game showing ptolemy riding back large wingless blue dragon named rodemy message appears intermission screens either congratulating player warning hazard next level many messages contain incorrect english idioms grammar typical engrish reviewing taito legends 2 kristan reed eurogamer wrote fairyland story lot fun although lacks two-player co-op fun sadly ... hugely addictive though msx port developed published hot-b released september 3 1987 port featured degraded graphics sound arcade version typical arcade ports msx new stages perhaps make degradation graphics sound new stages based taito properties like level 37 resembling mr. chack n chack n pop port also featured two new enemies iron golem golem enemy immune ptolemy magic fleck enemy use magic ptolemy hot-b also developing port famicom port later cancelled unknown reasons later 1992 sharp x68000 port developed published sps released september 27 1991 unlike msx port however straightforward port arcade version like arcade ports sharp x68000 added several features found original arcade version like level progress high score saving choice two soundtracks choices emulation original soundtrack remixed soundtrack 2003 port made available japanese mobile phones via i-mode ezweb network services much information known port besides screenshots music port appearing soundtrack album mobile games made taito emulated versions original arcade version would later included arcade collections taito legends 2 taito memories jokan taito legends power-up ptolemy appears player character space invaders dx 1994 pop n pop 1998 daifugo party 2010 arkanoid vs. space invaders 2017 also made cameo appearances several games including new zealand story 1988 bubble symphony 1994 bubble memories 1996 arkanoid ds 2007 1987 secret island based fairyland story named magical island enemies music used secret island ptolemy appear versions rainbow islands feature secret island however make cameo appearance game boy color port rainbow islands cutscenes proceeding magical island worm enemy makes appearances doko 1989 doko 2 1991 many bubble bobble new zealand story gameplay elements even graphics bonuses first appeared fairyland story
Computer architecture
uae emulator uae computer emulator emulates hardware commodore international amiga range computers released gnu general public license uae free software uae released 1995 originally called unusable amiga emulator due inability boot early stages known unix amiga emulator later names well since none popular expansions fit abbreviation longer stands anything software simply known uae — occasionally gets backronymed universal amiga emulator ultimate amiga emulator ubiquitous amiga emulator uae almost full-featured amiga emulator emulates functions software uae may use disk images made original amiga floppy disks images file extension adf amiga disk file actual amiga disks used limitations floppy controllers used computers images amiga formatted hard drives also made uae also supports mapping host operating system directories amiga hard drives uae include original amiga operating system rom files required running amiga system included license packages like amiga forever original kickstart 3.1 rom images also included amigaos4 powerpc since version 4.1 update 4 uae also supports alternative system roms derived aros project however provide degree software compatibility original roms uae ported many host operating systems including linux macos freebsd dos microsoft windows risc os beos palm os android xbox console psp psvita gp2x handhelds ios wii dreamcast consoles even amigaos morphos aros many threads past usenet public forums people argued possibility writing amiga emulator considered uae attempting impossible demanding system read process output 100 mb/s data fastest pc 66 mhz 486 keeping various emulated chips amiga chipset sync appearing supposed appear software uae almost entirely unusable first releases slowly step step fleshed support amiga chipset end 1997 able emulate amiga 500 quality speed sufficient productivity use many games since uae usable thanks partly effort taken develop partly big improvements technology brought computers many times faster uae initially running many amiga games applications run smoothly pentium ii-era system realization useful amiga emulator could written contributed increase enthusiasm emulation started sped-up efforts write emulators often less popular computer electronic game architectures major improvement made 2000 bernd meyer use just-in-time compilation significantly improved emulation speed extent average pcs could emulate amiga software faster real amiga could run uae use much host power native mode possible balance requirements host os accurately reflect original speed depending user choice uae also provides rtg-compatible video card amiga side emulation tailored display host hardware limited emulation original amiga video hardware five main forks original program active fork winuae current versions still contain bugs compatibility issues specific versions
Computer architecture
yamaha ym2413 ym2413 a.k.a opll cost-reduced fm synthesis sound chip manufactured yamaha corporation based ym3812 opl2 make chip cheaper manufacture many internal registers removed result ym2413 play one user-defined instrument time 15 instrument settings hard-coded altered user cost-cutting modifications number waveforms reduced two channels mixed using adder instead chip dac uses time-division multiplexing play short segments channel sequence also done ym2612 ym2413 used
Computer architecture
osborne pc prototype early summer 1983 effort launched produce version osborne executive would compatible ibm pc although venture partners contributed 9 million funding april another 11 million june osborne unable raise additional 20 million considered necessary get ibm-compatible product market tiger team formed primarily create prototype dos compatible printed circuit board front bezel accommodate changes connectors design used many parts executive including disc drives display chassis power supply keyboard completed six weeks shown number potential investors unable generate sufficient interest save company bankruptcy 2 august new jersey plant shut 89 workers laid days later 200 workers let go hayward ca facility early september banks seized company accounts receivable 9 september additional 270 workers fired production ceased leaving 80 employees california payroll three days later 12 september porter hurt filed suit 4.5 million owed firms pc boards 13 september 1983 occ filed chapter 11 protection oakland ca federal bankruptcy court listing assets 40 million liabilities 45 million 600 creditors
Computer architecture
dna-os dna-os french-made operating system supersede muteka obsolete operating system still providing posix thread api said soclib website kernel-mode lightweight operating system multiprocessor system chip build top thin hal ease porting new platforms processor architecture dna/os support virtual memory dna-os layered microkernel operating system written c99 released gnu gplv3 license
Computer architecture
satmetrix satmetrix systems inc. privately held experience management company headquartered san mateo california united states satmetrix systems operates subsidiary nice ltd company founded customercast inc. 1997 andre o. schwager roselie buonauro acquired nice systems july 2017 company provides satmetrix npx customer experience management cem platform provides business consulting services including design strategy analytics implementation satmetrix provides survey platform market research customer satisfaction loyalty customer feedback along bain company fred reichheld satmetrix systems co-developed net promoter score nps metric serves measure loyalty consumer provider
Distributed computing architecture
ducks demo ducks demo tech demo demonstrated capabilities playstation 2 e3 2000 playstation 3 e3 2005 playstation 2 demo one duck shown interacting water bathtub playstation 3 demo many ducks interacting environment visual representation leap processing abilities playstation 2 sony executives promise playstation 3 deliver ducks demo basis super rub dub downloadable title ps3 produced scee demo phil harrison shows crowd small bathtub rubber ducks uses demonstrate real-time water ripples dynamics uses two toy pirate ships demonstrate cloth dynamics show cell processing power adds huge amount ducks tub reacting would real-life due advanced physics engine phil comments dryly possible use lod technology n't know lod stands lots ducks phil harrison invites creator eyetoy show new technology playstation 3 use plugging standard playstation 2 eyetoy playstation 3 picks two ordinary cups proceeds move cups scooping motion scoops water pictured screen animating reacting real water would ducks demo basis super rub dub downloadable title ps3 produced scee
Computer architecture
ieee 802.3 ieee 802.3 working group collection institute electrical electronics engineers ieee standards produced working group defining physical layer data link layer media access control mac wired ethernet generally local area network lan technology wide area network wan applications physical connections made nodes and/or infrastructure devices hubs switches routers various types copper fiber cable 802.3 technology supports ieee 802.1 network architecture 802.3 also defines lan access method using csma/cd
Internet protocols
virtual private database virtual private database vpd masks data larger database subset data appears exist without actually segregating data different tables schemas databases typical application constraining sites departments individuals etc operate records time allowing privileged users operations e.g reports data warehousing etc access whole table term typical oracle dbms implementation general tables associated sql functions return predicate sql expression whenever query executed relevant predicates involved tables transparently collected used filter rows select insert update delete different rules
Computer security
numalink numalink system interconnect developed silicon graphics sgi use distributed shared memory ccnuma computer systems numalink originally developed sgi origin 2000 onyx2 systems time systems introduction branded craylink sgi brief ownership cray research hewlett packard enterprise entered original equipment manufacturer oem arrangement silicon graphics international sgi use numalink foundation mission critical servers numalink 1 sgi engineers deemed system interconnect used stanford dash first generation numalink interconnect numalink 2 branded craylink second generation interconnect announced october 1996 used onyx2 visualization systems origin 200 origin 2000 servers supercomputers numalink 2 interface hub asic numalink 2 capable 1.6 gb/s peak bandwidth two 800 mb/s pecl 400 mhz 16-bit unidirectional links numalink 3 third generation interconnect introduced 2000 used origin 3000 altix 3000 numalink 3 capable 3.2 gb/s peak bandwidth two 1.6 gb/s unidirectional links name numaflex used modular design approach around time numalink 4 fourth generation interconnect introduced 2004 used altix 4000 numalink 4 capable 6.4 gb/s peak bandwidth two 3.2 gb/s unidirectional links numalink 5 fifth generation interconnect introduced 2009 used altix uv series numalink 5 capable 15 gb/s peak bandwidth two 7.5 gb/s unidirectional links numalink 6 sixth generation interconnect introduced 2012 used sgi uv 2000 sgi uv 3000 sgi uv 30 numalink 6 capable 6.7 gb/s bidirectional peak bandwidth 256 socket system 64tb coherent shared memory numalink 7 seventh generation interconnect introduced 2014 used hpe integrity mc990 x/sgi uv 300 sgi uv 30ex sgi uv 300h sgi uv 300rl numalink 7 capable 14.94 gb/s bidirectional peak bandwidth 64 socket system 64tb coherent shared memory numalink 8 eighth generation interconnect introduced 2017 used hpe superdome flex numalink 8 capable 853.33 gb/s bisection peak bandwidth 64 links cut 32 socket system 48tb coherent shared memory
Computer architecture
ibm intelligent cluster ibm intelligent cluster cluster solution high-performance computing composed primarily ibm system x ibm bladecenter ibm system storage components integrated network switches various vendors optional high-performance infiniband interconnects solution previously known ibm system cluster 1350 eserver cluster 1350 simply e1350 roughly twice year solution components updated include then-current products ibm vendors solution predated eserver cluster 1300 e1300 based then-current pentium iii processors introduced november 2001 replaced e1350 october 2002 introduction pentium 4-based intel xeon processors operating system choices officially limited enterprise linux distributions red hat suse microsoft windows hpc server 2008 systems management ibm offered xcat additional software gpfs loadleveler could also ordered ibm intelligent cluster systems integrated factory-built tested cluster solutions comprehensive warranty service components including third-party options system could comprise traditional rack-optimized nodes well ibm bladecenter idataplex nodes processor choices intel xeon amd opteron processors along integrated storage switches provide turnkey linux microsoft cluster environment
Distributed computing architecture
nokia n85 nokia n85 high-end smartphone produced nokia announced 27 august 2008 part nseries line n85 runs symbian os v9.3 s60 3rd edition platform feature pack 2 released october retailing 450 euros taxes major feature n85 introduced amoled display giving brighter sharper colours n85 dual-slider like nokia n95 access either media playback buttons numeric keypad 25 slimmer size upper sliding keys illuminate four multimedia keys music video playback two gaming keys playing n-gage 2.0 games also navi wheel like nokia n81 replaced bases design well gps receiver 5-megapixel camera dual led flash fm transmitter n85 well received decent upgrade n95 well better actual flagship nokia n96 costed 100 euros additions somewhat critically negative compared n96 n85 thinner lighter camera lens cover larger battery capacity usb charging via microusb port amoled screen although without large internal memory dvb-h receiver two-way slider spring assistance mechanism optional dvb-h nokia mobile tv receiver su-33w possible watch television screen phone
Operating systems
swiv swiv 2d vertically scrolling shoot 'em game originally released 1991 commodore amiga atari st commodore 64 zx spectrum amstrad cpc home computer formats converted game boy color 2001 game considered spiritual successor tecmo arcade game silkworm sales curve previously converted home computer formats 1989 game heritage evident game design whereby one player pilots helicopter armoured jeep swiv official sequel noted ex-sales curve producer dan marchant swiv n't really sequel silkworm certainly inspired several shoot-'em-ups played loved game amiga manual however explained swiv acronym special weapons interdiction vehicle also short silkworm iv even though silkworm ii iii swiv vertically scrolling shoot-em-up plays typical fashion games genre player chooses using either helicopter jeep beginning game plays chosen vehicles scrolling levels shooting oncoming enemies two players present vehicles used certain enemies shot drop shield power-ups either picked afford temporarily invincibility detonated destroy enemies onscreen every often boss enemy attack destruction bosses give upgrades player forward firing gun amiga version ’ cheat mode could activated typing ncc1701d title screen release swiv met positive reviews magazines time receiving 92 amiga format magazine 88 commodore format c64 version 91 amiga action 90 computer video games 90 sinclair game ranked 27th best game time amiga power swiv popular enough spawn direct sequel arrived super nes title super swiv later ported mega drive mega swiv 1997 sequel titled swiv 3d released making use 3d terrain models
Computer architecture
ceva semiconductor company ceva publicly listed semiconductor intellectual property ip company headquartered mountain view california specializes digital signal processor dsp technology company main development facility located herzliya israel sophia antipolis france ceva recently named israeli 100 companies list technologies changed world ceva created november 2002 combination dsp ip licensing division dsp group parthus technologies plc irish company founded 1993 company develops semiconductor intellectual property core technologies multimedia wireless communications technology ceva claimed largest number baseband processors 2010 90 dsp ip market share 2011 july 2014 acquired rivierawaves sas private company based france
Computer architecture
jean e. sammet jean e. sammet march 23 1928 – may 20 2017 american computer scientist developed formac programming language 1962 also one developers influential cobol programming language received b.a mathematics mount holyoke college 1948 m.a mathematics university illinois urbana-champaign 1949 received honorary d.sc mount holyoke college 1978 sammet employed sperry gyroscope 1955 1958 supervised first scientific programming group 1958 1961 worked sylvania staff consultant programming research member original cobol group joined ibm 1961 developed formac first widely used computer language symbolic manipulation mathematical formulas ibm researched use restricted english programming language use natural language mathematical programs programming technology planning manager federal systems division 1968 1974 appointed software technology manager 1979 sammet founded acm special interest committee symbolic algebraic manipulation sicsam 1965 chair special interest group programming languages sigplan first female president acm 1974 1976 jean e. sammet born march 23 1928 new york city jean sister helen born harry ruth sammet lawyers jean helen attended public elementary schools manhattan sammet strong interest mathematics unable attend bronx high school science accept girls instead sammet attended julia richman high school sammet chose enroll mount holyoke college based strength mathematics program sammet majored mathematics took education courses allowed certified teach high school mathematics new york minored political science graduating mount holyoke sammet pursued graduate studies university illinois received 1949 taking courses toward ph.d. teaching assistant mathematics department university illinois 1948 1951 sammet first encountered computer 1949 university illinois impressed considering obscene piece hardware 1951 sammet began looking position education sammet forced search positions new jersey new york city hiring new teachers authorities new jersey determined sammet missing two courses studies course education one history new jersey sammet fought determination stating knowledge new jersey history strengthen ability teach mathematics high school forced sammet seek types employment 1951 sammet took position metropolitan life insurance company trainee actuary agreed participate in-house training program learn punched card accounting machines sammet took electronic accounting machines unable work machines training complete left position insurance office enrolled columbia university pursue ph.d. mathematics sammet worked teaching assistant barnard college 1952-1953 school year decided academic life 1953 1958 sammet mathematician sperry gyroscope new york spent time working mathematical analysis problems clients ran analog computer sammet worked department navy ’ submarine program time early january 1955 sammet began life programmer sperry gyroscope working digital computer sperry electronic digital automatic computer speedac asked sammet programmer first task write basic loader speedac 20-line program took three days toggle computer hand binary sammet became group leader called “ open shop ” sperry began hiring programmers “ open shop ” consisted programmers acting consultants engineers involved scientists assisted writing testing routines group produced system software focused scientific engineering computations 1955 sperry gyroscope remington rand merged became sperry rand merger allowed sammet access univac computer grace hopper fall 1956 sammet taught one earliest graduate-level courses computer programming applied mathematics department adelphi college university long island despite fact adelphi computer textbooks programming existed time sammet able instruct two courses two years sammet decided leave sperry work company computers focal point classifieds time separated gender sammet unable find position woman field interested decided scan men ’ list found engineer position sylvania electric products needham massachusetts sammet instead hired oversee software development mobidic project carl hammer person responsible sylvania ’ software development 1959 sammet five programmers established much design influential cobol programming language proposal written span two weeks eventually accepted sylvania u.s. government clients around 1965 1966 sammet noticed need exchange intellectual information others working languages software worked formac member acm number years active became interested starting special interest group would allow speak professionals field couple failed attempts contacting person charge special interest groups special interest committees acm sammet contacted george forsythe president acm 1964 1966 named chairperson special interest committee symbolic algebraic manipulation order gain interest sicsam sammet wrote letters people identified publications happening field time identified people bell labs carnegie mellon ibm different divisions groups sammet faced resistance interest group numerical analysis acm roughly five years sicsam formed conference mathematical software called signum sammet states fought way give paper signum group interested non-numerical analysis kind activity assistance interested sicsam sammet organized conference held march 1966 symposium symbolic algebraic manipulation symsam june 1966 tony oettinger elected president acm sammet elected northeast regional representative 1966-1968 also member acm council acm lecturer 1967 1968 1972 bernie galler elected president acm 1968 august 1968 sammet became chairperson acm committee sigs sics 1971 elected chair sigplan served one year two-year term resigning elected vice president acm 1972 chairperson sigplan organized conferences sigplan various special interest groups sammet stated conferences organized based recognition fundamental programming languages different aspects within computing sammet served vice president acm june 1972 june 1974 working president acm time tony ralston sammet made finances acm priority time vice presidency acm almost bankrupt sammet convinced ralston hold member-office forum prior annual conference sammet encouraged based recognition acm realistic way communicating membership sammet died may 20 2017 silver spring maryland brief illness
Programming language topics
postmodernism generator postmodernism generator computer program automatically produces close imitations postmodernist writing written 1996 andrew c. bulhak monash university using dada engine system generating random text recursive grammars free version also hosted online essays produced formal grammar defined recursive transition network nassim nicholas taleb writes monte carlo generators 2001 book fooled randomness real instance reverse turing test human declared unintelligent writing told apart generated one mentioned biologist richard dawkins conclusion article postmodernism disrobed 1998 scientific journal nature reprinted book devil chaplain 2004
Computational linguistics
immunix immunix discontinued commercial operating system provided host-based application security solutions last release immunix gnu/linux distribution version 7.3 november 27 2003 immunix inc. creator apparmor application security system may 10 2005 novell acquired immunix inc. long-time partner novell apparmor one novell primary interests result adopted company renamed novell apparmor powered immunix september 2007 novell laid apparmor team
Operating systems
trusted solaris trusted solaris discontinued security-evaluated operating system based solaris sun microsystems featuring mandatory access control model trusted solaris 8 common criteria certified evaluation assurance level eal4+ capp rbacpp lspp protection profiles basis dodiis trusted workstation program features previously available trusted solaris fine-grained privileges part standard solaris release solaris 10 11/06 update new component called solaris trusted extensions introduced making longer necessary different release modified kernel labeled security environments solaris trusted extensions opensolaris project solaris trusted extensions enabled enforces mandatory access control policy aspects operating system including device access file networking print window management services achieved adding sensitivity labels objects thereby establishing explicit relationships objects appropriate explicit authorization allows applications users read and/or write access objects component also provides labeled security features desktop environment apart extending support common desktop environment trusted solaris 8 release delivered first labeled environment based gnome solaris trusted extensions facilitates access data multiple classification levels single desktop environment solaris trusted extensions also implements labeled device access labeled network communication commercial internet protocol security option cipso standard cipso used pass security information within labeled zones solaris trusted extensions complies federal information processing standards fips
Operating systems
dialer dialer american english dialler british english electronic device connected telephone line monitor dialed numbers alter seamlessly provide services otherwise require lengthy national international access codes dialed dialer automatically inserts modifies numbers depending time day country area code dialed allowing user subscribe service providers offer best rates example dialer could programmed use one service provider international calls another cellular calls process known prefix insertion least cost routing line powered dialer need external power instead takes power needs telephone line another type dialer computer program creates connection internet another computer network analog telephone integrated services digital network isdn many operating systems already contain program connections point-to-point protocol ppp wvdial many internet service providers offer installation cds simplify process setting proper internet connection either create entry os dialer install separate dialer aol software recent years term dialer often refers specifically dialers connect without user full knowledge cost creator dialer intending commit fraud call centers several dialling modes depending call placed 'manual dialing refers calls placed manually agent 4 different dialing modes depending software dialers selects contacts going called starts making calls automated dialers sold noble systems avaya convoso formerly safesoft solutions place calls using *preview* *power* auto dialing predictive dialing dialing modes defined according campaign type business preview dialing enables agents first view available information customer decide place call addition information customer agents may also view history customer contact center viewing information customer agent requests system make call example preview dialing useful debt collection campaigns allow agents view information customer define strategy starting talk customer system delivers preview calls agents automatically taking account priority call skills agent handle call preview dialing keeps agents dialing calls manually power dialer similar autodialer software enables telemarketers sales teams call centers dial list phone numbers automatically completely hands-free thus saving valuable time energy would otherwise wasted dialing hand predictive dialing state-of-the-art pacing mode used call large number customers within short period time predictive dialing optimizes time agents reducing idle times connected calls freeing agents dialing calls predictive dialing gathers statistics concerning duration calls long takes calls answered often calls answered agent become idle system places several calls predictive dialing campaigns achieve agent productivity 50 minutes per hour nuisance ratios 3 less system continually updating predictive dialing probabilities monitoring nuisance ratios performance compliance legislation example predictive dialing useful sales campaigns call large number contacts maximizing working time agents performance predictive dialing takes consideration accuracy contact lists policies nuisance calls contact list poor performance predictive dialing campaign risk agents connected live contacts able business power ivr used deliver pre-recorded message large call list call answered power ivr play audio file collect touch tone key responses speech command end message transfer call agent remove caller call list words ivr technology allows computer interact humans use voice dtmf tones input via keypad voice drop power ivr except wait touch tone key responses speech command end message playing message call dropped mostly used payment reminders similar dialers necessary connect internet least non-broadband connections dialers designed connect premium-rate numbers providers dialers often search security holes operating system installed user computer use set computer dial number make money calls alternatively dialers inform user promise special content accessible via special number examples content include software download usually illegal trojans posing mp3s trojans posing pornography 'underground programs cracks keygens cost setting service relatively low amounting thousand dollars telecommunications equipment whereupon unscrupulous operator typically take 90 cost premium rate call overheads users dsls similar broadband connections usually affected dialer downloaded installed dialing possible regular phone numbers dsl network users typically dial-up modem connected phone line however isdn adapter additional analog modem installed dialer might still able get connection malicious dialers identified following characteristics computers running microsoft windows without anti-virus software proper updates could vulnerable visual basic-scripts install trojan horse changes values windows registry sets internet explorer security settings way activex controls downloaded internet without warning change made user accesses malicious page email message start installing dialer script also disables modem speaker messages normally come dialing network users microsoft office outlook outlook express internet explorer especially affected running activex controls javascript allowed latest security patches microsoft installed march 2004 malicious dialers could installed fake anti-virus software e-mail spam so-called antivirus team example contained download links programs named downloadtool.exe antivirus.exe malicious dialers ways transmission include electronic greeting cards link pages tricks user install activex controls turn install dialers background therefore links spam emails never opened automatically started downloads canceled soon discovered one check dial-up internet see whether displayed phone number unchanged another way protect oneself disable premium numbers one phone services course disables services one never run foreign code privileged environment unless source trustworthy also advisable protect oneself anti-malware programs 15 august 2003 new law came effect germany called gesetz zur bekämpfung des missbrauchs von 0 190er/ 0 900er mehrwertdiensterufnummern law combat misuse 0 190/ 0 900 value added service numbers law contains following regulations 4 march 2004 german federal supreme court karlsruhe decided fees usage dialers paid used without user knowledge december 2016 ofcom office communications announced changes call centre regulations focused persistent use dialers make call residential telephone numbers also added extra clarity call centres approach issue silent abandoned calls ofcom also regulate abandoned call messages work message state company name reason calling importantly used opportunity market business
Computer security
dave aitel dave aitel computer security professional joined nsa research scientist aged 18 worked six years employed consultant stake three years 2002 founded security software company immunity cto aitel co-authored several books also well known writing several security tools dave aitel infrequent guest fox news channel provides commentary information security news
Computer security
cabig cancer biomedical informatics grid cabig us government program develop open-source open access information network called cagrid secure data exchange cancer research initiative developed national cancer institute part national institutes health maintained center biomedical informatics information technology cbiit 2011 report cabig raised significant questions effectiveness oversight budget scope significantly trimmed may 2012 national cancer informatics program ncip created cabig successor program national cancer institute nci united states funded cancer biomedical informatics grid cabig initiative spring 2004 headed kenneth buetow goal connect us biomedical cancer researchers using technology known grid computing program led center bioinformatics information technology cbiit began 3-year pilot phase pilot phase concluded march 2007 trial announced buetow promoted program 2008 addition cagrid underlying infrastructure data sharing among organizations cabig developed software tools data sharing policies common standards vocabularies facilitate data sharing software tools targeted cabig sought provide foundational technology approach biomedicine called “ learning healthcare system. ” relies rapid exchange information among sectors research care researchers clinicians able collaboratively review accurately incorporate latest findings work ultimate goal speed biomedical research process also promoted often called personalized medicine cabig technology used adaptive clinical trials investigation serial studies predict therapeutic response imaging molecular analysis 2 i-spy2 designed use biomarkers determine appropriate therapy women advanced breast cancer health information technology hit promoted management secure exchange medical information among researchers health care providers consumers hit initiatives mentioning cabig nci american society clinical oncology initiated collaboration create oncology-specific electronic health record system using cabig standards interoperability enable oncologists manage patient information electronic format accurately captures specific interventional issues unique oncology nationwide health information network initiative share patient clinical data across geographically disparate sources create electronically linked national health information exchange might somehow related big health consortium formed 2008 promote personalized medicine disbanded 2012 july 2009 cabig announced collaboration dr. susan love research foundation build online cohort women willing participate clinical trials called army women goal one million database december 2009 site launched 30,000 women men signed 2010 cancer genome atlas aimed characterize 10,000 tumors across least 20 cancers 2015. cabig provided connectivity data standards tools collect organize share analyze diverse research data database since 2007 nci worked uk national cancer research institute ncri two organizations shared technologies collaborative research secure exchange research data using cagrid ncri oncology information exchange onix web portal announced august 2009 onix shut march 2012 duke cancer institute used cabig clinical trials tools collaboration beijing cancer hospital peking university project intended connect 65 nci-designated cancer centers enable collaborative research participating institutions could either “ adopt ” cabig tools share data directly cagrid “ adapt ” commercial in-house developed software cabig-compatible cabig program developed software development kits sdks interoperable software tools instructions process adapting existing tools developing applications cabig-compatible enterprise support network program included domain-specific expertise support service providers third party organizations provide assistance contract-for-services basis web portal using liferay software available 2008 2013 since 2004 cabig program used open-source communities adapted public-private partnerships cabig program produced software contract software development teams largely within commercial research community general software developed us government contracts property us government us taxpayers depending terms specific contracts might accessible request freedom information act foia timeliness response requests might preclude requester ever gaining secondary value software released foia request cabig program placed cabig software software repository freely accessible download open source means anyone modify downloaded software however licensing applied downloaded software allows greater flexibility typical individual enterprise allowed contribute modified code back cabig program required likewise modifications made available open source required made available open source cabig licensing even allows use cabig applications components combined additions modifications released commercial products aspects cabig program actually encourage commercialization cabig technology 2008 glaxosmithkline announced would share cancer cell genomic data cabig private companies claimed benefits cabig technology 2010 cagrid community web site created 2007 1.x version core software added github project mid-2013 bsd 3-clause license used version 4.03 globus toolkit taverna workbench system manage workflow business process execution language software called introduce developed around 2006 contributors included ohio state university center clinical translational science private companies ekagra software technologies semantic bits 2008 questioned program benefiting large pharmaceutical companies 2011 project spent estimated 350 million although goal considered laudable much software unevenly adopted developed great expense compete commercial offerings march 2011 nci working group assessment concluded cabig ... expanded far beyond goals implement overly complex ambitious software enterprise nci-branded tools especially clinical trial management system ctms space produced limited traction cancer community compete established commercial vendors create financially untenable long-term maintenance support commitments nci 2012 nci announced new program national cancer informatics program ncip successor cabig cagrid computer network software supported cancer biomedical informatics grid cabig initiative national cancer institute us national institutes health cabig voluntary virtual informatics infrastructure connects data research tools scientists organizations 2013 national cancer informatics program ncip re-released cagrid bsd 3-clause license migrated source repository github cagrid uses version 4.03 globus toolkit produced globus alliance cagrid portal web-based application built liferay enables users discover interact services available cagrid infrastructure portal serves primary visualization tool cagrid middleware also served cabig information source cagrid portal users access information cabig participants cagrid points contact pocs cagrid-related news events cagrid workflow uses march 2011 nci published extensive review cabig nci cbiit program funded cagrid software development see included long list problems program recommended software development projects discontinued
Distributed computing architecture
list digital forensics tools 1980s digital forensic investigations consisted live analysis examining digital media directly using non-specialist tools 1990s several freeware proprietary tools hardware software created allow investigations take place without modifying media first set tools mainly focused computer forensics although recent years similar tools evolved field mobile device forensics list includes notable examples digital forensic tools memory forensics tools used acquire analyze computer volatile memory ram often used incident response situations preserve evidence memory would lost system shut quickly detect stealthy malware directly examining operating system running software memory mobile forensics tools tend consist hardware software component mobile phones come diverse range connectors hardware devices support number different cables perform role write blocker computer devices software forensics science analyzing software source code binary code determine whether intellectual property infringement theft occurred centerpiece lawsuits trials settlements companies dispute issues involving software patents copyrights trade secrets software forensics tools compare code determine correlation measure used guide software forensics expert
Computer security
wavefront technologies wavefront technologies computer graphics company developed sold animation software used hollywood motion pictures industries founded 1984 santa barbara california bill kovacs larry barels mark sylvester started company produce computer graphics movies television commercials market software off-the-shelf computer animation tools available time 1995 wavefront technologies purchased kroyer films silicon graphics rhythm hues merged alias research form alias|wavefront wavefront developed first product preview first year business company production department helped tune software using commercial projects creating opening graphics television programs one first customers purchase preview universal studios television program knight rider early customers included nbc electronic arts nasa wavefront early animation software created bill kovacs jim keating john grower left robert abel associates roy hall others developed company flagship product wavefront advanced visualizer 1988 wavefront released personal visualizer desktop workstation interface high-end rendering software wavefront software developed silicon graphics computers later ported sun ibm hewlett-packard tektronix dec sony systems wavefront purchased silicon graphics first production workstation offer buy prototype given demo knocked back 1989 company released data visualizer early commercial tool scientific visualization 1991 wavefront introduced composer image manipulation product composer became standard 2d 3d compositing special effects feature films television 1992 wavefront released two new animation tools worked advanced visualizer kinemation character animation system used inverse kinematics natural motion dynamation tool interactively creating modifying particle systems realistic natural motion dream quest images used dynamation composer create 90 visual effects sequences film crimson tide 1994 year rival alias made deal nintendo wavefront partnered atari develop gameware game development software gameware exclusive graphics animation development system atari jaguar wavefront software used numerous major films including luxo jr. great mouse detective akira tin toy technological threat knick knack dogs go heaven rock-a-doodle outbreak aladdin true lies stargate electronic arts richard taylor said wavefront software beautifully designed even non-technical person could learn wavefront major reason cg took leap forward wavefront involved several mergers major computer graphics software companies 1980s 1990s 1988 wavefront acquired abel image research division robert abel associates founder bill kovacs previously worked acquisition partially financed belgian government following wavefront establishment office ghent association barco graphics kortrijk acquiring abel image research increased wavefront presence japan japanese conglomerate csk became part owner wavefront japan 1990 helping expand company asia wavefront acquired rival computer graphics company thomson digital images france 1993 tdi software featured innovations nurbs modeling interactive rendering company also extensive distribution channels europe asia february 7 1995 silicon graphics announced would purchase wavefront technologies alias research deal totaling approximately 500 million sgi merged two companies create alias|wavefront goal creating advanced digital tools combining companies strengths reducing duplication time merger wavefront market value 119 million 1994 revenues 28 million partially motivated merger microsoft purchase alias wavefront competitor softimage sgi saw microsoft entrance market threat merged alias wavefront compete microsoft alias owned autodesk softimage october 2008 1997 whilst working wavefront jim hourihan received academy award technical achievement creation dynamation bill kovacs roy hall received scientific engineering academy award 1998 work advanced visualizer 2003 alias|wavefront awarded academy award scientific technical achievement maya software created combination earlier software wavefront alias tdi
Computer architecture
jffs journaling flash file system jffs log-structured file system use flash memory devices linux operating system superseded jffs2 flash memory specifically flash must erased prior writing erase process several limitations constraints combine produce profound asymmetry patterns read write access flash memory contrast magnetic hard disk drives offer nearly symmetrical read write access read speed write speed nearly identical constrained rate disk spins possible read write small blocks sectors typically 512 4096 bytes practical limit number times magnetic media written rewritten traditional file systems ext2 fat designed use magnetic media typically update data structures in-place data structures like inodes directories updated on-disk every modification concentrated lack wear-levelling makes conventional file systems unsuitable read-write use flash devices jffs enforces wear levelling treating flash device circular log changes files directories written tail log nodes node header containing metadata written first followed file data nodes chained together offset pointers header nodes start valid become obsolete newer version created free space remaining file system gap log tail head runs low garbage collector copies valid nodes head tail skips obsolete ones thus reclaiming space
Computer file systems
fasttrack scripting host fasttrack automation studio formerly known fasttrack scripting host – often referred fasttrack – scripting language windows system administrators product ’ goal handle kind scripting might required automate processes microsoft windows networks web site product located www.fasttrackscript.com fasttrack produced fasttrack software headquartered aalborg denmark product promoted manufacturer one-stop shop windows script writers development paradigm “ one operation one script line ” script writers use purpose-built editor create scripts inserting script lines via menus drag ’ n drop simply typing scripts may used box created scratch imported forums users customized product documentation simple scripts include advanced scripts include hood scripts comprise commands functions collections conditions script executed components converted many lines c code sometimes hundreds lines depending particular script operation scripts compiled exe files msi packages treated standalone windows applications fasttrack scripting host fasttrack first developed around 2006 ease administration burden system administrators windows networks idea product came founder president fasttrack software lars pedersen background systems administration previously telenor denmark ’ major telephone company pedersen performed various roles systems administration programming web development also worked consultant developer several major projects various companies europe dissatisfied experiences frustrations administering windows networks pederson looked way make life easier system administrators particular wanted something could minimize amount time needed day perform routine mundane tasks waste time expertise committed projects leading small team developers pedersen developed fasttrack scripting host simplify automate routine tasks system administrators resulting product definitely scripting language used intuitively like programming language without requiring users learn syntax concepts typically associated programming languages april 2010 fasttrack software entered agreement binary research international based city milwaukee united states market sell product globally fsh received windows pro community choice award 2012 first version produced june 2006 contained 51 components commands functions conditions collections making fasttrack following table summarizes dates components major releases companies organizations noaa kawasaki goodyear used implemented fasttrack scripting host
Programming language topics
national centre text mining national centre text mining nactem publicly funded text mining tm centre established provide support advice information tm technologies disseminate information larger tm community also providing tailored services tools response requirements united kingdom academic community software tools services nactem supplies allow researchers apply text mining techniques problems within specific areas interest – examples tools highlighted addition providing services centre also involved makes significant contributions text mining research community nationally internationally initiatives europe pubmed central centre located manchester institute biotechnology operated organized university manchester school computer science nactem contributes expertise natural language processing information extraction including named-entity recognition extractions complex relationships events hold named entitites along parallel distributed data mining systems biomedical clinical applications termine domain independent method automatic term recognition used help locate important terms document automatically ranks acromine finds known expanded forms acronyms appeared medline entries conversely used find possible acronyms expanded forms previously appeared medline disambiguates medie intelligent search engine semantic retrieval sentences containing biomedical correlations medline abstracts facta+ medline search engine finding associations biomedical concepts facta+ visualizer web application aids understanding facta+ search results intuitive graphical visualisation kleio faceted semantic information retrieval system medline abstracts europe pmc evidencefinder europe pmc evidencefinder helps users explore facts involve entities interest within full text articles europe pubmed central database eupmc evidence finder anatomical entities meta-knowledge similar europe pmc evidencefinder allowing exploration facts involving anatomical entities within full text articles europe pubmed central database facts filtered according various aspects interpretation e.g. negation certainly level novelty info-pubmed provides information graphical representation biomedical interactions extracted medline using deep semantic parsing technology supplemented term dictionary consisting 200,000 protein/gene names identification disease types organisms ascot efficient semantically-enhanced search application customised clinical trial documents hom semantic search system historical medical document archives biolexicon large-scale terminological resource biomedical domain genia collection reference materials development biomedical text mining systems grec semantically annotated corpus medline abstracts intended training ie systems and/or resources used extract events biomedical literature corpus medline abstracts annotated experts metabolite enzyme names collection corpora manually annotated fine-grained species-independent anatomical entities facilitate development text mining systems carry detailed comprehensive analyses biomedical scientific text enrichment genia event corpus events enriched various levels information pertaining interpretation aim allow systems trained distinguish events factual information experimental analyses definite information speculated information etc objective argo project develop workbench analysing primarily annotating textual data workbench accessed web application supports combination elementary text-processing components form comprehensive processing workflows provides functionality manually intervene otherwise automatic process annotation correcting creating new annotations facilitates user collaboration providing sharing capabilities user-owned resources argo benefits users text-analysis designers providing integrated environment development processing workflows annotators/curators providing manual annotation functionalities supported automatic pre-processing post-processing developers providing workbench testing evaluating text analytics big mechanisms large explanatory models complicated systems interactions important causal effects whilst collection big data increasingly automated creation big mechanisms remains largely human effort becoming made increasingly challenging according fragmentation distribution knowledge ability automate construction big mechanisms could major impact scientific research one number different projects make big mechanism programme funded darpa aim assemble overarching big mechanism literature prior experiments utilise probabilistic interpretation new patient panomics data integrate machine reading cancer literature probabilistic reasoning across cancer claims using specially-designed ontologies computational modeling cancer mechanisms pathways automated hypothesis generation extend knowledge mechanisms 'robot scientist performs experiments test hypotheses repetitive cycle text mining modelling experimental testing worldview updating intended lead increased knowledge cancer mechanisms project aims produce knowledge repository philippine biodiversity combining domain-relevant expertise resources philippine partners text mining-based big data analytics university manchester national centre text mining repository synergy different types information e.g. taxonomic occurrence ecological biomolecular biochemical thus providing users comprehensive view species interest allow 1 carry predictive analysis species distributions 2 investigate potential medicinal applications natural products derived philippine species collaboration text-mining group european bioinformatics institute ebi mimas data centre forming work package europe pubmed central project formerly ukpmc hosted coordinated british library europe pmc whole forms european version pubmed central paper repository collaboration national institutes health nih united states europe pmc funded consortium key funding bodies biomedical research funders contribution major project application text mining solutions enhance information retrieval knowledge discovery application technology developed nactem projects large scale prominent resource biomedicine community project aims transform biodiversity heritage library bhl next-generation social digital library resource facilitate study discussion via social media integration legacy science documents biodiversity worldwide community raise awareness changes biodiversity time general public project integrates novel text mining methods visualisation crowdsourcing social media bhl resulting digital resource provide fully interlinked indexed access full content bhl library documents via semantically enhanced interactive browsing searching capabilities allowing users locate precisely information interest easy efficient manner project aims conduct novel research text mining machine learning transform way evidence-based public health ebph reviews conducted aims project develop new text mining unsupervised methods deriving term similarities support screening searching ebph reviews develop new algorithms ranking visualising meaningful associations multiple types dynamic iterative manner newly developed methods evaluated ebph reviews based implementation pilot ascertain level transformation ebph reviewing
Computational linguistics
plumber program plumber plan 9 bell labs inferno operating systems mechanism reliable uni- multicast inter-process communication formatted textual messages uses plan 9 network file protocol 9p rather special-purpose ipc mechanism number clients may listen named port file messages ports port routing defined plumbing rules rules dynamic listening program receives copy matching messages example data /sys/lib/plumb/basic plumbed standard rules sent edit port port write copy message listener case running editors interpret message file name open file plumber 9p file server provides service clients may use libplumb format messages since messages 9p network transparent
Computer file systems
nokia x7-00 nokia x7-00 symbian^3 smartphone nokia xseries first xseries phone nokia symbian^3 platform shipped anna update also successor x6 previous multimedia touchscreen phone similar features specifications series x7-00 announced 12 april 2011 alongside nokia e6 16 october 2018 hmd global announced new android smartphone china nokia x7 well known nokia 8.1 globally
Operating systems
squeezebox network music player squeezebox network music player logitech squeezebox originally discontinued favor visually similar simplified logitech ue smart radio 2013 logitech added official menu option install squeezebox software smart radio effectively turning squeezebox radio slim devices established 2000 first known slimserver used streaming music launched hardware player named slimp3 able play streams 2001 although first player fairly simple supporting wired ethernet mp3 natively followed two years later slightly advanced player renamed squeezebox versions followed gradually adding native support additional file formats wi-fi-support gradually adding larger advanced displays well version targeting audiophile users support playing music external streaming platforms pandora napster last.fm sirius also added devices general two operating modes either standalone device connects internet streaming service directly local computer running logitech media server network-attached storage device server software large parts firmware recent players released open source licenses 2006 slim devices acquired logitech 20 million usd logitech continued development player announced august 2012 would discontinued online service mysqueezebox.com needed use squeezebox without private server still maintained logitech given cross-platform nature server software client users ensured continued use platform utilizing raspberry pi dedicated squeezebox device client server first-generation hardware requires logitech media server formerly slimserver squeezecenter squeezebox server run free open source software wired-ethernet natively supports one audio format mp3 logitech media server transcode audio formats mp3 fly using lame mp3 encoder second generation hardware also called sb1 avoid confusing squeezebox product range sb1 originally used display slimp3 main feature additions included optional 802.11b wi-fi support uncompressed pcm/wav/aiff audio streams headphone coaxial optical s/pdif outputs successor models required server may slimserver ended rev 6.5.4 squeezecenter rev 7.x logitech media server slim devices offered bitmap display upgrade hardware longer available units 40×2 noritake character display others 280×16 pixel noritake bitmap display third generation hardware features included optional 802.11g wi-fi native support audio formats flac wma ogg upgraded 320×32 pixel greyscale bitmap vfd display visualizers bitmapped fonts model infrared remote control analog outputs volume control headphone jack coaxial optical digital outputs squeezebox2 supports numerous audio formats including mp3 windows media audio musepack monkey audio apple lossless flac shorten wav aiff ogg vorbis unencrypted aac mp3 windows media flac wav aiff ogg vorbis natively supported player firmware remainder automatically transcoded logitech media server host software one player-supported formats drm-crippled aac apple itunes music store supported squeezebox classic aka squeezebox3 aka sb3 aka squeezebox 3rd generation fourth generation hardware features technical specifications identical squeezebox2 new board chassis design used well new remote internal wi-fi antennas introduction duet squeezebox3 renamed squeezebox classic transition logitech production sb3 available slim devices logitech housing dimensions 7.6 w × 3.7 h × 3.1 192 mm × 93 mm × 80 mm including stand fifth generation hardware features similar squeezebox v3 geared towards audiophiles additional features squeezebox v3 include dual 320×32 pixel displays front panel buttons tactile feedback knob redesigned backlit remote control balanced xlr unbalanced audio outputs balanced unbalanced digital inputs outputs aes/ebu s/pdif inputs operation standalone dac rs-232 serial connection external control infrared input output new design consists sophisticated remote called squeezebox controller aka sbc display like sonos separate simplified network music player box called squeezebox receiver aka sbr connecting stereo sbr operate without sbc although supported logitech recommended advanced users sbc also operate audio player integrated speaker integrated headphone jack additional sbrs could bought separately differences squeezebox classic squeezebox duet include squeezebox controller first unit squeezebox line runs squeezeos embedded linux distribution devices less slim previous squeezeboxes squeezebox radio squeezebox touch also squeezeos based squeezebox controller largely rendered obsolete smartphone tablet pc apps squeezebox touch surpasses squeezebox receiver respects squeezebox duet discontinued early 2011 departure previous models boom combines squeezebox functionality dsp 30 w integrated amplifier bi-amped stereo two-way speakers produce self-contained device requires network connection either wired wireless power without network connection boom still amplify play line level signal external player 3.5mm mini-jack plug squeezebox boom discontinued early 2011 replacement model squeezebox radio adds color screen 2.4 all-in-one design older sibling squeezebox boom mono configuration squeezebox radio powered optional proprietary battery pack made available march 2010 running logitech media server two squeezebox radios synchronized set play one stereo channel thus working stereo device also using headphones one use one single squeezebox radio stereo device squeezebox touch functional successor sb3 couple new features simplified interface limited functionality visually similar squeezebox radio interface option switch squeezebox firmware discontinued 2014
Programming language topics
dock macos dock prominent feature graphical user interface macos used launch applications switch running applications dock also prominent feature macos predecessor nextstep openstep operating systems earliest known implementations dock found operating systems risc os nextstep ios version dock iphone ipod touch ipad apple applied us patent design dock 1999 granted patent october 2008 nearly decade later application dragged dropped onto dock add dock application dragged dock remove except finder trash permanent fixtures leftmost rightmost items highest lowest items dock vertically oriented respectively part macos core services dock.app located /system/library/coreservices/ nextstep openstep dock application launcher holds icons frequently used programs icon workspace manager recycler always visible dock indicates program running showing ellipsis icon program running n't ellipsis icon macos running applications variously identified small black triangle mac os x 10.0-10.4 blue-tinted luminous dot mac os x 10.5-10.7 horizontal light bar os x 10.8 10.9 simple black white dot os x 10.10-present macos however dock used repository program file operating system hold number items resizes dynamically fit using magnification better view smaller items default appears bottom edge screen also instead placed left right edges screen user wishes applications normally keep icons dock still appear running remain quit features unlike dock next operating systems capacity dock dependent display resolution may attempt recover shelf functionality since macos inherits technology nextstep minimal shelf functionality implemented finder changes dock bring functionality also close apple newton os button bar found messagepad 2x00 series likes applications could dragged extras drawer finder-like app onto bar also screen put landscape mode user could choose position button bar right left side screen like dock macos macos dock also extended menus control applications without making visible screen applications simple options quit keep dock remove dock options though applications use menus purposes itunes uses menu way user control certain playback options applications include changing status online alias msn aim/ichat etc automatically saving changes made document current application feature made available macos docklings mac os x 10.4 earlier also opened using right-mouse button mouse one time either clicking holding control-click bring menu mac os x leopard docklings replaced stacks stacks stack files small organized folder dock opened left-clicking stacks could shown three ways fan grid list similar docklings grid view folders stack opened directly stack without need open finder ios dock used store applications since ios 4 folders containing applications unlike macos dock maximum 4 icons placed dock iphone ipod touch maximum ipad however 16 icons 13 apps 3 recently opened apps size dock ios changed application dock launched clicking jump software finished loading additionally application requires attention user jump even higher icon clicked user attends demands original version dock found mac os x public beta 10.0 presents flat white translucent interface aqua styled pinstripes dock found mac os x 10.1 tiger removes pinstripes otherwise identical mac os x leopard lion presents applications three-dimensional glassy surface perspective instead traditional flat one resembling sun microsystems project looking glass application dock os x mountain lion mavericks changes look resemble frosted glass rounded corners os x yosemite reverts two-dimensional appearance similar mac os x tiger although translucent blur effect iphone os 1 3 dock used metal look looks similar front mac pro ios 4 adopted dock design mac os x leopard lion used ios 7 uses similar dock mac os x tiger ios 7 styled blur effects ios 11 dock ipad redesigned resemble macos dock classic mac os dock-like application called launcher first introduced macintosh performa models 1993 later included part system 7.5.1 performs basic function also add-ons dragthing added dock users earlier versions microsoft implemented simplified dock feature windows 98 quick launch toolbar feature remained windows vista various docks also used linux bsd examples window maker emulates look feel nextstep gui docky avant window navigator kxdocker amongst others kde various gdesklet/adesklets docks afterstep wharf derivation nextstep ui itask ng module used enlightenment-based linux distributions gos blackbox slit bruce tognazzini usability consultant worked apple 1980s 1990s mac os x developed wrote article 2001 listing ten problems saw dock article updated 2004 removing two original criticisms adding new one one concerns dock uses much screen space another icons show labels pointer hovers similar-looking folders files windows difficult distinguish tognazzini also criticized fact icons dragged dock vanish easy way get back called behavior object annihilation john siracusa writing ars technica also pointed issues dock around releases mac os x public beta 2000 noted dock centered adding removing icons changes location icons review mac os x v10.0 following year also noted dock far many tasks optimum ease-of-use including launching apps switching apps opening files holding minimized windows siracusa criticized dock release mac os x v10.5 noting made less usable sake eye-candy siracusa criticized 3d look reflections faint blue indicator open applications less distinguishable files folders thom holwerda managing editor osnews stated concerns dock including facts grows directions holds trash icon persistent labels holwerda also criticized revised dock appearance mac os x v10.5
Operating systems
comparison file systems following tables compare general technical information number file systems
Computer file systems
shelf computing shelf interface feature nextstep openstep used repository store links commonly used files directories programs temporary holding place move/copy files directories around file system hierarchy macos items may dragged onto sidebar area finder behave placeholders manipulated manner dynamics shelf file system operations illustrated comparison metaphor used microsoft windows operating systems order move file following steps may taken next operating systems addition moving files dragging window window following method used note file dragged shelf moved anywhere changed way shelf icon merely placeholder file moving placeholder shelf actual action occurs next functionality builds upon concept allowing destination directory put shelf well file merely dragged destination directory icon process similar microsoft windows functionality copying cutting file system objects file files folder folders combination clipboard objects copied removed original location paste operation new location completed shelf concept though older powerful file system objects sources destinations persistent available long shelf windows cut copy paste metaphor objects locations persist one copy/move operation complete something else placed clipboard since shelf icons 'placeholders sorts icons put shelf representing commonly used directories commonly used programs put shelf well nextstep openstep file management application called fileviewer run workspace manager also allowed users different shelves associated particular directories users simply opened new browser rooted particular subdirectory browser window would show corresponding shelf allowing users many different shelves based whatever folder hierarchy happened using organize files
Operating systems
alibaba cloud alibaba cloud also known aliyun chinese cloud computing company subsidiary alibaba group alibaba cloud provides cloud computing services online businesses alibaba e-commerce ecosystem alibaba cloud international operations registered headquartered singapore alibaba cloud offers cloud services services available pay-as-you-go basis include elastic compute data storage relational databases big-data processing anti-ddos protection content delivery networks cdn outside status largest cloud computing company china alibaba cloud operates 19 data center regions 56 availability zones around globe june 2017 alibaba cloud placed visionaries quadrant gartner magic quadrant cloud infrastructure service worldwide alibaba cloud 19 regional data centres globally including china north china south china east us west us east europe united kingdom middle east japan hong kong singapore australia malaysia india indonesia data center germany operated vodafone germany frankfurt certified c5 alibaba cloud provides cloud computing iaas paas saas including services e-commerce big data iot object storage oos kubernetes data customization managed alibaba web page using codice_1 command line tool 2017 alibaba cloud singapore university social sciences suss jointly launched university-accredited entrepreneurship program tertiary students
Distributed computing architecture
departmental boot image departmental boot image boot image computer enhanced adding applications passwords specific task group department organization many advantages thin client strategy done operating system base long boot device large enough accommodate boot applications together typical departmental windows xp boot image usually large requires dvd store may large network booting accordingly usually installed fixed removable hard drive kept inside machine rather installed network rom boot image control complexity total cost operations advantages using departmental boot image instead common boot image entire organization thin client disadvantages include complexity creating managing several large boot images determining department needs upgrade applications user allowed discipline soon degrades shop easier manage one consists one-off computers quirks frequently requiring re-imaging whose issues really diagnosable comparable experts believe departmental boot image regime degrades rather quickly state without extraordinary discipline controls advocate thin clients ensure control however increasingly possible restrict users installing applications standard boot image automatically re-install variant boot image detected would draconian large organization one boot image often quite acceptable boot image maintained departmental level users request upgraded minimum bureaucracy waiting
Operating systems
powerpc e6500 powerpc e6500 multithreaded 64-bit power isa-based microprocessor core freescale semiconductor part nxp e6500 power entire range qoriq amp series system chip soc processors share common naming scheme txxxx hard samples manufactured 28 nm process available early 2012 full production later 2012 revised memory subsystem compared previous e5500 core four cores combined cpu cluster sharing large l2 cache e6500 cores supports eight cpu clusters large multiprocessing implementations core first multithreaded core designed freescale reintroduces enhanced version altivec products multithreading allows two virtual cores per hard core organized 2x2-way superscalar one virtual core e6500 often perform better entire e5500 core since freescale essentially duplicated lot logic instead virtualizing addition enhancements core core five integer units four simple one complex two load-store units one 128-bit altivec unit 32+32 kb instruction data l1 caches speeds range 2.5 ghz core designed highly configurable via corenet fabric meet specific needs embedded applications features like multi-core operation interface auxiliary application processing units apu e6501 core revision introduced 2013 enhanced virtualization interrupt support
Computer architecture
linkup linkup formerly mediamax spin-off streamload nirvanix social network file sharing service let users send receive store large amounts data via web one first internet based storage services winning numerous awards one largest failures resulting user data loss june 15 2007 system administrator script accidentally misidentified deleted good data along dead data 3.5 million former user accounts files took october 2007 complete partial restore data much irretrievably lost linkup finally experienced meltdown july 10 2008 left 20,000 paying subscribers without digital music video photo files august 8 2008 site place message saying 're sorry mediamax linkup closed affiliate link competitor box.net
Distributed computing architecture
cn3d cn3d windows macintosh unix-based software united states national library medicine acts helper application web browsers view three-dimensional structures national center biotechnology information entrez retrieval service simultaneously displays structure sequence alignment powerful annotation alignment editing features according official site cn3d public domain source code available
Internet protocols
backup restore backup restore formerly windows backup restore center component microsoft windows introduced windows vista included later versions allow users create backups restore backups created earlier replacement ntbackup included previous windows versions became deprecated feature windows 8 completely removed windows 8.1 favor file history however windows 10 re-incorporated operating system backup restore supports two different types backup file backup system image backup windows uses volume shadow copy service ensure files changed backed vss ensures file system-level consistency application-level consistency applications registered vss writers newer backup media cd dvd blu-ray discs supported backup restore windows backup service windows service responsible backup restore operation backup restore application however way interfacing service wbadmin command-line utility may also used entire disk individual files restored utility addition vhd file attached mounted separate disk regardless latest backup incremental full attached disk reflect state disk latest backup previous version feature exposing older backup sets image-based full-system backup option called complete pc backup windows vista system image windows 7 allows imaging entire system including operating system data volumes backed-up image later restored windows recovery environment either computer new computer different brand type file format used image-based backup vhd vhd image also mounted extracting individual files booted using windows 7 enterprise ultimate full-system image backup done beginning windows vista sp1 system images restored machine different motherboard may different disk controller machine must number disks volume shadow copy service also creates maintains periodic copies system user data local volume part system restore operation stores previous versions files incremental block-level changes automatically volume restored using system restore previous versions shell extension windows backup support tape drives also support backing restoring subfolder disk instead creates subfolders backup restore make system image disks ntfs file system system image saved usb flash drive must formatted ntfs file system version windows backup supplied windows server 2008 support hard disk drives large sector sizes 4096 bytes unless support 512 byte emulation features included backup restore may differ depending edition windows windows vista home premium business enterprise ultimate editions schedule automatic backups back files folders network location windows vista business enterprise ultimate editions support complete pc backup windows vista business edition support writing pc backup images dynamic drives e.g flash drives another notable limitation backup restore center windows vista allow users specify individual files folders backed skipped allows users choose file type categories based mime type application association file extension documents music videos etc limitation removed windows 7 windows vista complete pc backup could performed network location windows 7 allows performing full system image backup network location however subsequent incremental system image backups performed network image-based backups network must full backups full system image backups local removable storage incremental windows 7 file backup network share available windows 7 professional enterprise ultimate editions whereas included windows vista home premium manual image-based full system backup including incremental backup done local removable media windows 7 home premium full system backup network also requires windows 7 professional editions backup restore removed windows 8 windows server 2012 microsoft said program underused touting file history feature replace file-based backup access points removed except control panel applet called windows 7 file recovery windows 8.1 control panel applet removed functionality still available system image backup file history windows 8.1 system image backup function allow backing individual files folders libraries also users longer schedule backups gui although wbadmin tool still available used execute scheduled backups using task scheduler windows 10 backup restore control panel returned operating system known backup restore windows 7 part interface scheduling backups lost completely windows 8.1 made available non-system image file backups however program deprecated longer actively developed microsoft since windows 10 fall creators update
Computer security
circuitlogix circuitlogix software electronic circuit simulator uses pspice simulate thousands electronic devices models circuits circuitlogix supports analog digital mixed-signal circuits spice simulation gives accurate real-world results graphic user interface allows students quickly easily draw modify combine analog digital circuit diagrams circuitlogix first launched 2005 popularity grown quickly since time 2012 reached milestone 250,000 licensed users became first electronics simulation product global installed base quarter-million customers 100 countries circuitlogix developed dr. colin simpson electronics professor george brown college toronto canada john bud skinner computer programmer electronics program awards including award excellence association canadian community colleges accc professional version circuitlogix circuitlogix pro includes 10,000 device models well 8 virtual instruments also includes 3dlab software product combines interactive 3-dimensional learning environment electronic devices tools enhance user comprehension electronics 3dlab virtual components include batteries switches motors lamps resistors inductors capacitors instruments including oscilloscopes signal generators frequency counters fast accurate simulation electronic circuits essential provides information needed perform accurate analysis circuit behavior spice simulators used verify analog mixed-signal circuits yield expected outputs schematic netlist file circuit input values fed spice software simulates circuit behavior specified length time circuitlogix allows observation voltage current levels circuit node change frequency time allows obtaining accurate results even simulating complex circuits hierarchical blocks reused circuitlogix simulation engine based berkeley spice contains gui make circuit design easier efficient circuitlogix 32-bit spice engine interactive allowing example frequency sources changed potentiometers adjusted switches thrown simulation spice engine fully integrated schematic capture waveform tools circuitlogix passes schematic edits simulator automatically running components fuses leds controlled switches automatically updated schematic simulation runs circuitlogix simulates analog digital mixed analog-digital circuits simulator first divides circuit analog digital portions analog circuitry simulated time-step driven spice engine digital parts simulated separately event-driven simulation engine circuitlogix digital engine developed directly .net faster spice macros simulator automatically performs signal conversion possible connect analog digital part system ’ model library contains hybrid parts analog-to-digital digital-to-analog conversion circuitlogix mixed-mode schematic editor includes analog event-driven simulation capabilities simulation may contain components analog event driven digital sampled-data combination entire mixed signal analysis driven one integrated schematic digital models circuitlogix provide accurate specification propagation time rise/fall time delays event-driven algorithm used circuitlogix general-purpose supports non-digital types data example elements use real integer values simulate dsp functions sampled data filters event-driven algorithm faster standard spice matrix simulation time greatly reduced circuits use event-driven models place analog models mixed-mode simulation handled three levels circuitlogix primitive digital elements use timing models built-in 12-state digital logic simulator b subcircuit models use actual transistor topology integrated circuit finally c in-line boolean logic expressions two modeling techniques use spice solve problem third method digital primitives uses mixed-mode capability component library includes
Programming language topics
keybase keybase database web application managing deploying interactive taxonomic keys plants animals developed royal botanic gardens victoria keybase provides medium pathway keys traditionally developed print classical types media used effectively internet environment platform uses concept called keys easily linked together joined keys merged larger seamless keys groups still available browsed independently keys keybase database filtered displayed variety ways filters formats examples keybase database
Databases
web single sign-on metadata exchange protocol web single sign-on metadata exchange protocol web services federated identity specification published microsoft sun microsystems defines mechanisms service query identity provider metadata concerning protocol suites supports goal operation increase ability given service interoperate given identity provider
Web technology
non-orthogonal frequency-division multiplexing non-orthogonal frequency-division multiplexing n-ofdm method encoding digital data multiple carrier frequencies non-orthogonal intervals frequency sub-carriers low-pass equivalent n-ofdm signal expressed formula_2 data symbols formula_3 number sub-carriers formula_4 n-ofdm symbol time sub-carrier spacing formula_5 formula_6 makes non-orthogonal symbol period section describes simple idealized n-ofdm system model suitable time-invariant awgn channel n-ofdm carrier signal sum number not-orthogonal subcarriers baseband data subcarrier independently modulated commonly using type quadrature amplitude modulation qam phase-shift keying psk composite baseband signal typically used modulate main rf carrier formula_7 serial stream binary digits inverse multiplexing first demultiplexed formula_8 parallel streams one mapped possibly complex symbol stream using modulation constellation qam psk etc. note constellations may different streams may carry higher bit-rate others digital signal processor dsp computed set symbols giving set complex time-domain samples samples quadrature-mixed passband standard way real imaginary components first converted analogue domain using digital-to-analogue converters dacs analogue signals used modulate cosine sine waves carrier frequency formula_9 respectively signals summed give transmission signal formula_10 receiver picks signal formula_11 quadrature-mixed baseband using cosine sine waves carrier frequency also creates signals centered formula_12 low-pass filters used reject baseband signals sampled digitised using analog-to-digital converters adcs forward fft used convert back frequency domain returns formula_8 parallel streams use appropriate symbol detector 1st method optimal processing n-ofdm signals fft proposed 1992 combination n-ofdm mimo technology similar ofdm fast-ofdm method proposed 2002 fbmc filter-bank multi-carrier modulation example fbmc consider wavelet n-ofdm n-ofdm become technique power line communications plc area research wavelet transform introduced replace dft method creating non-orthogonal frequencies due advantages wavelets offer particularly useful noisy power lines create sender signal wavelet n-ofdm uses synthesis bank consisting formula_14-band transmultiplexer followed transform function receiver side analysis bank used demodulate signal bank contains inverse transform followed another formula_14-band transmultiplexer.\ relationship transform functions n-ofdm spectrally efficient method sefdm methods similar n-ofdm gfdm generalized frequency division multiplexing
Internet protocols
natalya kaspersky natalya ivanovna kasperskaya born 5 february 1966 moscow soviet union -- west uses surname masculine form kaspersky —is russian entrepreneur president 'infowatch group companies co-founder former ceo antivirus security software company 'kaspersky lab addition one wealthiest women russia one influential figures russian industry natalya kasperskaya maiden name stutser born 5 february 1966 moscow family engineers soviet defense research institute employees natalya elected member school pioneer council later member district pioneer headquarters also komsomol member organizer alongside main education natalya also played basketball children youth sports school seriously intended become veterinarian giving dream difficulties studying chemistry eighth year education natalya moved ordinary secondary school physics-mathematical school run moscow aviation institute finishing school natalya took entrance exams lomonosov moscow state university enrolled missing half point however results good enough gain entry moscow institute electronics mathematics 1984 1989 natalya studied applied mathematics moscow institute electronics mathematics topic diploma mathematical model nuclear reactor cooling system later earned bachelor degree open university uk studies moscow institute met first husband eugene kaspersky married 1986 graduating institute natalya assigned central scientific construction bureau moscow worked half year research scientist going maternity leave natalya started career age 28 took job january 1994 salesperson computer accessories software firm 50-dollar monthly salary job based newly opened store kami information technologies center created former professor natalya ex-husband eugene kaspersky higher school kgb soviet epoch believes personal data search history geolocation contacts correspondence photo video materials belong state september 1994 natalya became head distribution department antiviral toolkit pro avp development eugene kaspersky team since 1991 two three years natalya successfully built distribution channels technical support network entered international markets sales growing rapidly initial 100–200 per month 1994 130,000 year 600,000 1996 1 million 1997 revenue divided team mother company 1997 future founders 'kaspersky lab decided start business natalya launched kaspersky lab foundation june 1997 key naming new company worked ceo 10 years shares 'kaspersky lab initially split eugene kaspersky 50 two teammate programmers alexey de-monderik vadim bogdanov 20 natalya kasperskaya 10 1997 kaspersky lab sales started double yearly turnover reaching around 7 million 2001 exceeding 67 million 2006 august 2007 natalya unseated suspended key management functions eugene kaspersky due couple divorce deepening ideological divide two eventually natalya agreed stay chairperson newly established board 'kaspersky lab finally breaking ties previously family driven business 2011 kaspersky lab buying natalya stake company 2007 2011 around 30 shares 2007 natalya supervision kaspersky lab turned leading antivirus corporation network regional offices worldwide moment power change 2007 annual sales revenue reached 126 million company estimated capitalization 1.3 billion yearly revenue 700 million 2011 natalya sold remaining stake departed change management company rate growth dropped visibly global revenue growing 40 2009 13.7 2011 3 2012 6 2013 'kaspersky lab bought antispam technology developed 'ashmanov partners head latter igor ashmanov gave buyer idea use antispam engine backwards protection data leaks 2001—2002 'kaspersky lab programmers developed solution later became known infowatch traffic monitor enterprise offers protection corporate users internal threats dlp system december 2013 subsidiary called 'infowatch established develop distribute new software natalya kasperskaya ceo majority owner 'infowatch since october 2007 stake company linked business separation deal ex-husband natalya made main investments 'infowatch 'kribrum 'nanosemantics co-owned igor ashmanov g data software ag german antivirus company 'infowatch software vague prospects time spin-off albatross around 'kaspersky lab neck unlike 'kaspersky lab technological solutions product line new company initially targeted large medium enterprises starting 300 workstations rather small businesses retailers required fundamentally different skill set approach natalya previous experience management turning particularly relevant nevertheless 2012 infowatch previously unprofitable recorded first earnings went growing annual rate 60—70 according 'forbes infowatch annual revenue reached around 12 million 2015 independent experts polled russian daily newspaper 'kommersant spring 2015 estimating business worth 40–50 million today infowatch group companies working two main business areas — corporate protection internal threats external targeted attacks — company holding almost 50 share russian confidential data protection market dlp systems among longstanding clients russian governmental organizations well 'sberbank 'beeline lukoil 'tatneft 'surgutneftegas 'sukhoi 'magnitogorsk iron steel works etc addition infowatch actively developing german middle east south-east asian markets current infowatch shareholders natalya kasperskaya company deputy ceo rustem khairetdinov according forbes natalya kasperskaya fortune around 220 million march 2013 – estimate increased 230 million 2014 270 million 2015 march 2015 russian news portal 'lenta.ru agreed forbes ’ 2014 estimation july 2015 german magazine 'der spiegel published estimation €207 million finally august year women magazine 'cosmopolitan published estimate 270 million according 'der spiegel majority natalya kasperskaya fortune form funds derived asset sales kaspersky october 2015 response question whether 'forbes calculations accurate emphasized company non-public thus need reveal level capitalization adding “ nevertheless good see people seem appreciate value 'infowatch ” natalya kasperskaya member board russian union industrialists entrepreneurs association software developers 'domestic software also member expert russian software council affiliated ministry telecom mass communications russia grant committee skolkovo foundation supervisory board skolkovo institute science technology skoltech furthermore natalya kasperskaya member russian mechanical engineering union association information protection business information security association bisa april 2008 march 2012 natalya member board addition 2009 2011 head working party information computer technologies federal target program ministry education science russia referred “ research inventions priority scientific technology development areas russia 2014—2020 ” natalya kasperskaya enjoyed participating social activities ever since school remembers singing children choir taking part school performances concerts even leading pioneer team agitators addition formed school placard newspaper wrote poetry also interested sports like basketball skiing swimming well phaleristics collecting stamps soviet coins student natalya fascinated moscow theatre life knew repertoires main youth theatres time mossovet theatre taganka theatre sovremennik etc. sometimes queued overnight buy tickets popular performances furthermore also passion guitar poetry often sang played guitar parties natalya interest trekking skiing travelling friends children reading professional literature came later considers good great written american business consultant jim collins favorite books saying influenced outlook addition also speaks english german fluently kasperskaya admits little interest cooking although cook family maternity leave similarly also particular interest fashion clothing brands waste much time shopping instead buying whatever clothes finds suit style addition natalya fan designer brands since knows clothes actually produced natalya perceives gadgets social networks somewhat negatively understands provide capabilities increased surveillance regularly use work sony xperia phone natalya typically allows pr team manage social network presence uses media rarely natalya met first husband eugene kaspersky health resort january 1987 twenty couple marrying six months later 1989 fifth year institute natalya gave birth first son maxim second son ivan following 1991 couple split 1997 divorced 1998 eugene instigation however due joint rapidly growing business divorce covered couple years order demotivate employees panic market natalya met second husband igor ashmanov 1996 cebit computer expo hannover working neighboring stands year later natalya igor renewed acquaintance started communicating one another regularly professional basis natalya kasperskaya remembers started dating two three years later divorce eugene couple deciding marry 2001 2005 igor natalya daughter alexandra followed second daughter maria 2009 third daughter varvara 2012 natalya sons first marriage studied lomonosov moscow state university maxim graduating faculty geography ivan faculty computational mathematics cybernetics april 2011 natalya 20-year-old son ivan kidnapped strogino district moscow way work perpetrators holding one villages sergievo-posadsky subregion moscow oblast suburb demanding ransom €3 million parents however five days later ivan freed thanks actions russian intelligence services five kidnappers including two repeat offenders sentenced prison terms ranging 4.5 11 years
Computer security
rootkit arsenal rootkit arsenal escape evasion dark corners system book written bill blunden published jones bartlett publishers may 2009 book takes reader depth rootkit technology uses covers topics ia-32 assembly windows system architecture kernel debugging advanced rootkit development much concerning rootkit technology applied onto e.g white hat hacking book also provides many source code examples rootkit development properly use required recommended fair understanding computer programming operating systems order fully comprehend contents book back cover states advanced book topic book divided four parts 14 chapters goes detail specific technology information required advanced rootkit development use also provides information network file system analysises kernel objects drivers much related rootkit technology reader create fully working rootkit using source codes appendix product description states book sheds light material traditionally poorly documented partially documented intentionally undocumented book received mostly positive reviews websites specializing computer reviews computing reviews writes book book addresses controversial timely issue field network security rootkits notoriously used black hat hacking community rootkit allows attacker subvert compromised system subversion take place application level case early rootkits replaced set common administrative tools dangerous occurs kernel level rootkit hides network traffic processes files attacker decides keep invisible administrators system management tools… work defensive solutions—anti-virus malware detection tools—or interested low-level system programming must read book fact intended audience one best books 2009 richard austin ieee computer society technical committee security privacy also published review book second edition 2014
Computer security
embrace embrace european model bioinformatics research community education project year 2005 2010 objective drawing together wide group experts throughout europe involved use information technology biomolecular sciences embrace network worked integrate major databases software tools bioinformatics using existing methods emerging grid service technologies integration efforts driven set test problems representing key issues bioinformatics service providers end-user biologists result groups throughout europe able use embrace service interfaces local proprietary data tools embrace made many bioinformatics web services available international research community project run ebi hinxton england fred marcus eu project coordinator embrace project funded european commission within fp6 programme thematic area life sciences genomics biotechnology health contract number lhsg-ct-2004-512092
Distributed computing architecture
samuel c. phillips general samuel cochran phillips february 19 1921 – january 31 1990 united states air force four-star general served director nasa apollo manned lunar landing program 1964 1969 seventh director national security agency 1972 1973 commander air force systems command 1973 1975 phillips born springerville arizona february 19 1921 attended public schools cheyenne wyoming graduating cheyenne high school 1938 earned bachelor science degree electrical engineering university wyoming 1942 master science degree electrical engineering university michigan 1950 member kappa sigma fraternity summer break 1940 earned private pilot license phillips commissioned second lieutenant infantry completion reserve officers training corps training graduation university wyoming entered active military service transferred army air corps attended flying school earned pilot wings world war ii phillips served combat pilot 364th fighter group eighth air force based england completed two combat tours duty european theater operations awarded distinguished flying cross oak leaf clusters air medal seven oak leaf clusters french croix de guerre war assigned european theater headquarters frankfurt germany july 1947 phillips transferred langley air force base virginia phillips research development assignments included six years engineering division wright-patterson air force base ohio duty electronics officer nuclear weapons experiments eniwetok atoll operation greenhouse project officer assignments b-52 stratofortress heavy bomber aim-4 falcon air-to-air missile bomarc surface-to-air missile programs phillips returned england 1956 served 7th air division strategic air command participation negotiating completing international agreement united kingdom deployment use american thor nuclear-armed intermediate-range ballistic missile irbm latter assignment earned phillips legion merit medal phillips returned united states 1959 assigned air force ballistic missile division air research development command los angeles california director minuteman intercontinental ballistic missile program icbm 1963 nasa associate administrator manned space flight george e. mueller admired phillips skill managing minuteman air force projects proposed bringing nasa detached military duty program controller manned space flight phillips air force superior agreed condition phillips hired instead director apollo manned lunar landing program december accomplished phillips assigned nasa time achieved rank major two-star general phillips aggressively took job constant daily meetings phone contact visits contractor sites kept road 75 per cent time described job new york times reporter john noble wilford way november 1965 phillips took team north american aviation downey california prime contractor command/service module also saturn v launch vehicle s-ii second stage investigate problems delays quality shortfalls cost overruns december 19 wrote memo naa president lee atwood copy report findings recommended fixes also sent mueller mueller also sent atwood follow-on letter strongly expressing disappointment csm s-ii problems requiring response end january 1966 follow-on visit phillips team march apollo 1 fire killed three astronauts ground test january 27 1967 first manned apollo mission congressional investigation uncovered existence came known phillips report nasa administrator james e. webb called congress testified unaware existence report ignited congressmen senators criticism nasa selection north american contractor however political support president lyndon b. johnson controversy blew next eighteen months apollo got back track toward manned missions goal first lunar landing 1970 small dinner party launch apollo 10 may 1969 dr. wernher von braun director marshall space flight center huntsville ala. praised general phillips one responsible pulling many pieces apollo program together making work time apollo 11 mission july 1969 achieved program manned landing goal phillips announced intention leave nasa return air force duty nasa service promoted lieutenant general september 1969 phillips placed command space missile systems organization samso air force systems command afsc los angeles august 1972 phillips appointed director national security agency dirnsa also chief central security service two years positions phillips assigned commander air force systems command august 1973 andrews air force base maryland retired air force 1975 general phillips fellow institute electrical electronics engineers member american institute aeronautics astronautics selected fellowship organization october 1969 notable valuable contributions sciences technology addition phillips fellow american astronautical society honorary member national business fraternity alpha kappa psi member board governors national space club member board directors united services automobile association president military benefit association phillips awarded air force distinguished service medal september 1969 service nasa july 1972 service commander samso phillips also awarded two nasa distinguished service medals agency 1968 1969 distinguished contributions apollo program phillips held honorary doctor laws degree university wyoming september 26 1971 phillips awarded smithsonian institution langley gold medal aviation space exploration contributions apollo program 1964 1969 14th recipient langley medal since award first presented wright brothers 1909 april 1971 gen. phillips elected member national academy engineering leadership direction minuteman missile program apollo program phillips received general thomas d. white u.s. air force space trophy september 11 1972 also flying tiger pilot trophy awarded american volunteer group july 7 1973 phillips married betty anne phillips three daughters phillips initiated scottish rite freemasonry till 33rd highest degree becoming past master four scottish rite bodies dallas active member supreme council office sovereign grand inspector general scottish rite masons texas.. phillips died cancer palos verdes california january 31 1990 aged 68
Computer security
goldmont goldmont microarchitecture low-power atom celeron pentium branded processors used systems chip socs made intel apollo lake platform 14 nm goldmont core unveiled intel developer forum idf shenzhen china april 2016 goldmont architecture borrows heavily skylake core processors offers 30 percent performance boost compared previous braswell platform used implement power-efficient low-end devices including cloudbooks 2-in-1 netbooks small pcs ip cameras in-car entertainment systems goldmont 2nd generation out-of-order low-power atom microarchitecture designed entry level desktop notebook computers goldmont built 14 nm manufacturing process supports four cores consumer devices includes intel gen9 graphics architecture introduced skylake goldmont microarchitecture builds success silvermont microarchitecture provides following enhancements similar previous silvermont generation design flaws found processor circutry resulting cease operation processors actively used several years errata named apl46 system may experience inability boot may cease operation added documentation june 2017 stating low pin count real time clock sd card gpio interfaces may stop functioning mitigations found limit impact systems firmware update lpc bus called lpc_clkrun reduces utilization lpc interface turn decreases eliminates lpc bus degradation systems however compatible new firmware recommended use sd card boot device remove card system use possible solution using uhs-i cards operating 1.8v congatec also states issues impact usb buses emmc although mentioned intel public documentation usb maximum 12 active time 60tb transmit traffic life expectancy lifetime port emmc maximum 33 active time set d3 device low power state operating system use newer designs atom c3000 denverton seem affected list desktop processors follows list mobile processors follows list embedded processors follows also atom a3900 series exclusively automotive customers aec-q100 qualification willow trail platform canceled apollo lake offered instead
Computer architecture
solomon kullback solomon kullback april 3 1907august 5 1994 american cryptanalyst mathematician one first three employees hired william f. friedman us army signal intelligence service sis 1930s along frank rowlett abraham sinkov went long distinguished career sis eventual successor national security agency nsa kullback chief scientist nsa retirement 1962 whereupon took position george washington university kullback–leibler divergence named kullback richard leibler kullback born jewish parents brooklyn new york attended boys high school went city college new york graduating ba 1927 math 1929 completed doctorate math george washington university 1934 intention teach returned boy high school found taste discovered real interest using mathematics teaching suggestion abraham sinkov showed civil service flyer junior mathematicians us 2,000 per year took examination passed assigned washington junior cryptanalysts upon arrival washington kullback assigned william f. friedman friedman begun intensive program training cryptology new civilian employees several summers running sis cryptanalysts attended training camps fort meade received commissions reserve officers army kullback sinkov took friedman admonitions education seriously spent next several years attending night classes received doctorates mathematics afterward kullback rediscovered love teaching began offering evening classes mathematics george washington university 1939 completed training three put work actually hired compilations cipher code material u.s. army another task test commercial cipher devices vendors wished sell u.s. government kullback worked partnership frank rowlett red cipher machine messages almost overnight unravelled keying system machine pattern – nothing intercepted messages hand using talents linguist john hurt translate text sis started issuing current intelligence military decision-makers may 1942 five months pearl harbor kullback major sent britain learned bletchley park british producing intelligence high quality exploiting enigma machine also cooperated british solution conventional german codebook-based systems shortly return states kullback moved japanese section chief national security agency nsa formed 1952 rowlett became chief cryptanalysis primary problem facing research development post-war period development high-speed processing equipment kullback supervised staff 60 including innovative thinkers automated data processing development leo rosen sam snyder staff pioneered new forms input memory magnetic tape drum memory compilers make machines truly multi-purpose kullback gave priority using computers generate communications security comsec materials kullback book information theory statistics published john wiley sons 1959 book republished additions corrections dover publications 1968 solomon kullback retired nsa 1962 focused teaching george washington university publishing new papers 1963 elected fellow american statistical association reached rank colonel inducted military intelligence hall fame kullback remembered colleagues nsa straightforward one described totally guileless always knew stood one former nsa senior recalled man unlimited energy enthusiasm man whose judgment usually sound right
Computer security
john resig john resig american software engineer entrepreneur best known creator lead developer jquery javascript library resig graduated undergraduate degree computer science rochester institute technology 2005 time worked ankur teredesai data mining instant messaging networks jon schull exploring new ways encouraging real-time online collaboration currently works application developer khan academy previously javascript tool developer mozilla corporation work jquery inducted rochester institute technology innovation hall fame april 30 2010 resig started contributed many javascript libraries including resig frequent guest speaker companies like google yahoo presented many conferences related web technology including sxsw webstock mix tech4africa resig author widely read blog author book pro javascript techniques published apress 2006 secrets javascript ninja bear bibeault published manning publications december 2012 several papers
Programming language topics
bios interrupt call bios interrupt calls facility operating systems application programs use invoke facilities basic input/output system ibm pc compatible computers traditionally bios calls mainly used dos programs software boot loaders including mostly historically relatively simple application software boots directly runs without operating system—especially game software bios runs real address mode real mode x86 cpu programs call bios either must also run real mode must switch protected mode real mode calling bios switch back reason modern operating systems use cpu protected mode generally use bios support system functions although use bios probe initialize hardware resources early stages booting computers software instructions control physical hardware screen disk keyboard etc moment power switched pc bios pre-loaded rom main board takes control immediately processor reset including power-up hardware reset button pressed bios initializes hardware finds loads runs boot program usually necessarily os loader provides basic hardware control operating system running machine usually operating system may directly booting single software application ibm part provided information needed use bios fully directly utilize hardware avoid bios completely programming early ibm pc models prior ps/2 beginning programmers choice using bios per-hardware-peripheral basis today bios new pc still supports bios interrupt function calls defined ibm ibm introduced 1984 along many newer ones plus extensions originals e.g expanded parameter ranges combined similar degree hardware compatibility means programs written ibm still run correctly new pc today assuming faster speed execution acceptable typically games use cpu-based timing despite considerable limitations services accessed bios interrupts proven extremely useful durable technological change bios interrupt calls perform hardware control i/o functions requested program return system information program key element purpose bios calls abstraction bios calls perform generally defined functions specific details functions executed particular hardware system encapsulated bios hidden program example program wants read hard disk need know whether hard disk ata scsi sata drive earlier days esdi drive mfm rll drive perhaps seagate st-506 controller perhaps one several western digital controller types different proprietary controller another brand program needs identify number drive wishes access address sector needs read write bios take care translating general request specific sequence elementary operations required complete task particular disk controller hardware connected drive program freed needing know control low level every type hard disk display adapter port interface real-time clock peripheral may need access makes programming operating systems applications easier makes programs smaller reducing duplication program code functionality included bios need included every program needs relatively short calls bios included instead operating systems bios used service calls provided operating system generally fulfill function purpose bios also frees computer hardware designers extent programs written use bios exclusively constrained maintain exact hardware compatibility old systems designing new systems order maintain compatibility existing software example keyboard hardware ibm pcjr works differently keyboard hardware earlier ibm pc models programs use keyboard bios difference nearly invisible good example side issue significant share pc programs use time pcjr introduced use keyboard bios exclusively ibm also included hardware features pcjr emulate way original ibm pc ibm pc xt keyboard hardware works hardware emulation exact programs try use keyboard hardware directly work correctly pcjr programs use bios keyboard services addition giving access hardware facilities bios provides added facilities implemented bios software example bios maintains separate cursor positions eight text display pages provides tty-like output automatic line wrap interpretation basic control characters carriage return line feed whereas cga-compatible text display hardware one global cursor automatically advance cursor interpret control characters operating systems software communicates bios software order control installed hardware via software interrupts software interrupt specific variety general concept interrupt interrupt mechanism cpu directed stop executing main-line program immediately execute special program called interrupt service routine isr instead isr finishes cpu continues main program x86 cpus isr call interrupt occurs found looking table addresses called interrupt vectors memory interrupt invoked type number 0 255 type number used index table address found table address isr run response interrupt software interrupt simply interrupt triggered software command therefore software interrupts function like subroutines main difference program makes software interrupt call need know address isr interrupt number advantages modularity compatibility flexibility system configuration bios interrupt calls thought mechanism passing messages bios operating system bios client software messages request data action bios return requested data status information and/or product requested action caller messages broken categories interrupt number categories contain sub-categories called functions identified function numbers bios client passes information bios cpu registers receives information back way data large fit registers tables control parameters disk sector data disk transfers passed allocating buffer i.e space memory passing address buffer registers sometimes multiple addresses data items memory may passed data structure memory address structure passed bios registers interrupt number specified parameter software interrupt instruction intel assembly language int instruction function number specified ah register caller sets ah register number desired function general bios services corresponding interrupt number operate independently functions within one interrupt service handled bios program independent last point relevant reentrancy bios software usually returns caller error code successful status code and/or requested data successful data small one bit large 65,536 bytes whole raw disk sectors maximum fit one real-mode memory segment bios expanded enhanced years many times many different corporate entities unfortunately result evolution bios functions called use consistent conventions formatting communicating data reporting results bios functions report detailed status information others may even report success failure return silently leaving caller assume success test outcome way sometimes also difficult determine whether certain bios function call supported bios certain computer limits call parameters computer bios interrupt calls use cpu register-based parameter passing calls oriented made assembly language directly made high-level languages hlls however high level language may provide library wrapper routines translate parameters form usually stack-based used high-level language register-based form required bios back hll calling convention bios returns variants c bios calls made using inline assembly language within c module support inline assembly language part ansi c standard language extension therefore c modules use inline assembly language less portable pure ansi standard c modules invoking interrupt done using int x86 assembly language instruction example print character screen using bios interrupt 0x10 following x86 assembly language instructions could executed list common bios interrupt classes found note bioses particularly old ones implement interrupt classes bios also uses interrupts relay hardware event interrupts programs choose receive route messages use table includes bios interrupts intended called programs using int assembly-language software interrupt instruction request services information traditionally jumped implementation cassette basic provided microsoft stored option roms call would typically invoked bios unable identify bootable disk volumes startup time original ibm pc ibm machine type 5150 released 1981 basic rom key feature contemporary popular personal computers commodore 64 apple ii line also microsoft cassette basic rom though commodore renamed licensed version commodore basic substantial portion intended market ibm pc needed basic compete systems ibm pc rom basic served primitive diskless operating system allowing user load save run programs well write refine original ibm pc also pc model ibm like aforementioned two competitors included cassette interface hardware base model ibm pc 16 kib ram disk drives kind cassette interface basic rom essential make base model usable five 8 kib rom chips original ibm pc totaling 40 kib four contain basic one contains bios rom basic accounts half total system memory 4/7ths precise time went basic longer shipped pcs interrupt would simply display error message indicating bootable volume found famously rom basic explanatory messages later bios versions bios versions would prompt user insert bootable volume press key user pressed key would loop back bootstrap loader int 19h try booting digital rainbow 100b used call bios incompatible ibm bios turbo pascal turbo c turbo c++ repurposed int 18 memory allocation paging programs also reused vector purposes dos systems io.sys ibmbio.com hooks int 13 floppy disc change detection tracking formatting calls correcting dma boundary errors working around problems ibm rom bios 01/10/84 model code 0xfc first call many modern operating systems linux newer versions windows bypass built-in bios interrupt communication system altogether preferring use software control attached hardware directly original reason primarily operating systems run processor protected mode whereas calling bios requires switching real mode back switching real mode slow however also serious security reasons switch real mode bios code limitations functionality speed motivate operating system designers find replacement fact speed limitations bios made common even dos era programs circumvent order avoid performance limitations especially video graphics display fast serial communication problems bios functionality include limitations range functions defined inconsistency subsets functions supported different computers variations quality bioses i.e bioses complete reliable others abridged buggy taking matters hands avoiding reliance bios operating system developers eliminate risks complications face writing supporting system software hand developers become responsible providing bare-metal driver software every different system peripheral device intend operating system work inducing hardware producers provide drivers thus apparent compact operating systems developed small budgets would tend use bios heavily large operating systems built huge groups software engineers large budgets would often opt write drivers instead using bios—that even without considering compatibility problems bios protected mode
Computer architecture
back time linux software back time backup application linux versions integrate favorably gnome kde sc 4 available directly repositories many linux distributions released terms gnu general public license gpl free software back time uses rsync backend characteristic feature using hard links files identical snapshots different times thus using disk space files remained unchanged possible use several backup profiles e.g backups different hard disks also create schedules symbolic links backed absolute relative ones hard links treated due used backup method back time also supports encryption backups backup ssh advantages hard link method easy look snapshots system different times also easy remove old snapshots compared incremental backup methods save difference information consecutive backup times however drawback back time allow compression requires file systems support hard links backup location graphical interface written qt
Computer security
railo railo server commonly referred railo open source software implements general-purpose cfml server-side scripting language often used create dynamic websites web applications intranet systems cfml dynamic language supporting multiple programming paradigms runs java virtual machine jvm railo created swiss company railo technologies gmbh intended high performance alternative adobe coldfusion 2008 railo switched open source community-driven model became jboss project railo open source project led railo technologies development work funded consulting support contracts anyone may contribute code consideration railo named alien dog star trek enterprise dog actually named rhylo written phonetically german railo thus railo pronounced either rhy-lo rai-lo acceptable railo major releases codename notable loyal dogs history railo began 2002 student project compile cfml code php choice made due ubiquity php however found give desired performance stability decision made switch java platform instead project successful enough decided continue develop full product several alpha beta releases made official 1.0 release april 2006 railo continued developed relatively unknown many cfml developers june 2008 scotch rocks conference edinburgh railo technologies used day 2 keynote announce partnership jboss switch open source may 2012 cf objective conference foundation railo company ltd announced private limited company comprising swiss company railo technologies gmbh conjunction five companies operated cfml industry 29 january 2015 lucee project fork railo 4.2 codebase announced original developer railo stated would working railo developers confirmed also focusing solely lucee although official statement made railo company community consensus development railo project unlikely 19 july 2016 railo company dissolved railo runs jvm servlet work servlet container e.g apache tomcat eclipse jetty application server e.g jboss glassfish possible connect web server e.g apache iis nginx cherokee front using connectors mod jk mod proxy equivalent required railo railo installer linux macos windows bundles apache tomcat also pre-configured railo express download using jetty v4.0 onwards railo command line version enabling cfml used general-purpose language outside servlet environment railo since v3.1 licensed lgpl v2.1 source code available github primary aim railo provide functionality coldfusion using less resources giving better performance railo technologies team continue treat slowness bug core development philosophy many performance tests shown railo perform faster cfml engines addition railo attempts resolve many inconsistencies found traditional cfml either forced changes behaviour configurable options railo administrator railo technologies team always open feedback active cfml community events keen remind people railo community project railo technologies also creates strong technology partnerships cfml software companies including blue river interactive group developers mura cms contens software gmbh developers contens cms intergral gmbh developers fusionreactor fusiondebug help ensure software works well railo addition railo technologies offer formal partner programs solutions development hosting training railo application server currently averages 7,000 downloads growing per month railo used number companies notably including cfml built-in functionality preventing code injection via codice_10 tag functions codice_11 codice_12 codice_13 also third-party cfml implementations owasp enterprise security api antisamy project one key architecture decisions railo follow jee servlet model support multiple independent web contexts single server key security factor prevents unrelated applications interfering may happen shared coldfusion server single web context railo implements cfml language see cfml syntax section examples well cfscript cfml tag-based syntax visually different languages though aside similar dynamic languages following exceptions whilst railo implements cfml generally compatible adobe coldfusion acf original cfml engine notable differences two
Programming language topics
kaldi software kaldi speech recognition toolkit freely available apache license kaldi aims provide software flexible extensible supports linear transforms mmi boosted mmi mce discriminative training feature-space discriminative training deep neural networks kaldi incorporated part chime speech separation recognition challenge several successive events software initially developed part 2009 workshop johns hopkins university
Computational linguistics
visual irc visual irc virc open-source internet relay chat client windows operating system unlike many irc clients nearly functionality virc driven included irc script result program behavior extended changed without altering source code much source code birc virc 2 related utilities released gpl project web site sourceforge versus scripting language originally developed irc client bisual irc currently used visual irc similar many ways scripting languages used ircii mirc well tcl c. name versus chosen could shortened vs common abbreviation vircscript language used visual irc '96 '98 versus remained mostly backward compatible vircscript existing documentation commentary mentioned vs remained mostly accurate applied versus name also alluded birc origins replacement virc object versus ovs refers object-oriented features versus scripts define classes work objects methods instead textual data aliases however practice ovs mostly used manipulate vcl objects make virc interface scripts stored files usually .vsc file extension though .lib extension sometimes used versus script file simply contains statements interpreted script loaded blocks defined script see replace blocks defined name previous scripts aliases methods including constructors destructors events menu items toolbar items referred routines code blocks hello world code example example count ten example make everyone current channel operator
Programming language topics
mary kenneth keller mary kenneth keller b.v.m december 17 1913 – january 10 1985 american roman catholic religious sister educator pioneer computer science irving c. tang first two people earn doctorate computer science united states keller born cleveland ohio december 17 1913 john adam keller catherine josephine née sullivan keller entered sisters charity blessed virgin mary 1932 took vows religious congregation 1940 completed b.s bachelor science mathematics 1943 m.s master science mathematics physics 1953 depaul university chicago keller earned ph.d. university wisconsin–madison 1965 dissertation inductive inference computer generated patterns focused constructing algorithms performed analytic differentiation algebraic expression written cdc fortran 63 throughout keller graduate studies affiliated various institutions including university michigan purdue dartmouth 1958 keller began working national science foundation workshop computer science center dartmouth college male-only institution time participated implementation basic programming language john g. kemeny thomas e. kurtz keller believed potential computers increase access information promote education finishing doctorate 1965 keller founded computer science department clarke college clarke university catholic women college founded sisters charity blessed virgin mary dubuque iowa year national science foundation awarded grant 25,000 payable two years instructional equipment undergraduate education one first computer science departments small college keller directed department twenty years clarke college keller computer center information services named provides computing telecommunication support clarke college students faculty members staff college also established mary kenneth keller computer science scholarship honor keller advocate involvement women computing use computers education helped establish association small computer users education ascue went write four books field acm/sigucc user services conference 1975 keller declared fully used computer greatest interdisciplinary tool invented date keller died january 10 1985 age 71
Programming language topics
pilot 1000 pilot 1000 pilot 5000 first generations pdas produced palm computing subsidiary u.s. robotics introduced march 1996 pilot uses motorola 68328 processor 16 mhz 128 kb pilot 1000 512 kb pilot 5000 built random-access memory pda plastic case various colors dimensions 120x80x18 mm weight 160 grams pilot 160x160 pixel monochrome lcd tactile panel graffiti input zone presented bottom third screen underneath screen sits green on/off button four applications buttons date book address book list memo pad two scroll buttons left contrast control right top stylus slot back device memory slot door reset button battery compartment held two aaa batteries serial port use palmpilot cradle memory kept memory slot plastic cover back top pda 512 kb rom chip stores palm os 1.0 resident applications ram available 128 kb 512 kb 1 mb palmpilot professional memory card 2 mb ram hardware limit 12 mb ram 4 mb rom calibration test presented initial power pilot would boot ready use synchronization connecting synchronizing pda initially done utility called pilot desktop pc pilot desktop distributed either 3½ inch disk cd-rom according original floppy disk set v1.0 windows 95 included tutorial disk two win32s disks windows 3.1 v2.0 windows 95 windows nt version pilot desktop renamed palm desktop exists use mac platform open source support exists use linux distributions one preferred development platforms palm os well palm inc. sued pilot pen company using name pilot palm later involved legal battle xerox filed suit david goldberg unistroke patent
Computer architecture
wolfram alpha wolfram|alpha also styled wolframalpha wolfram alpha computational knowledge engine answer engine developed wolfram alpha llc subsidiary wolfram research online service answers factual queries directly computing answer externally sourced curated data rather providing list documents web pages might contain answer search engine might wolfram|alpha released may 18 2009 based wolfram earlier flagship product wolfram mathematica computational platform toolkit encompasses computer algebra symbolic numerical computation visualization statistics capabilities additional data gathered academic commercial websites cia world factbook united states geological survey cornell university library publication called birds chambers biographical dictionary dow jones catalogue life crunchbase best buy faa optionally user facebook account users submit queries computation requests via text field wolfram|alpha computes answers relevant visualizations knowledge base curated structured data come sites books site use portfolio automated manual methods including statistics visualization source cross-checking expert review curated data makes alpha different semantic search engines index large number answers try match question one wolfram|alpha provide robust query results based computational facts queries social sciences cultural studies even many questions history responses require subtlety complexity able respond particularly-phrased natural language fact-based questions mary robinson born complex questions old queen elizabeth ii 1974 displays input interpretation question using standardized phrases age queen elizabeth ii royalty 1974 answer age start 1974 47 years biography link wolfram|alpha answer queries require narrative response difference julian gregorian calendars answer factual computational questions june 1 julian calendar mathematical symbolism parsed engine typically responds numerical results example lim x- 0 sin x /x yields correct limiting value 1 well plot 235 terms taylor series registered users possible derivation using l'hôpital rule also able perform calculations data using one source example fifty-second smallest country gdp per capita yields nicaragua 1160 per year wolfram|alpha written 15 million lines wolfram language code runs 10,000 cpus database currently includes hundreds datasets current historical weather datasets accumulated several years curated distinct auto-generated datasets checked quality either scientist expert relevant field someone acting clerical capacity simply verifies datasets acceptable one example live dataset wolfram|alpha use profile facebook user inputting facebook report query user authorizes facebook share account details wolfram site alpha generate personal analytics report containing age distribution friends frequency words used status updates detailed information within two weeks launching facebook analytics service september 2012 400,000 users used downloadable query results behind pay wall summaries accessible free accounts wolfram|alpha short answers api wolfram|alpha simple api wolfram|alpha spoken results api wolfram|alpha full results api wolfram|alpha conversational api wolfram|alpha fast query recognizer api wolfram|alpha summary box api wolfram|alpha instant calculators api wolfram|alpha show steps api wolfram|alpha used power searches microsoft bing duckduckgo search engines first release july 21 2017 brave web browser features wolfram|alpha one default search engines factual question answering also queried apple siri amazon alexa samsung voice dexetra iris voice control software blackberry 10 launch preparations began may 15 2009 7 pm cdt broadcast live justin.tv plan publicly launch service hours later expected issues due extreme load service officially launched may 18 2009 wolfram|alpha received mixed reviews wolfram|alpha advocates point potential even stating determines results important current usefulness december 3 2009 iphone app introduced users considered initial 50 price ios app unnecessarily high since features could freely accessed using web browser instead also complained simultaneous removal mobile formatting option site wolfram responded lowering price 2 offering refund existing customers re-instating mobile site october 6 2010 android version app released available kindle fire nook nook version available outside u.s. 71 apps available use wolfram|alpha engine specialized tasks june 18 2018 japanese version wolfram|alpha released february 8 2012 wolfram|alpha pro released offering users additional features monthly subscription fee key feature ability upload automatic analysis many common file types data including raw tabular data images audio xml dozens specialized scientific medical mathematical formats features include extended keyboard interactivity cdf data downloads in-depth step-by-step solution ability customize save graphical tabular results extra computation time changes free version site time wolfram|alpha pro launched wolfram alpha enterprise business-focused analytics tool released 2016 program combines data supplied corporation algorithms wolfram|alpha answer questions related corporation infoworld published article warning readers potential implications giving automated website proprietary rights data generates free software advocate richard stallman also opposes idea recognizing site copyright holder suspects wolfram would able make case existing copyright law
Web technology
sql server integration services sql server integration services ssis component microsoft sql server database software used perform broad range data migration tasks ssis platform data integration workflow applications features data warehousing tool used data extraction transformation loading etl tool may also used automate maintenance sql server databases updates multidimensional cube data first released microsoft sql server 2005 ssis replaced data transformation services feature sql server since version 7.0 unlike dts included versions ssis available standard business intelligence enterprise editions microsoft visual studio dev essentials possible learn use ssis visual studio 2017 free development learning purposes ssis import/export wizard lets user create packages move data single data source destination transformations wizard quickly move data variety source types variety destination types including text files sql server instances developers tasked creating maintaining ssis packages use visual development tool based microsoft visual studio called sql server business intelligence development studio bids allows users edit ssis packages using drag-and-drop user interface scripting environment write programming code also available tool package holds variety elements define workflow upon package execution tool provides color-coded real-time monitoring note recent versions ms sql server bids replaced sql server data tools business intelligence ssdt-bi package may saved file store hierarchical namespace within sql server instance either case package content persisted xml completed designer also allows user start package execution started package may readily debugged monitored ssis provides following built-in transformations conditional split transformation used conditionally route rows transformation objects based particular condition similar codice_1 construct c language aside import/export wizard designer product includes notable tools dtexec executes package command line wherever may stored running package tool may instructed apply configuration information allow package reused slightly different parameters including different connection strings endpoints dtutil provides ability manage packages command prompt tool copy move package file server store back among sundry functions used delete rename encrypt decrypt packages users may write code define connection objects log providers transforms tasks ssis features programmable object model allows developers write hosts package execution host respond events start stop packages object model also allows developers create store load packages well create destroy modify contained objects within limits ssis packages load call cli assembly dlls providing access virtually kind operation permissible .net clr ssis used sql server 2005 2008 2008 r2 2012 2014 2016 editions except express workgroup
Databases
wavelength-division multiplexing fiber-optic communications wavelength-division multiplexing wdm technology multiplexes number optical carrier signals onto single optical fiber using different wavelengths i.e. colors laser light technique enables bidirectional communications one strand fiber well multiplication capacity term wdm commonly applied optical carrier typically described wavelength whereas frequency-division multiplexing typically applies radio carrier often described frequency purely conventional wavelength frequency communicate information specifically frequency hertz cycles per second multiplied wavelength physical length one cycle equals velocity carrier wave vacuum velocity light usually denoted lower case letter c. glass fiber substantially slower usually 0.7 times c. data rate ideally might carrier frequency practical systems always fraction carrier frequency wdm system uses multiplexer transmitter join several signals together demultiplexer receiver split apart right type fiber possible device simultaneously function optical add-drop multiplexer optical filtering devices used conventionally etalons stable solid-state single-frequency fabry–pérot interferometers form thin-film-coated optical glass three different wdm types whereof one called wdm notation xwdm normally used discussing technology concept first published 1978 1980 wdm systems realized laboratory first wdm systems combined two signals modern systems handle 160 signals thus expand basic 100 gbit/s system single fiber pair 16 tbit/s system 320 channels also present 12.5 ghz channel spacing see wdm systems popular telecommunications companies allow expand capacity network without laying fiber using wdm optical amplifiers accommodate several generations technology development optical infrastructure without overhaul backbone network capacity given link expanded simply upgrading multiplexers demultiplexers end often done use optical-to-electrical-to-optical o/e/o translation edge transport network thus permitting interoperation existing equipment optical interfaces wdm systems operate single-mode fiber optical cables core diameter 9 µm certain forms wdm also used multi-mode fiber cables also known premises cables core diameters 50 62.5 µm early wdm systems expensive complicated run however recent standardization better understanding dynamics wdm systems made wdm less expensive deploy optical receivers contrast laser sources tend wideband devices therefore demultiplexer must provide wavelength selectivity receiver wdm system wdm systems divided three different wavelength patterns normal wdm coarse cwdm dense dwdm normal wdm sometimes called bwdm uses two normal wavelengths 1310 1550 one fiber coarse wdm provides 16 channels across multiple transmission windows silica fibers dense wdm dwdm uses c-band 1530 nm-1565 nm transmission window denser channel spacing channel plans vary typical dwdm system would use 40 channels 100 ghz spacing 80 channels 50 ghz spacing technologies capable 12.5 ghz spacing sometimes called ultra dense wdm new amplification options raman amplification enable extension usable wavelengths l-band 1565 nm-1625 nm less doubling numbers coarse wavelength division multiplexing cwdm contrast dwdm uses increased channel spacing allow less-sophisticated thus cheaper transceiver designs provide 16 channels single fiber cwdm uses entire frequency band spanning second third transmission windows 1310/1550 nm respectively including critical frequencies oh scattering may occur oh-free silica fibers recommended wavelengths second third transmission windows used avoiding region channels 47 49 51 53 55 57 59 61 remain commonly used os2 fibers water peak problem overcome possible 18 channels used wdm cwdm dwdm based concept using multiple wavelengths light single fiber differ spacing wavelengths number channels ability amplify multiplexed signals optical space edfa provide efficient wideband amplification c-band raman amplification adds mechanism amplification l-band cwdm wideband optical amplification available limiting optical spans several tens kilometres originally term coarse wavelength division multiplexing cwdm fairly generic described number different channel configurations general choice channel spacings frequency configurations precluded use erbium doped fiber amplifiers edfas prior relatively recent itu standardization term one common definition cwdm two signals multiplexed onto single fiber one signal 1550 nm band 1310 nm band 2002 itu standardized channel spacing grid cwdm itu-t g.694.2 using wavelengths 1270 nm 1610 nm channel spacing 20 nm itu g.694.2 revised 2003 shift channel centers 1 nm strictly speaking center wavelengths 1271 1611 nm many cwdm wavelengths 1470 nm considered unusable older g.652 specification fibers due increased attenuation 1270–1470 nm bands newer fibers conform g.652.c g.652.d standards corning smf-28e samsung widepass nearly eliminate water peak attenuation peak allow full operation 18 itu cwdm channels metropolitan networks main characteristic recent itu cwdm standard signals spaced appropriately amplification edfas limits total cwdm optical span somewhere near 60 km 2.5 gbit/s signal suitable use metropolitan applications relaxed optical frequency stabilization requirements allow associated costs cwdm approach non-wdm optical components cwdm used cable television networks different wavelengths used downstream upstream signals systems wavelengths used often widely separated example downstream signal might 1310 nm upstream signal 1550 nm gbic small form factor pluggable sfp transceivers utilize standardized cwdm wavelengths gbic sfp cwdm optics allow legacy switch system converted enable wavelength multiplexed transport fiber selecting compatible transceiver wavelengths use inexpensive passive optical multiplexing device 10gbase-lx4 10 gbit/s physical layer standard example cwdm system four wavelengths near 1310 nm carrying 3.125 gigabit-per-second gbit/s data stream used carry 10 gbit/s aggregate data passive cwdm implementation cwdm uses electrical power separates wavelengths using passive optical components bandpass filters prisms many manufacturers promoting passive cwdm deploy fiber home dense wavelength division multiplexing dwdm refers originally optical signals multiplexed within 1550 nm band leverage capabilities cost erbium doped fiber amplifiers edfas effective wavelengths approximately 1525–1565 nm c band 1570–1610 nm l band edfas originally developed replace sonet/sdh optical-electrical-optical oeo regenerators made practically obsolete edfas amplify optical signal operating range regardless modulated bit rate terms multi-wavelength signals long edfa enough pump energy available amplify many optical signals multiplexed amplification band though signal densities limited choice modulation format edfas therefore allow single-channel optical link upgraded bit rate replacing equipment ends link retaining existing edfa series edfas long haul route furthermore single-wavelength links using edfas similarly upgraded wdm links reasonable cost edfa cost thus leveraged across many channels multiplexed 1550 nm band stage basic dwdm system contains several main components introduction itu-t g.694.1 frequency grid 2002 made easier integrate wdm older standard sonet/sdh systems wdm wavelengths positioned grid exactly 100 ghz 0.8 nm spacing optical frequency reference frequency fixed 193.10 thz 1,552.52 nm main grid placed inside optical fiber amplifier bandwidth extended wider bandwidths first commercial deployment dwdm made ciena corporation sprint network june 1996 today dwdm systems use 50 ghz even 25 ghz channel spacing 160 channel operation dwdm systems maintain stable wavelength frequency needed cwdm closer spacing wavelengths precision temperature control laser transmitter required dwdm systems prevent drift narrow frequency window order ghz addition since dwdm provides greater maximum capacity tends used higher level communications hierarchy cwdm example internet backbone therefore associated higher modulation rates thus creating smaller market dwdm devices high performance factors smaller volume higher performance result dwdm systems typically expensive cwdm recent innovations dwdm transport systems include pluggable software-tunable transceiver modules capable operating 40 80 channels dramatically reduces need discrete spare pluggable modules handful pluggable devices handle full range wavelengths stage details concerning wavelength-converting transponders discussed clarify role played current dwdm technology additional optical transport layer also serve outline evolution systems last 10 years stated wavelength-converting transponders served originally translate transmit wavelength client-layer signal one dwdm system internal wavelengths 1,550 nm band note even external wavelengths 1,550 nm likely need translated almost certainly required frequency stability tolerances optical power necessary system edfa mid-1990s however wavelength converting transponders rapidly took additional function signal regeneration signal regeneration transponders quickly evolved 1r 2r 3r overhead-monitoring multi-bitrate 3r regenerators differences outlined mentioned intermediate optical amplification sites dwdm systems may allow dropping adding certain wavelength channels systems deployed august 2006 done infrequently adding dropping wavelengths requires manually inserting replacing wavelength-selective cards costly systems requires active traffic removed dwdm system inserting removing wavelength-specific cards interrupts multi-wavelength optical signal roadm network operators remotely reconfigure multiplexer sending soft commands architecture roadm dropping adding wavelengths interrupt pass-through channels numerous technological approaches utilized various commercial roadms tradeoff cost optical power flexibility network topology mesh nodes interconnected fibers form arbitrary graph additional fiber interconnection device needed route signals input port desired output port devices called optical crossconnectors oxcs various categories oxcs include electronic opaque optical transparent wavelength selective devices cisco enhanced wdm system combines 1 gb coarse wave division multiplexing cwdm connections using sfps gbics 10 gb dense wave division multiplexing dwdm connections using xenpak x2 xfp dwdm modules dwdm connections either passive boosted allow longer range connection addition cfp modules deliver 100 gbit/s ethernet suitable high speed internet backbone connections shortwave wdm uses vertical-cavity surface-emitting laser vcsel transceivers four wavelengths 846 953 nm range single om5 fiber 2-fiber connectivity om3/om4 fiber see also transponders optical communications different functional views meaning optical transponders several simulation tools used design wdm systems
Internet protocols
cisco nx-os nx-os network operating system nexus-series ethernet switches mds-series fibre channel storage area network switches made cisco systems evolved cisco operating system san-os originally developed mds switches based wind river linux inter-operable cisco operating systems command-line interface nx-os similar cisco ios recent nx-os cisco-style cli bash shell available nx-os 7.0 3 i3 output codice_1 codice_2 command line argument might look like text 4.1 4.2 5.0 5.1 5.2 6.0 6.1 6.2 7.0 9.2
Operating systems
swing application framework swing application framework jsr 296 java specification simple application framework swing applications graphical user interface gui computer software defines infrastructure common desktop applications making swing applications easier create withdrawn jsr 296 specification defines basic structure swing application defines framework small set extensible classes define infrastructure common desktop applications development open-source reference implementation called appframework began 2006 originally expected implementation would means integrating jsr 296 upcoming java se 7 dolphin version java project scheduled included milestone 5 java development kit jdk7 development however august 2009 announced project would included due inability reconcile design flaws achieve consensus among jsr 296 team milestone 5 deadline original swing application framework implementation put hold indefinitely later withdrawn spec lead request june 2011 last public release appframework project version 1.03 several forks original implementation started open-source communities several application framework libraries created achieve goals similar jsr 296 last release bsaf 1.9.1 2012 bsaf still available sourceforge button says project found takes defunct project kenai
Programming language topics
object desktop object desktop od previously object desktop network odnt online software subscription service created stardock os/2 relaunched windows 1997 object desktop includes graphical user interface customization productivity products offered stardock including windowblinds fences desktopx tweak7 iconpackager objectbar object desktop — initially entitled workplace toolset/2 — developed three years brad wardell kurt westerfeld subsequent stardock os/2 essentials pre-registered set os/2 shareware object desktop 1.0 followed 1.5 professional versions following short order 1997 os/2 isv market flagging many customers switching windows nt 4 1997 os/2 revenues 33 1996 fell 25 1996 levels 1998 led decision switch windows mid-1997 nevertheless stardock remained os/2 isv february 2001 stopped selling object desktop os/2 os/2 versions sold initial versions upgrades costing later windows versions due lower volume sales initial release object desktop praised functionality criticised performance compatibility issues object desktop 1.5 released 2 may 1996 fixing many problems adding following components users 1.0 could upgrade 37 object desktop professional name suggests aimed professional users os/2 released 24 august 1996 priced 179 users could also upgrade od 1.5 69.95 od 1.0 119 addition features od 1.5 package included object desktop 2.0 update previously released components integration professional features main package priced 99.95 users object desktop professional could upgrade 39 versions could upgraded 69.95 upgrade 2.02 released start 2000 made clear would last release became clear os/2 would remain viable platform stardock decided move windows required rewriting old components writing new ones replace appropriate windows would take time stardock needed money immediately sustain development cope cashflow problem object desktop users switched os/2 windows asked purchase windows subscriptions advance actual software understanding subscription period would begin software reasonably complete ended december 1999 program called early experience program due significant goodwill built previous years many signed stardock survived initially new object desktop package closely related os/2 versions old favourites like object edit control center task/tab launchpad ported however userbase expanded traditional core technical users wider windows market newer components shifted focus customizing graphical user interface flagship component object desktop became windowblinds popular additions iconpackager objectbar desktopx deskscapes fences impulse preceded component manager stardock central main interface registering downloading updating components roughly equivalent package manager users pay initial fee access software one year access download updates may also download new components added subscription period updates guaranteed components deemed less relevant may passed removed expiry users download software renew however lose use released non-beta software already downloaded necessary renew immediately renewals add year access date renewal expiry date historically initial subscription fee windows version object desktop 49.95 year renewal upgrade standalone component 34.95 object desktop 2008 introduced two tiers lower tier 49.95 higher tier 69.95 latter eliminated 2010 object desktop works component model many programs available separately subscribers use components available object desktop subscribers february 2010 components may remain available legacy subscribers offered new users components withdrawn service make past beta stages components brought forth windows version object desktop occasional complaint subscription model subscriber favourite component updated recently may left beta long time hand popular components windowblinds tend frequently updated beta releases every week two release versions new features every months major version changes every year non-object desktop users said beta issue creates double standard forces people upgrade object desktop order get latest features stardock says policy due many standalone users expecting beta versions reliability release versions increased ease releasing build impulse separate installation package
Internet protocols
security bug security bug security defect software bug exploited gain unauthorized access privileges computer system security bugs introduce security vulnerabilities compromising one security bugs need identified exploited qualify security bugs like software bugs stem root causes generally traced either absent inadequate security bugs generally fall fairly small number broad categories include see software security assurance
Computer security
3dnow 3dnow extension x86 instruction set developed advanced micro devices amd adds single instruction multiple data simd instructions base x86 instruction set enabling perform vector processing improves performance many graphic-intensive applications first microprocessor implement 3dnow amd k6-2 introduced 1998 application appropriate raised speed 2–4 times however instruction set never gained much popularity amd announced august 2010 support 3dnow would dropped future amd processors except two instructions codice_1 codice_2 instructions two instructions also available bay-trail intel processors 3dnow developed time 3d graphics becoming mainstream pc multimedia games realtime display 3d graphics depended heavily host cpu floating-point unit fpu perform floating-point calculations task amd k6 processor easily outperformed competitor intel pentium ii enhancement mmx instruction set 3dnow instruction-set augmented mmx simd registers support common arithmetic operations add/subtract/multiply single-precision 32-bit floating-point data software written use amd 3dnow instead slower x87 fpu could execute 4x faster depending instruction-mix first implementation 3dnow technology contains 21 new instructions support simd floating-point operations 3dnow data format packed single-precision floating-point 3dnow instruction set also includes operations simd integer operations data prefetch faster mmx-to-floating-point switching later intel would add similar incompatible instructions pentium iii known sse streaming simd extensions 3dnow floating-point instructions following 3dnow integer instructions following 3dnow performance-enhancement instructions following little evidence second version 3dnow ever officially given trade name led confusion documentation refers new instruction set common terms extended 3dnow enhanced 3dnow 3dnow+ phrase enhanced 3dnow found locations amd website capitalization enhanced appears either purely grammatical used emphasis processors may may extensions notable references benchmark page k6-iii-p extensions extension 3dnow instruction set introduced first-generation athlon processors athlon added 5 new 3dnow instructions 19 new mmx instructions later k6-2+ k6-iii+ targeted mobile market included 5 new 3dnow instructions leaving 19 new mmx instructions new 3dnow instructions added boost dsp new mmx instructions added boost streaming media 19 new mmx instructions subset intel sse1 instruction set amd technical manuals amd segregates instructions apart 3dnow extensions amd customer product literature however segregation less clear benefits 24 new instructions credited enhanced 3dnow technology led programmers come name 19 new mmx instructions common appears integer sse isse ssemmx mmx2 also found video filter documentation public domain sector also noted isse could also refer internet sse early name sse 3dnow extension dsp instructions following mmx extension instructions integer sse following 3dnow professional trade name used indicate processors combine 3dnow technology complete sse instructions set sse1 sse2 sse3 athlon xp first processor carry 3dnow professional trade name first product athlon family support complete sse1 instruction set total 21 original 3dnow instructions five 3dnow extension dsp instructions 19 mmx extension instructions 52 additional sse instructions complete sse1 compatibility geode gx geode lx added two new 3dnow instructions currently absent processors 3dnow professional instructions unique geode gx/lx following one advantage 3dnow possible add multiply two numbers stored register sse number combined number position another register capability known horizontal intel terminology major addition sse3 instruction set disadvantage 3dnow 3dnow instructions mmx instructions share register-file whereas sse adds 8 new independent registers codice_50–codice_51 mmx/3dnow registers shared standard x87 fpu 3dnow instructions x87 instructions executed simultaneously however aliased x87 fpu 3dnow mmx register states saved restored traditional x87 codice_52 codice_53 instructions arrangement allowed operating systems support 3dnow explicit modifications whereas sse registers required explicit operating system support properly save restore new xmm registers via added codice_54 codice_55 instructions fx* instructions upgrade older x87 save restore instructions could save sse register states also x87 register states hence meant could save mmx 3dnow registers amd athlon xp k8-based cores i.e athlon 64 assembly programmers noted possible combine 3dnow sse instructions reduce register pressure practice difficult improve performance due instructions executing shared functional units
Computer architecture
security vision security vision – software meant automation information security management system isms organisation software kind representative security operations center soc functionality security vision renders information security processes comprising information security management system organization automatic compliance international information security management standards next security vision modules allow make automatic performance standard requirements following sections moment creation security vision software till creator system sticks three-level architecture – core level collection level management level core level – made collection analysis correlation events generated different sources events corporate network collection level – meant management level – made rendering information security management process automatic basically russian-speaking system management portal security vision software collects events generated process following information security information technology functioning regulatory requirements associated necessity system kind found mandatory legislation norms russian federation law well recommended international prescriptions economic sectors area regulatory security requirements industry standards international standards software core level comprises functionality stocktaking integrity control certified means 4 level control absence non-declared capabilities listed national catalog certified information security means federal office technical export control also used 2013 2012 2011 2010
Computer security
on-line debugging tool on-line debugging tool odt used describe several debugger programs developed digital equipment corporation dec hardware various operating systems including os/8 rt-11 rsx-11 rsts/e implemented odt firmware console lsi-11-family processors including 11/03 11/23/24 11/53 11/73 11/83/84 debugger allowed access memory using octal addresses data within software systems debugger accessed process address space dec line pdp-11 processors implement virtual memory operating system perspective instead worked fixed address space mapped unified view program address space using active page register apr apr could map program ram increments 4k 16-bit words maximum 32k words apr could map 8 segments ram limited 4k structure maximum ram apr able map 32k 16-bit words case rsts/e usually meant runtime system rts mapped upper portion address space user program resided lower portion address space rts provided code support access operating system behalf user program rts stored non-static data address space user program rts typically read-only operating system loaded single copy rts mapped user program required rts apr would set map rts upper portion program address space 4k increments basic plus rts basic+ programming language typically mapped 16k user program mapped 4k increments lower 16k rt11 rts occupied 4k user program like rt11-based peripheral interchange program pip could expand maximum 28k odt could used patch binary modules like rts without requiring re-compilation binary source firmware console implementation accessed physical memory odt non-symbolic debugger implements similar functionality advanced debugger adb unix systems console odt replaced lights switches console many earlier processors access console odt obtained either power appropriate power mode selected execution halt instruction kernel mode use front panel halt switch button 1000/ xxxxxx 112737 lf deposits program deposit pc program counter sets pc start program deposit psw program status word locks interrupts effect write stream console check transmitter ready highly probable large number garbage characters displayed rsx-11m-plus odt essentially superset odt implementations odt implemented code linked task using task builder /da switch task built odt run odt invoked entry underscore standard odt prompt addresses odt debugger 16 bit addresses mode odt operating physical addresses used console odt pdp-8 os/8 operating system odt command invoked octal debugging technique tool subsequent pdp-11 odt programs non-symbolic could examine modify memory also set breakpoints
Operating systems
instructions per cycle computer architecture instructions per cycle ipc commonly called instructions per clock one aspect processor performance average number instructions executed clock cycle multiplicative inverse cycles per instruction calculation ipc done running set piece code calculating number machine-level instructions required complete using high-performance timers calculate number clock cycles required complete actual hardware final result comes dividing number instructions number cpu clock cycles number instructions per second floating point operations per second processor derived multiplying number instructions per cycle clock rate cycles per second given hertz processor question number instructions per second approximate indicator likely performance processor number instructions executed per clock constant given processor depends particular software run interacts processor indeed entire machine particularly memory hierarchy however certain processor features tend lead designs higher-than-average ipc values presence multiple arithmetic logic units alu processor subsystem perform elementary arithmetic logical operations short pipelines comparing different instruction sets simpler instruction set may lead higher ipc figure implementation complex instruction set using chip technology however complex instruction set may able achieve useful work fewer instructions given level instructions per second achieved high ipc low clock speed like amd athlon early intel core series low ipc high clock speed like intel pentium 4 lesser extent amd bulldozer valid processor designs choice two often dictated history engineering constraints marketing pressures however high ipc high frequency always give best performance useful work done computer depends many factors besides processor speed factors include instruction set architecture processor microarchitecture computer system organization design disk storage system capabilities performance attached devices efficiency operating system importantly high-level design application software use users purchasers computer system instructions per clock particularly useful indication performance system accurate measure performance relevant application benchmarks much useful awareness existence useful provides easy-to-grasp example clock speed factor relevant computer performance
Computer architecture
c3 linearization computing c3 superclass linearization algorithm used primarily obtain order methods inherited presence multiple inheritance words output c3 superclass linearization deterministic method resolution order mro c3 superclass linearization results three important properties first published 1996 oopsla conference paper entitled monotonic superclass linearization dylan adapted open dylan implementation january 2012 following enhancement proposal chosen default algorithm method resolution python 2.3 newer perl 6 parrot solidity pgf/tikz object-oriented programming module also available alternative non-default mro core perl 5 starting version 5.10.0 extension implementation earlier versions perl 5 named codice_1 exists cpan python guido van rossum summarizes c3 superclass linearization thusly c3 superclass linearization class sum class plus unique merge linearizations parents list parents list parents last argument merge process preserves local precedence order direct parent classes merge parents linearizations parents list done selecting first head lists appear tail elements list except first lists note good head may appear first element multiple lists time forbidden appear anywhere else selected element removed lists appears head appended output list process selecting removing good head extend output list repeated remaining lists exhausted point good head selected heads remaining lists appear one tail lists merge impossible compute due inconsistent orderings dependencies inheritance hierarchy linearization original class exists naive divide conquer approach computing linearization class may invoke algorithm recursively find linearizations parent classes merge-subroutine however result infinitely looping recursion presence cyclic class hierarchy detect cycle break infinite recursion reuse results previous computations optimization recursive invocation shielded re-entrance previous argument means cache memoization given linearization z computed first metaclass enable short representation objects name instead example class '__main__.a class type type class object metaclass=type pass construct inheritance tree class pass class b pass class c pass class pass class e pass class k1 b c pass class k2 b e pass class k3 pass class z k1 k2 k3 pass » z.mro z k1 k2 k3 b c e type 'object perl 6 uses c3 linearization classes default say z.^mro output z k1 k2 k3 b c e mu
Programming language topics
visitor management visitor management refers tracking usage public building site gathering increasing amounts information visitor management system record usage facilities specific visitors provide documentation visitor ’ whereabouts. ref
Computer security
hortonworks hortonworks data software company based santa clara california developed supported open-source software primarily around apache hadoop designed manage big data associated processing hortonworks completed merger cloudera january 2019 hortonworks software used build enterprise data services applications iot connected cars example single view x customer risk patient advanced analytics machine learning next best action realtime cybersecurity hortonworks three interoperable product lines hortonworks formed june 2011 independent company funded 23 million venture capital yahoo benchmark capital first office sunnyvale california company employs contributors open source software project apache hadoop hortonworks data platform hdp product includes apache hadoop used storing processing analyzing large volumes data platform designed deal data many sources formats platform includes hadoop technology hadoop distributed file system mapreduce pig hive hbase zookeeper additional components eric baldeschweiler yahoo initial chief executive rob bearden chief operating officer formerly springsource benchmark partner peter fenton board member company name refers character horton elephant since elephant symbol hadoop october 2018 hortonworks cloudera announced would merging all-stock merger equals
Distributed computing architecture
bokosuka wars game responsible laying foundations tactical role-playing game genre simulation rpg genre known japan blend role-playing strategy game elements game also variously described early example action role-playing game early prototype real-time strategy game unique reverse tower defense game time game considered major success japan originally developed 1983 sharp x1 computer ascii entertainment first software contest sold boxed year msx port released 1984 followed 1985 versions s1 pc-6000mkii pc-8801 pc-9801 fm-7 family computer latter released december 14 1985 login magazine november 1984 issue featured sequel x1 entitled new bokosuka wars source code included all-new enemy characters redesigned items traps level difficulty became balanced also included tape login magazine november 1984 issue never sold form pc-8801 version used sold download enterbrain ported i-mode service 2004 famicom version released wii virtual console april 8 2008 sequel bokosuka wars ii released japan november 10 2016 later famicom version king suren forces captured turned trees rocks king ogereth king suren release warriors trees rocks defeat king ogereth forces allies coming trees rocks appear famicom version earlier x1 msx pc computer versions however player starts complete army may gain extra knights freeing prison cells trees rocks soldiers turned objects original computer versions player control three chess-like units king knight pawn pressing d-pad move king suren army desired direction captive soldiers freed using knight break gates front famicom version player starts game king suren 597m acquires allies bumping trees cacti rocks walls using king suren restore normal form throughout world bokosuka obstacles certain characters pass gates soldiers locked broken knights death tiles kill characters except soldiers remove step walls 500m 400m 300m 200m broken king suren one unit collides another battle takes place tile change icon crossed swords b battle victory automatically calculated computer based difference offensive strengths units king suren dies game ends announcing wow lose king suren succeeds defeating king ogreth game ends bravo win japanese instruction manual contains lyrics onward bokosuka すすめボコスカ peculiar game music written programmer
Computer architecture
mimedefang mimedefang gpl licensed framework filtering e-mail uses sendmail milter api c glue code perl code let user write high-performance mail filters perl mimedefang used mimedefang originally developed dianne skoll contracted royal college physicians surgeons canada 2000 help stop flood email viruses college network software written filter attachments originally called mimesweeper mimedefanger currently mimedefang skoll announced software public august 28 2000 december 21 2001 version incorporating support spamassassin released making mimedefang filter spam viruses skoll company roaring penguin software currently markets commercial anti-spam product known canit based open-source version mimedefang milter library included sendmail uses posix threads allow multiple concurrent filters mimedefang perl filter uses pre-forked process model similar traditional apache web server multi-processing model mimedefang therefore consists three components mimedefang users code filtering policies perl using infrastructure provided mimedefang.pl n't need worry thread synchronizations perl filter separate single-threaded process infrastructure provided mimedefang.pl follows milter api reasonably closely exactly includes convenience routines parsing rebuilding mime messages filter authors concentrate high-level policy rather worry low-level api details convenience comes small loss flexibility loss performance
Computer security
comparison opensolaris distributions technical variations solaris distributions include support different hardware devices systems software package configurations organizational differences may motivated historical reasons criteria include security including quickly security upgrades available ease package management number packages available tables compare noteworthy distribution latest stable release wide-ranging objective criteria cover operating system subjective merits branches marked unstable beta compare solaris distributions operating systems basic general information distributions creator producer release date latest version forth information features distributions package numbers approximate
Operating systems
plus programming language plus pascal-like system implementation language university british columbia ubc canada based sue system language developed university toronto c. 1971 another programming language named plus developed sperry univac roseville minnesota univac plus subject article plus developed university british columbia ubc computing centre alan ballard paul whaley use development michigan terminal system mts code generated compiler operating system dependent limited use development mts ubc plus compiler written largely plus runs michigan terminal system mts ibm s/370 compatible hardware ibm os/vs1 generates code ibm s/370 dec pdp-11 motorola 68000 architectures plus based large extent sue system language developed university toronto c. 1971 sue language derived particularly data structure facilities pascal plus superficially quite different sue pascal however underlying language semantics really quite similar users familiar c programming language also recognize much structure semantics plus goals compiler plus language include manual ubc plus plus programming language available description source object libraries available use plus plus source library definitions also available hello world example program prints string hello world terminal screen display
Programming language topics
blackenergy blackenergy malware first reported 2007 http-based toolkit generated bots execute distributed denial service attacks 2010 blackenergy 2 emerged capabilities beyond ddos 2014 blackenergy 3 came equipped variety plug-ins russian-based cybergang known sandworm attributed using blackenergy targeted attacks attack distributed via word document powerpoint attachment email luring victims clicking seemingly legitimate file blackenergy code facilitates different attack types infect target machines also equipped server-side scripts perpetrators develop command control c c server cybercriminals use blackenergy bot builder toolkit generate customized bot client executable files distributed targets via email spam phishing e-mail campaigns be1 lacks exploit functionalities relies external tools load bot blackenergy detected using yara signatures provided united states department homeland security dhs • target one ip address per hostname • runtime encrypter evade detection antivirus software • hides processes system driver syssrv.sys • ddos attack commands e.g icmp flood tcp syn flood udp flood http get flood dns flood etc • download commands retrieve launch new updated executables server • control commands e.g stop wait die blackenergy 2 uses sophisticated rootkit/process-injection techniques robust encryption modular architecture known dropper decrypts decompresses rootkit driver binary installs victim machine server randomly generated name update blackenergy 1 combines older rootkit source code new functions unpacking injecting modules user processes packed content compressed using lz77 algorithm encrypted using modified version rc4 cipher hard-coded 128-bit key decrypts embedded content decrypting network traffic cipher uses bot unique identification string key second variation encryption/compression scheme adds initialization vector modified rc4 cipher additional protection dropper rootkit unpacking stub used inner rootkit userspace modules primary modification rc4 implementation blackenergy 2 lies key-scheduling algorithm • execute local files • download execute remote files • updates plugins command control servers • execute die destroy commands latest full version blackenergy emerged 2014 changes simplified malware code version installer drops main dynamically linked library dll component directly local application data folder variant malware involved december 2015 ukraine power grid cyberattack • fs.dll — file system operations • si.dll — system information “ blackenergy lite ” • jn.dll — parasitic infector • ki.dll — keystroke logging • ps.dll — password stealer • ss.dll — screenshots • vs.dll — network discovery remote execution • tv.dll — team viewer • rd.dll — simple pseudo “ remote desktop ” • up.dll — update malware • dc.dll — list windows accounts • bs.dll — query system hardware bios windows info • dstr.dll — destroy system • scan.dll — network scan
Computer security
packettrap packettrap provider network management traffic analysis software midsize companies company headquartered san francisco california corporate parent dell located round rock texas packettrap features include desktop management server management monitor cloud assets etc
Computer security
buffalo network-attached storage series buffalo network-attached storage series network-attached storage devices modified miniature general purpose linux-based computers linkstation terastation intended general public kuro box intended expert hackers cheap platform linux development devices undergone various improvements since first produced example first generation device 100base-tx network adapter using parallel ata hard drive current version 1000base-t-capable connection uses serial ata interface older generations device used powerpc mips processors latest version device uses arm architecture processor linkstation powerpc mips arm based network attached storage appliance sold north america europe japan significantly notable among linux community japan us/europe hackable generic linux appliance made tasks file storage task designed linkstation ethernet usb serial ports video output made buffalo technology division melco produced japan 2006 also available american retailers best buy compusa well europe kuro box name series powerpc arm processor based computers intended use network-attached storage device original kuro box made spare hardware components manufacturer linkstation recent versions kuro box use later linkstation hardware hardware similar linkstation kuro box versions provided without hard drive case physical dimensions shape corresponding linkstation black color japanese symbols kuro box 玄箱 meaning box operated expert esoteric knowledge silver lettering side panel name also pun kuro different kanji 黒 also means 'black since january 2012 terastation uses lio iscsi target device runs linux included changes linux source code buffalo required release modified versions source code per terms gnu general public license due availability source code relatively low cost device several community projects centered around two main replacement firmware releases available device first openlink based official buffalo firmware improvements features added freelink debian distribution product designed manufacturer accept user-supplied linux distribution several including kurobox-specific distribution called sylver debian gentoo linux fedora core ported various user groups us/europe japan like linkstation device runs version linux debian gentoo linux distributions netbsd reported ported device various iterations ships universal plug play protocol distribution multimedia stored device also configured variety different media servers twonkyvision media server slimserver/squeezecenter server itunes server using digital audio access protocol samba server lio iscsi target mldonkey client well network file system server posix-based systems use backup server modified use rsync back synchronize data one many computers network pushing data even linkstation pulling data remote servers—beside use buffalo-provided backup software windows also found use number ways notably usb interface comes configured print server also use common unix printing system act usb printer users managed get use number usb devices version 2.6 linux kernel enhanced usb support additionally apache http server software already installed purpose providing buffalo configuration screens device easily converted lightweight web server buffalo content deleted serve content operator choice
Computer architecture
gauntlet 1985 video game gauntlet fantasy-themed hack slash 1985 arcade game atari games noted one first multi-player dungeon crawl arcade games core design gauntlet comes dandy 1983 atari 8-bit family title resulted lawsuit arcade version gauntlet released november 1985 initially available dedicated 4-player cabinet total 7,848 units distributed atari later released 2-player cabinet variant june 1986 aimed operators could afford sufficient space 4-player version game set within series top-down third-person perspective mazes object find touch designated exit every level assortment special items located level increase player character health unlock doors gain points magical potions destroy enemies screen player controls one four playable fantasy-based characters thor warrior merlin wizard thyra valkyrie questor elf characters named cabinet artwork in-game 're referred title classes character unique strength weaknesses example warrior strongest hand-to-hand combat wizard powerful magic valkyrie best armor elf fastest movement characters assigned control panel 4-player version whereas 2-player version player selects character start game joining middle play enemies assortment fantasy-based monsters including ghosts grunts demons lobbers sorcerers thieves enters level specific generators destroyed bosses game dangerous enemy death destroyed using magic potion otherwise death vanish automatically drained certain amount health player game progresses higher levels skill needed reach exit success often depending willingness players cooperate sharing food luring monsters places engaged slaughtered conveniently contact enemies reduces player health health also slowly drains thus creating time limit character health reaches zero character dies character revived place full health spending game credit — inserting coin arcade — within certain short time window died allows even least proficient players keep playing indefinitely willing keep inserting coins however player final score divided amount credits used play resulting average aside ability four players game also noted narrator voice produced texas instruments tms5220c speech chip tms5220c speech encoded earl vickers narrator voiced ernie fosselius frequently makes statements repeating game rules including shots hurt players yet remember n't shoot food elf shot food warrior needs food badly narrator occasionally comments battle saying 've seen bravery let see get player life force points fall 200 narrator states life force running elf needs food valkyrie die control panel 4-player cabinet wider standard uprights order accommodate four people time player 8-way joystick two buttons one fire ranged attack one magic magic button also starts game gauntlet release games started using design popular conversion target newer games run originally called dungeons game conceived atari game designer ed logg claimed inspiration son interest paper-based game dungeons dragons interest 1983 atari 800 home computer game dandy game development spanned 1983 1985 team led designers ed logg roger zeigler working title became legally unavailable april 1985 renamed gauntlet may based upon elaborate hardware design atari history date company first coin-operated game features voice synthesizer chip gauntlet ported ms-dos apple ii apple macintosh msx nes apple iigs master system genesis gauntlet 4 atari st commodore 64 amstrad cpc zx spectrum genesis port released gauntlet 4 spelled gauntlet iv packaging manual outside japan adds three modes addition arcade mode quest action rpg battle deathmatch game record single-player variant arcade mode progress kept track via passcode emulated instance original gauntlet arcade series included midway arcade treasures 2003 compilation arcade games available nintendo gamecube playstation 2 xbox windows gauntlet deeper dungeons expansion pack original ports gauntlet 512 new levels required original program released 1987 british company u.s. gold uk europe mindscape united states released amstrad cpc msx atari st commodore 64 zx spectrum developed gremlin graphics many levels entries competition throughout europe ten winners awarded prizes gauntlet t-shirt copy program computers contest announced instructions many ported games early 1987 u.s. gold release expansion cassette gauntlet containing hundreds new levels treasure rooms chance maze included tape levels presented randomly artwork side panel artwork arcade cabinet main characters shown enemies removed image replaced pink background many reviewers noted levels much harder original game although consensus quite good first game newly released arcade sequel game highly profitable upon october 1985 launch reportedly earning one san mateo california arcade operator sixteen weeks another canadian operator nine days atari ultimately sold total 7,848 gauntlet video game arcade cabinets 1986 golden joystick awards london gauntlet game year runner-up category arcade-style game year entertainment weekly picked game 14 greatest game available 1991 saying sequels game nothing matches original gauntlet innovative fast-playing mix mazes monsters magic spells macintosh version game reviewed 1989 dragon 150 hartley patricia kirk lesser role computers column reviewers gave game 4 5 stars compute praised macintosh version sound effects computer video games praised accuracy amstrad version said great graphics good sounds perfect playability crash praised smooth fast scrolling longevity avenger listed alternative master system review ace said people ages could quickly master controls tasks spectrum version biggest selling game 1986 voted number 38 sinclair readers top 100 games time mega drive release 1993 megatech said action flawless stood test time well continued brilliant game one warrants immediate attention mega praised longevity game saying huge fun must-buy placing game 19 list best mega drive games time decade release official uk playstation magazine noted spent many night hunched fag-stained gauntlet machine said limitations become apparent late 1990s next generation including game top 100 games time noted intro record gauntlet number 101 controversy arose release game arcade subsequent port nintendo entertainment system ed logg co-creator asteroids centipede credited original game design gauntlet arcade version well 1987 nes release version release john palevich threatened lawsuit asserting original concept game dandy game atari 8-bit family written palevich published 1983 conflict settled without suit filed atari games business tengen allegedly awarding palevich gauntlet game machine credited special thanks 1986 logg entirely removed credits later releases 2007 logg claims involvement nes game dandy later reworked atari corporation published atari 2600 atari 7800 atari 8-bit family dark chambers 1988 world record holder gauntlet russ cool score 5.1 million points set december 6 2013
Computer architecture
mysecurecyberspace mysecurecyberspace began 2003 initiative carnegie mellon cylab information networking institute educate public computer security network security internet safety inspired national strategy secure cyberspace initiative empowers users secure part cyberspace initiative created web portal www.mysecurecyberspace.com customized information users cybersecurity threats addition tactical countermeasures legal ethical privacy issues example using secure cyberspace tool web portal user could enter online activity email receive explanation common threats issues associated activity spam phishing scams receive advice resolve problems web portal mysecurecyberspace served people ages roles certain areas web portal contained articles resources specifically parents educators children 2005 2012 mysecurecyberspace provided flash-based interactive game designed elementary school children www.carnegiecyberacademy.com called carnegie cadets reinforced principles safe responsible computing enriched content classroom material complied national educational technology standards game could integrated fourth fifth grade curricula carnegie cyber academy website supporting materials remain available game compatible current operating systems grant national science foundation cylab information networking institute launched web portal april 2005 included prototype online carnegie cadets game carnegie cadets mysecurecyberspace game companion website officially launched october 26 2007 demonstration j.h brooks elementary school pittsburgh pa attorney general tom corbett attended kickoff event endorsed game
Computer security
lispkit lisp lispkit lisp lexically scoped purely functional subset lisp pure lisp developed testbed functional programming concepts first used early experimentation lazy evaluation secd machine-based implementation written algol variant published developer peter henderson 1980 compiler virtual machine highly portable result implemented many machines base language provides following functions extensions discussed henderson book explicit support lazy evaluation non-deterministic programming functions lambda let letrec similar subtle differences way treat named variables make useful different ways lambda defines returns function let binds expressions variable names letrec essentially similar let except allows definition recursive functions values e.g. infinite series
Programming language topics
emmabuntüs emmabuntüs linux distribution derived ubuntu/debian designed facilitate repacking computers donated humanitarian organizations like emmaüs communities name emmabuntüs portmanteau emmaüs ubuntu desktop environment xfce cairo-dock lxde also included optionally installed multiple applications installed perform task order provide choice user uses system examples
Operating systems
proactive network provider participation p2p p4p proactive network provider participation p2p method internet service providers isps peer-to-peer p2p software optimize peer-to-peer connections p4p proponents say save isp significant costs using local connections also speeds download times p2p downloaders 45 critics say favor downloaders isps come expense others established 2007 p4p working group p4pwg participants isp movie/content p2p industries focused helping isps handle demands large media files enabling legal distribution – building believe effective model transmitting movies large files customers current p2p model shares data equally peers regardless whether nearby results several nearby peers sending receiving data across world possible – working group members say currently pattern traffic poses problem p4p works isp use new itracker provides information isp network configured p2p client software p2p torrent servers called trackers query itracker identify data routes isp prefers connections avoid changing depending time day p2p software co-operatively connect peers closer cheaper isp selectively favoring peers instead choosing peers randomly provides three methods finding local peers note p4p replace control p2p networks p4p allows isps provides additional information regarding network topology p2p networks may choose utilize optimize network data delivery information used combination information p2p networks collect observed peer data transfer rates example p2p network selecting nearby peer slow far peer fast decision entirely control p2p network implementation p4p entirely voluntary part isps p2p networks adopted mutually beneficial concern existing p2p trackers p4p may used prevent piracy future p4p working group includes prominent members entertainment industry well known anti-piracy lobbyists anti-piracy measures could added future p2p industry also says p4p may slow transfers users bittorrent example designed favor fastest peers available – changed favor closest peers instead must affect speed equality balance peers would lost – clients networks good backbone slow upload speeds would download slower clients using isps support p4p would benefit using local peers p4p work software supports yet protocols currently dominate network keep blind locality liteload shay horovitz danny dolev hebrew university jerusalem presents solution leads p2p locality isps existing protocols future ones
Distributed computing architecture
douglas thomas douglas thomas born 1966 american scholar researcher journalist associate professor annenberg school communication university southern california studies technology communication culture author editor numerous books including reading nietzsche rhetorically guilford 1998 cybercrime security surveillance information age brian loader routledge 2000 hacker culture university minnesota press 2002 technological visions hopes fears shape new technologies marita sturken sandra ball-rokeach published numerous articles academic journals founding editor games culture journal interactive media 1998 1999 covered case kevin mitnick wired news july 24 2002 testified congress topic cyber terrorism critical infrastructure protection research funded annenberg center communication richard lounsbery foundation macarthur foundation focused relationship virtual worlds civic engagement digital media learning recent article co-authored john seely brown gamer disposition named harvard business review breakthrough idea 2008 also featured conversation starter blog also co-authored new culture learning cultivating imagination world constant change translated turkish
Computer security
bennugd bennugd also referred bennu game development bennu high-level open-source video game development suite originally created fenix project fork argentinian hacker splitergu officially supported windows linux gp2x wiz gp2x caanoo dingux also run multiple platforms extent including freebsd mac os x ios consoles gp2x dingoo a320 wii recently bennugd ported sega dreamcast playstation 2 bennugd focuses modularity portability makes easy beginners experienced users create games bennugd console application several integrated development environments ide available none officially supported package includes compiler run-time code different shared libraries extend core functionality bennugd created fenix project fork argentinian hacker splintergu disagreements fenix project community january 2010 first part two-part series articles bennugd published spanish todolinux magazine february 2010 second part published
Programming language topics
sampl sampl stands stochastic ampl algebraic modeling language resulting expanding well-known language ampl extended syntax keywords designed specifically representing stochastic programming problems recent extensions problems chance constraints integrated chance constraints robust optimization problems generate deterministic equivalent version instances using solvers ampl connects generate smps representation use specialized decomposition based solvers like fortsp sampl shares language features ampl adds constructs specifically designed expressing scenario based stochastic programming robust optimization express scenario-based sp problems additional constructs describe tree structure group decision variable stages moreover possible specify parameter stores probabilities branch tree set represents scenario set constructs easily define chance constraints integrated chance constraint sp problem available well using language constructs allows retain structure problem hence making available solvers might exploit using specialized decomposition methods like benders decomposition speed-up solution sampl supports constructs describe three types robust optimization formulations sampl currently available part software ampldev distributed www.optirisk-systems.com supports many popular 32- 64-bit platforms including windows linux mac os x free evaluation version limited functionality available following sampl version simple problem dakota show sp related constructs include data file follows normal ampl syntax see example provided ampl wikipedia page reference sampl instance level format sp problems smps therefore problem solved solver supports standard one solvers fortsp included standard sampl distribution regarding robust optimization problems needed solver depend specific formulation used ben-tal nemirovski formulation need second-order cone capable solver
Programming language topics
programmable interval timer computing embedded systems programmable interval timer pit counter generates output signal reaches programmed count output signal may trigger interrupt pits may one-shot periodic one-shot timers signal stop counting periodic timers signal every time reach specific value restart thus producing signal periodic intervals periodic timers typically used invoke activities must performed regular intervals counters usually programmed fixed intervals determine long counter count signals interval determines long counter count output signal intel 8253 pit original timing device used ibm pc compatibles used 1.193182 mhz clock signal one third color burst frequency used ntsc one twelfth system clock crystal oscillator contains three timers timer 0 used microsoft windows uniprocessor linux system timer timer 1 historically used dynamic random access memory refreshes timer 2 pc speaker lapic newer intel systems offers higher-resolution one microsecond timer used preference pit timer linux kernels starting 2.6.18
Computer architecture
topiary hacktivist topiary real name jake leslie davis born 27 october 1992 former hacker worked anonymous lulzsec similar hacktivist groups associate internet group anonymous publicly claimed various online attacks including hacking hbgary westboro baptist church gawker also claimed responsibility defacing government websites countries zimbabwe syria tunisia ireland egypt 24 february 2011 topiary gained attention appeared david pakman show informed host anonymous replaced westboro baptist church webpage message anonymous on-air confrontation shirley phelps-roper recording event placed youtube reached one million views five days topiary member lulzsec ran twitter account guardian reported topiary name daniel 14 july 2011 guardian published exclusive interview topiary spoke extensively motivations describing internet denizen passion change said feared tracked authorities hope n't pinned us especially friends lulzsec later full transcript lengthy interview surfaced website freelance guardian journalist ryan gallagher 18-year-old man suspected topiary arrested shetland islands scotland 27 july 2011 31 july 2011 man charged five offences including unauthorised computer access conspiracy carry distributed denial service attack serious organised crime agency website scotland yard later identified man arrested jake davis resident island yell charged unauthorised access computer computer misuse act 1990 encouraging assisting criminal activity serious crime act 2007 conspiracy launch denial-of-service attack serious organised crime unit contrary criminal law act 1977 criminal conspiracy also criminal law act 1977 police confiscated dell laptop 100-gigabyte hard drive 16 different virtual machines hard drive also contained details relating attack sony hundreds thousands email addresses passwords london court released davis bail conditions live curfew mother access internet lawyer gideon cammerman stated client help publicise lulzsec anonymous attacks lacked technical skills anything sympathiser arrest anonymous launched 'free topiary campaign included adding free topiary banner twitter avatars similar free bradley banner davis pleaded guilty 25 june 2012 ddos attacks several websites pleaded guilty two counts encouraging others commit computer offenses fraud davis due tried along ryan cleary ryan ryan ackroyd kayla mustafa al-bassam tflow beginning 8 april 2013 court informed would take 3,000 hours view material ackroyd alone released bail except cleary 8 april 2013 davis appeared court fellow hackers ryan ackroyd ryan cleary mustafa al-bassam four pleaded guilty computer crimes sentenced 14 may 2013 davis faced maximum 10 years prison got 24 months young offenders institute served 38 days electronically tagged 21 months counted sentence
Computer security
computational humor computational humor branch computational linguistics artificial intelligence uses computers humor research relatively new area first dedicated conference organized 1996 first computer model sense humor suggested suslov early 1992 investigation general scheme information processing shows possibility specific malfunction conditioned necessity quick deletion consciousness false version specific malfunction identified humorous effect psychological grounds exactly corresponds incongruity-resolution theory however essentially new ingredient role timing added well-known role ambiguity biological systems sense humor inevitably develops course evolution biological function consists quickening transmission processed information consciousness effective use brain resources realization algorithm neural networks justifies naturally spencer hypothesis mechanism laughter deletion false version corresponds zeroing part neural network excessive energy neurons thrown motor cortex arousing muscular contractions practical realization algorithm needs extensive databases whose creation automatic regime suggested recently result magistral direction developed properly subsequent investigations accepted somewhat specialized colouring approach analysis humor classification jokes step attempt generate jokes basing rules underlie classification simple prototypes computer pun generation reported early 1990s based natural language generator program vinci graeme ritchie kim binsted 1994 research paper described computer program jape designed generate question-answer-type puns general i.e. non-humorous lexicon program name acronym joke analysis production engine examples produced jape since approach improved latest report dated 2007 describes standup joke generator implemented java programming language standup generator tested children within framework analyzing usability language skills development children communication disabilities e.g. cerebral palsy project name acronym system augment non-speakers dialog using puns allusion standup comedy children responded language playground enthusiasm showed marked improvement certain types language tests two young people used system ten-week period regaled peers staff family neighbors jokes call spicy missile hot shot joy enthusiasm entertaining others inspirational stock strapparava described program generate funny acronyms askthebrain 2002 used clustering bayesian analysis associate concepts comical way statistical machine learning algorithm detect whether sentence contained said double entendre developed kiddon brun 2011 open-source python implementation kiddon brun twss system program recognize knock-knock jokes reported taylor mazlack kind research important analysis human-computer interaction application machine learning techniques distinguishing joke texts non-jokes described mihalcea strapparava 2006 takizawa et al 1996 reported heuristic program detecting puns japanese language possible application assistance language acquisition described section pun generation another envisioned use joke generators cases steady supply jokes quantity important quality another obvious yet remote direction automated joke appreciation known humans interact computers ways similar interacting humans may described terms personality politeness flattery in-group favoritism therefore role humor human-computer interaction investigated particular humor generation user interface ease communications computers suggested craig mcdonough implemented mnemonic sentence generator converts passwords humorous sentences basing incongruity theory humor suggested resulting meaningless funny sentences easier remember example password ajqa3jtv converted arafat joined quayle ant tarar jeopardized thurmond vase john allen paulos known interest mathematical foundations humor book mathematics humor study logic humor demonstrates structures common humor formal sciences mathematics linguistics develops mathematical model jokes based catastrophe theory
Computational linguistics
veriato veriato formerly known spectorsoft software company develops sells user behavior analytics employee monitoring software based palm beach gardens located palm beach county florida united states founded 1998 company early entrant internet monitoring software 2008 private equity firms harbourvest partners westview capital partners invested company taking majority ownership position spectorsoft originally serviced consumer business customers longer sells software consumer home use opened west palm beach office london office 2011 2012 spectorsoft acquired assets corner bowl software completely exited consumer market march 31st 2015 moved larger office palm beach gardens 2017 2016 company renamed veriato inc company provider employee monitoring user behavior analytics ransomware detection log management solutions enterprise mid-market small business veriato recon — user behavior analytics solution software detects alerts anomalies related insider threat behaviors also enables review online activity employees high risk exit period veriato 360 — user activity monitoring solution enabling companies retain review report alert employee activity used monitoring higher risk employees incident response provides visibility contextual information veriato investigator — employee investigation solution temporary focused investigations records detailed information employee activity enables exploration playback recorded data veriato log manager — provides event security log management centrally monitors windows unix linux switches routers hubs veriato server manager — adds application resource disk monitoring event log management features found spectorsoft log manager veriato ransomsafe — veriato ransomsafe™ acts vital layer ransomware defense combining just-in-time data protection multiple mechanisms detect shut attacks hold business hostage veriato cerebral — cerebral fully integrated insider threat intelligence platform powered artificial intelligence spector pro given pc magazine editors choice award 2002 review six computer activity monitoring tools 2004 version 5.0 spector pro given editors choice award field four programs 2008 spector 360 sr3 pc magazine editors choice award 2004 spectorsoft listed first time one inc. magazine top 500 fastest-growing private companies america position 224 company achieved position list 2005 number 497 2009 spectorsoft made list inc. 5000 companies number 3340 2010 2011 spectorsoft made inc. magazine 500/5000 list spectorsoft−veriato products mentioned zdnet pc/computing time cnn nbc nightly news new york times wall street journal 2014 spectorsoft sc magazine europe best fraude prevention award best interop 2014 security award spector 360 recon product target audiences spectorsoft−veriato products employers want record activities employees company-owned workstations mobile devices laptops employers may choose monitor employees using spectorsoft−veriato software however still privacy concerns things like personal email spectorsoft addresses privacy issues regularly paper authorized leading privacy attorney available website educators school administrators school districts required protect students online predators cipa ferpa schools use blocking filtering solutions may block sites needed research block new sites yet included filtering solution spector 360 works filters provide additional layer protection also helps keep students on-task providing teachers technology coordinators reports charts show web sites students visit long spent keyword alerts let lab instructors administrators see may violating school acceptable use policy aup spectorsoft−veriato tools especially eblaster used criminal activities several convictions misuse spectorsoft software contains eula specifying installation must machines owned licensee also indicating spectorsoft cooperate law enforcement compelled since spectorsoft−veriato software specifically designed difficult detect remove tools especially eblaster used thieves wish steal credit card information banking information passwords installation software occur without user knowledge permission spectorsoft openly advertise tools record user passwords recorded cases happening parents use spectorsoft−veriato software monitor children internet use spectorsoft marketed spy software people wanting catch spouses cheating however face criminal charges negative publicity spectorsoft longer markets products spouses however nothing stop spouse using products illegally example man michigan installed eblaster partner personal computer charged four felony counts facing five years prison 19,000 fines 2013 texas woman filed criminal complaint estranged husband using eblaster spy facebook e-mail communications patent infringement case helios software llc et al v. spectorsoft corporation concluded september 2014 court granted summary judgment non-infringement ‘ 571 ‘ 237 patents june 2015 five-day trial jury returned verdict direct indirect infringement spectorsoft ‘ 304 patent also found several asserted claims patent invalid anticipated rendered obvious prior art see docket entry 615 civ 12-081-lps
Computer security
cdr coding computer science cdr coding compressed data representation lisp linked lists developed patented mit artificial intelligence laboratory implemented computer hardware number lisp machines derived mit cadr cdr coding fact fairly general idea whenever data object ends reference another data structure b instead place structure b overlapping running end free space required reference add done many times also improve locality reference enhancing performance modern machines transformation especially effective cons-based lists created free half space node perform transformation always possible perform substitution might large enough chunk free space beyond end thus objects end real reference referenced object machine must able tell reading final cell one accomplished inefficiency software use tagged pointers allow pointer final position specifically tagged best done hardware presence mutable objects cdr coding becomes complex reference updated point another object currently object stored field object must relocated along pointers moves typically expensive impossible time cause fragmentation store problem typically avoided using cdr coding immutable data structures unrolled linked lists simpler often higher-performance cdr coding tagged pointers typically less fragmentation short lists cdr coding uses least amount space
Programming language topics