text
stringlengths
6
1.88M
source
stringclasses
13 values
transaction log field databases computer science transaction log also transaction journal database log binary log audit trail history actions executed database management system used guarantee acid properties crashes hardware failures physically log file listing changes database stored stable storage format start database found inconsistent state shut properly database management system reviews database logs uncommitted transactions rolls back changes made transactions additionally transactions already committed whose changes yet materialized database re-applied done ensure atomicity durability transactions term confused human-readable logs database management system usually provides database management systems journal record data altered given process database log record made log records include general log attributes also attributes depending type recorded type attribute
Databases
universal ir evaluation computer science universal ir evaluation information retrieval evaluation aims develop measures database retrieval performance shall comparable across information retrieval tasks ir information retrieval evaluation begins whenever user submits query search term database user able determine relevance document database relevant relevant query complete set documents naturally divided four distinct mutually exclusive subsets relevant documents retrieved relevant documents retrieved relevant documents retrieved relevant documents retrieved four subsets documents denoted letters b c respectively called swets variables named inventor addition swets definitions four relevance metrics also defined precision refers fraction relevant documents retrieved a/ a+b recall refers fraction retrieved documents relevant a/ a+c commonly used well-known relevance metrics found ir evaluation literature two less commonly used metrics include fallout i.e. fraction relevant documents retrieved b/ b+d miss refers fraction relevant documents retrieved c/ c+d given search universal ir evaluation addresses mathematical possibilities relationships among four relevance metrics precision recall fallout miss denoted p r f respectively one aspect problem involves finding mathematical derivation complete set universal ir evaluation points complete set 16 points one quadruple form p r f describes possible universal ir outcomes example many us experience querying database retrieving documents case precision would take undetermined form 0/0 recall fallout would zero miss would value greater zero less one assuming mix relevant relevant documents database none retrieved universal ir evaluation point would thus denoted 0/0 0 0 represents one 16 possible universal ir outcomes mathematics universal ir evaluation fairly new subject since relevance metrics p r f analyzed collectively recently within past decade lot theoretical groundwork already formulated new insights area await discovery detailed mathematical analysis query sciencedirect database universal ir evaluation retrieves several relevant peer-reviewed papers
Databases
basen basen global full stack internet things iot operator headquartered helsinki finland basen established 2001 provide extremely scalable fault-tolerant network service management systems telecom operators large multinational enterprises basen develops markets software service saas suite basen platform public private infrastructures basen platform built redundant computing grid due basen linearly scalable flexible resilient components grid work together function separately automatically take roles grid architecture also allows quick deployment individual components functional immediately installation spimes record manage full lifecycle physical representations physical hardware support software come go object considered spime essential programming managed cloud spime concept originally crafted author bruce sterling neologism futuristic internet things object basen founded 2001 pasi hurri president ceo basen holds following us patents technology us20170139788a1 us 20120158328 us 20120089523 us 20120158327 us 20120154171 us 20120158329 basen developed system telecom networks basen one founders fennogrid association whose purpose sharing information grid peer-to-peer research promotion cooperation projects fields basen also member international e-science consortium enabling grids e-science 2015 tm forum awarded basen partners innovative catalyst digital health 2013 basen awarded two industry awards tm forum one innovative catalyst smart grid empowering digital customer one significant contribution frameworx ehealth – curing complexity
Distributed computing architecture
grid computing grid computing use widely distributed computer resources reach common goal computing grid thought distributed system non-interactive workloads involve large number files grid computing distinguished conventional high-performance computing systems cluster computing grid computers node set perform different task/application grid computers also tend heterogeneous geographically dispersed thus physically coupled cluster computers although single grid dedicated particular application commonly grid used variety purposes grids often constructed general-purpose grid middleware software libraries grid sizes quite large grids form distributed computing whereby super virtual computer composed many networked loosely coupled computers acting together perform large tasks certain applications distributed grid computing seen special type parallel computing relies complete computers onboard cpus storage power supplies network interfaces etc connected computer network private public conventional network interface ethernet contrast traditional notion supercomputer many processors connected local high-speed computer bus grid computing combines computers multiple administrative domains reach common goal solve single task may disappear quickly size grid may vary small—confined network computer workstations within corporation example—to large public collaborations across many companies networks notion confined grid may also known intra-nodes cooperation whereas notion larger wider grid may thus refer inter-nodes cooperation grids form distributed computing whereby “ super virtual computer ” composed many networked loosely coupled computers acting together perform large tasks technology applied computationally intensive scientific mathematical academic problems volunteer computing used commercial enterprises diverse applications drug discovery economic forecasting seismic analysis back office data processing support e-commerce web services coordinating applications grids complex task especially coordinating flow information across distributed computing resources grid workflow systems developed specialized form workflow management system designed specifically compose execute series computational data manipulation steps workflow grid context “ distributed ” “ grid ” computing general special type parallel computing relies complete computers onboard cpus storage power supplies network interfaces etc connected network private public internet conventional network interface producing commodity hardware compared lower efficiency designing constructing small number custom supercomputers primary performance disadvantage various processors local storage areas high-speed connections arrangement thus well-suited applications multiple parallel computations take place independently without need communicate intermediate results processors high-end scalability geographically dispersed grids generally favorable due low need connectivity nodes relative capacity public internet also differences programming mc costly difficult write programs run environment supercomputer may custom operating system require program address concurrency issues problem adequately parallelized “ thin ” layer “ grid ” infrastructure allow conventional standalone programs given different part problem run multiple machines makes possible write debug single conventional machine eliminates complications due multiple instances program running shared memory storage space time one feature distributed grids formed computing resources belonging one multiple individuals organizations known multiple administrative domains facilitate commercial transactions utility computing make easier assemble volunteer computing networks one disadvantage feature computers actually performing calculations might entirely trustworthy designers system must thus introduce measures prevent malfunctions malicious participants producing false misleading erroneous results using system attack vector often involves assigning work randomly different nodes presumably different owners checking least two different nodes report answer given work unit discrepancies would identify malfunctioning malicious nodes however due lack central control hardware way guarantee nodes drop network random times nodes like laptops dial-up internet customers may also available computation network communications unpredictable periods variations accommodated assigning large work units thus reducing need continuous network connectivity reassigning work units given node fails report results expected time another set could termed social compatibility issues early days grid computing related goals grid developers carry innovation beyond original field high-performance computing across disciplinary boundaries new fields like high-energy physics impacts trust availability performance development difficulty influence choice whether deploy onto dedicated cluster idle machines internal developing organization open external network volunteers contractors many cases participating nodes must trust central system abuse access granted interfering operation programs mangling stored information transmitting private data creating new security holes systems employ measures reduce amount trust “ client ” nodes must place central system placing applications virtual machines public systems crossing administrative domains including different departments organization often result need run heterogeneous systems using different operating systems hardware architectures many languages trade-off investment software development number platforms supported thus size resulting network cross-platform languages reduce need make tradeoff though potentially expense high performance given node due run-time interpretation lack optimization particular platform various middleware projects created generic infrastructure allow diverse scientific commercial projects harness particular associated grid purpose setting new grids boinc common one various academic projects seeking public volunteers listed end article fact middleware seen layer hardware software top middleware number technical areas considered may may middleware independent example areas include sla management trust security virtual organization management license management portals data management technical areas may taken care commercial solution though cutting edge area often found within specific research projects examining field segmentation grid computing market two perspectives need considered provider side user side overall grid market comprises several specific markets grid middleware market market grid-enabled applications utility computing market software-as-a-service saas market grid middleware specific software product enables sharing heterogeneous resources virtual organizations installed integrated existing infrastructure involved company companies provides special layer placed among heterogeneous infrastructure specific user applications major grid middlewares globus toolkit glite unicore utility computing referred provision grid computing applications service either open grid utility hosting solution one organization vo major players utility computing market sun microsystems ibm hp grid-enabled applications specific software applications utilize grid infrastructure made possible use grid middleware pointed software service saas “ software owned delivered managed remotely one providers. ” gartner 2007 additionally saas applications based single set common code data definitions consumed one-to-many model saas uses pay go payg model subscription model based usage providers saas necessarily computing resources required run saas therefore saas providers may draw upon utility computing market utility computing market provides computing resources saas providers companies demand user side grid computing market different segments significant implications deployment strategy deployment strategy well type investments made relevant aspects potential grid users play important role grid adoption cpu-scavenging cycle-scavenging shared computing creates “ grid ” idle resources network participants whether worldwide internal organization typically technique exploits 'spare instruction cycles resulting intermittent inactivity typically occurs night lunch breaks even comparably miniscule though numerous moments idle waiting modern desktop cpu experience throughout day computer waiting io user network storage practice participating computers also donate supporting amount disk storage space ram network bandwidth addition raw cpu power many volunteer computing projects boinc use cpu scavenging model since nodes likely go offline time time owners use resources primary purpose model must designed handle contingencies creating opportunistic environment another implementation cpu-scavenging special workload management system harvests idle desktop computers compute-intensive jobs also refers enterprise desktop grid edg instance htcondor open-source high-throughput computing software framework coarse-grained distributed rationalization computationally intensive tasks configured use desktop machines keyboard mouse idle effectively harness wasted cpu power otherwise idle desktop workstations like full-featured batch systems htcondor provides job queueing mechanism scheduling policy priority scheme resource monitoring resource management used manage workload dedicated cluster computers well seamlessly integrate dedicated resources rack-mounted clusters non-dedicated desktop machines cycle scavenging one computing environment term grid computing originated early 1990s metaphor making computer power easy access electric power grid power grid metaphor accessible computing quickly became canonical ian foster carl kesselman published seminal work grid blueprint new computing infrastructure 1999 preceded decades metaphor utility computing 1961 computing public utility analogous phone system cpu scavenging volunteer computing popularized beginning 1997 distributed.net later 1999 seti home harness power networked pcs worldwide order solve cpu-intensive research problems ideas grid including distributed computing object-oriented programming web services brought together ian foster steve tuecke university chicago carl kesselman university southern california information sciences institute trio led effort create globus toolkit widely regarded fathers grid toolkit incorporates computation management also storage management security provisioning data movement monitoring toolkit developing additional services based infrastructure including agreement negotiation notification mechanisms trigger services information aggregation globus toolkit remains de facto standard building grid solutions number tools built answer subset services needed create enterprise global grid 2007 term cloud computing came popularity conceptually similar canonical foster definition grid computing terms computing resources consumed electricity power grid earlier utility computing indeed grid computing often always associated delivery cloud computing systems exemplified applogic system 3tera november 2006 seidel received sidney fernbach award supercomputing conference tampa florida outstanding contributions development software hpc grid computing enable collaborative numerical investigation complex problems physics particular modeling black hole collisions award one highest honors computing awarded achievements numerical relativity also march 2019 bitcoin network measured computing power equivalent 80,000,000 pflops floating-point operations per second measurement reflects number flops required equal hash output bitcoin network rather capacity general floating-point arithmetic operations since elements bitcoin network perform specific cryptographic hash computation required bitcoin protocol grid computing offers way solve grand challenge problems protein folding financial modeling earthquake simulation climate/weather modeling grids offer way using information technology resources optimally inside organization also provide means offering information technology utility commercial noncommercial clients clients paying use electricity water october 2016 4 million machines running open-source berkeley open infrastructure network computing boinc platform members world community grid one projects using boinc seti home using 400,000 computers achieve 0.828 tflops october 2016 october 2016 folding home part boinc achieved 101 x86-equivalent petaflops 110,000 machines european union funded projects framework programmes european commission beingrid business experiments grid research project funded european commission integrated project sixth framework programme fp6 sponsorship program started june 1 2006 project ran 42 months november 2009 project coordinated atos origin according project fact sheet mission “ establish effective routes foster adoption grid computing across eu stimulate research innovative business models using grid technologies ” extract best practice common themes experimental implementations two groups consultants analyzing series pilots one technical one business project significant long duration also budget 24.8 million euros largest fp6 integrated project 15.7 million provided european commission remainder 98 contributing partner companies since end project results beingrid taken carried forward it-tude.com enabling grids e-science project based european union included sites asia united states follow-up project european datagrid edg evolved european grid infrastructure along lhc computing grid lcg developed support experiments using cern large hadron collider list active sites participating within lcg found online real time monitoring egee infrastructure relevant software documentation also publicly accessible speculation dedicated fiber optic links installed cern address lcg data-intensive needs may one day available home users thereby providing internet services speeds 10,000 times faster traditional broadband connection european grid infrastructure also used research activities experiments simulation oncological clinical trials distributed.net project started 1997 nasa advanced supercomputing facility nas ran genetic algorithms using condor cycle scavenger running 350 sun microsystems sgi workstations 2001 united devices operated united devices cancer research project based grid mp product cycle-scavenges volunteer pcs connected internet project ran 3.1 million machines close 2007 today many definitions grid computing
Distributed computing architecture
leuven database ancient books leuven database ancient books ldab resource ancient written literary manuscripts 500 bc ad 800 currently lists 16.000 greek latin coptic syriac demotic literary texts attempts collect basic information ancient literary texts includes authors homer gregory great 3.600 texts unidentified authors founded 1998 ku leuven willy clarysse
Databases
brownout software engineering brownout software engineering technique increase robustness application computing capacity shortage many users simultaneously accessing application hosted online underlying computing infrastructure may become overloaded rendering application unresponsive users likely abandon application switch competing alternatives hence incurring long-term revenue loss better deal situation application given brownout capabilities application disable certain features – e.g. online shop longer display recommendations related products – avoid overload although reducing features generally negative impact short-term revenue application owner long-term revenue loss avoided technique inspired brownouts power grids consists reducing power grid voltage case electricity demand exceeds production consumers incandescent light bulbs dim – hence originating term – draw less power thus helping match demand production similarly brownout application helps match computing capacity requirements available target infrastructure brownout complements elasticity former help application withstand short-term capacity shortage without changing capacity available application contrast elasticity consists adding removing capacity application preferably advance avoid capacity shortage altogether two techniques combined e.g. brownout triggered number users increases unexpectedly elasticity triggered latter usually requiring minutes show effect brownout relatively non-intrusive developer example implemented advice aspect-oriented programming however surrounding components load-balancers need made brownout-aware distinguish cases application running normally cases application maintains low response time triggering brownout
Distributed computing architecture
vyos vyos open source network operating system based debian gnu/linux vyos provides free routing platform competes directly commercially available solutions well known network providers vyos run standard amd64 i586 systems able used router firewall platform cloud deployments brocade communications stopped development vyatta core edition vyatta routing software small group enthusiasts took last community edition worked building open source fork live place end life vc vyos version 1.0.0 hydrogen released december 22 2013 october 9 2014 version 1.1.0 helium released versions released thus far based debian 6.0 squeeze available 32-bit images 64-bit images physical virtual machines january 28 2019 version 1.2.0 crux released version 1.2.0 based debian 8 jessie version 1.0 1.1 named elements new naming scheme based constellations used version 1.2 vyos ova image vmware released february 3 2014 maintenance release allows convenient setup vyos vmware platform includes vmware tools paravirtual drivers ova image downloaded standard download site starting version 1.0.2 amazon ec2 customers select vyos ami image deprecated removed february 2018 starting version 1.1.7 aws customers use new marketplace vyos ami starting version 1.2.0 aws customers deploy new marketplace ami new offering comes support starting version 1.2.0 azure customers use vyos azure
Computer security
amazon redshift amazon redshift internet hosting service data warehouse product forms part larger cloud-computing platform amazon web services built top technology massive parallel processing mpp data warehouse company paraccel later acquired actian handle large scale data sets database migrations redshift differs amazon hosted database offering amazon rds ability handle analytic workloads big data data sets stored column-oriented dbms principle amazon redshift based older version postgresql 8.0.2 redshift made changes version initial preview beta released november 2012 full release made available february 15 2013 service handle connections applications using odbc jdbc connections according cloud data warehouse report published forrester q4 2018 amazon redshift largest cloud data warehouse deployments 6,500 deployments 2018 redshift came second industry wide benchmark test run gigaom behind microsoft azure amazon listed number business intelligence software proprietors partners tested tools apn partner program including actian actuate corporation alteryx dundas data visualization ibm cognos inetsoft infor logi analytics looker company microstrategy pentaho qlik sisense tableau software yellowfin partner companies providing data integration tools include informatica snaplogic system integration consulting partners include accenture deloitte capgemini dxc technology
Databases
comparison programming languages object-oriented programming comparison programming languages compares object-oriented programming languages c++ java smalltalk object pascal perl python others manipulate data structures declare property named bar access members object x
Programming language topics
scott james remnant scott james remnant born 18 july 1980 open source software engineer scott served long-time debian developer 2006 worked ubuntu developer manager ubuntu linux distribution canonical ltd works google technical lead bluetooth systems scott openly gay believes important open support others open source community
Operating systems
devices using qualcomm snapdragon systems-on-chip list devices using qualcomm snapdragon chips snapdragon family mobile system chip soc made qualcomm use smartphones tablets smartbook devices
Computer architecture
sqlyog sqlyog gui tool rdbms mysql developed webyog inc. based bangalore india santa clara california sqlyog used 30,000 customers worldwide downloaded 2,000,000 times sqlyog v0.9 first released public 2001 eight months development sqlyog available free charge closed source code v3.0 made fully commercial software nowadays sqlyog distributed free software well several paid proprietary versions free software version known community edition github paid versions sold professional enterprise ultimate editions prominent features sqlyog sqlyog works windows platform ranging windows vista windows 10 windows 9x/me support removed version 5.0 windows 2000 support stopped version 8.6 windows xp support ended version 12.5 also made work linux various unixes including macos using wine environment subset sqlyog enterprise/ultimate functionalities available free sja sqlyog job agent linux native linux utility makes possible specify test scheduled jobs windows environment port execution parameters seamlessly linux environment webyog provides priority support customers primarily ticket based support system users community edition get support webyog forums 15000 registered users webyog also maintains extensive faq commonly asked questions
Databases
traversed edges per second number traversed edges per second teps performed supercomputer cluster measure communications capabilities computational power machine contrast standard metric floating point operations per second flops give weight communication capabilities machine term first entered usage 2010 advent petascale computing since measured many world largest supercomputers context edge connection two vertices graph traversal ability machine communicate data two points standardized benchmark associated graph500 september 2011 calls executing graph generation search algorithms graphs large 1.1 petabyte ability application utilize supercomputer cluster effectively depends raw speed processor also communication network importance communication capability varies application application clear linpack benchmarks traditionally used rating flops supercomputers require communications capability many scientific applications therefore alternative metrics characterize performance machine holistic manner may relevant many scientific applications may desirable making purchasing decisions
Distributed computing architecture
livetiles livetiles software company founded 2014 offers cloud based intelligent workplace software commercial government education markets 2018 raised 50 million total funding including seed funding company headquartered new york city offices globally including locations seattle tri-cities washington state san francisco los angeles chicago minneapolis north carolina london sligo zurich netherlands sydney melbourne geelong hobart livetiles founded australia 2014 2015 became listed australian securities exchange reverse acquisition coal company modun resources limited initial ipo 57 million ceo company karl redenbach cofounded livetiles peter nguyen-brown 2017 company raised 12 million equity financing share purchase plan may 2018 livetiles acquired us based microsoft ai firm hyperfish 8.9 million february 2019 livetiles acquired danish digital workplace software company wizdom maximum total purchase price eur 30 million approximately 47.6 million company develops sells cloud-based intelligent workplace software office 365 azure sharepoint includes various solutions including livetiles mosaic developed k-12 educational institutions 1.2 million users livetiles commercial also provide livetiles mx mobile app digital workplace design tools called livetiles cloud livetiles sharepoint artificial intelligence platform livetiles intelligence livetiles sap software 2017 livetiles partnered microsoft launch joint venture ai australia australian-based artificial intelligence development firm
Distributed computing architecture
least frequently used least frequently used lfu type cache algorithm used manage memory within computer standard characteristics method involve system keeping track number times block referenced memory cache full requires room system purge item lowest reference frequency lfu sometimes combined least recently used algorithm called lrfu simplest method employ lfu algorithm assign counter every block loaded cache time reference made block counter increased one cache reaches capacity new block waiting inserted system search block lowest counter remove cache lfu method may seem like intuitive approach memory management without faults consider item memory referenced repeatedly short period time accessed extended period time due rapidly accessed counter increased drastically even though used decent amount time leaves blocks may actually used frequently susceptible purging simply accessed different method moreover new items entered cache subject removed soon start low counter even though might used frequently due major issues like explicit lfu system fairly uncommon instead hybrids utilize lfu concepts
Operating systems
winbatch winbatch microsoft windows scripting language originally developed wilson windowware currently supported maintained enhanced island lake consulting llc environment includes interpreter code editor along dialog designer optional compiler create self-contained executables language structure syntax cross dos batch command basic fortran c. developed years functions added support things like .net activex controls com ole unicode uac code signing wilson windowware founded 1989 product command post 1991 menuing language command post became winbatch shortly corporate version released included code binder program combines bytecode version program along interpreter july 2017 wilson windowware ceased operation winbatch acquired newly formed island lake consulting llc documentation available german spanish japanese languages winbatch hello world program extenders add additional commands winbatch programming language popular extenders included default winbatch installer additional extenders available download
Programming language topics
symbolic link computing symbolic link also symlink soft link term file contains reference another file directory form absolute relative path affects pathname resolution symbolic links already present 1978 minicomputer operating systems dec data general rdos today supported posix operating system standard unix-like operating systems freebsd linux macos limited support also exists windows operating systems windows vista windows 7 degree windows 2000 windows xp form shortcut files symbolic link contains text string automatically interpreted followed operating system path another file directory file directory called target symbolic link second file exists independently target symbolic link deleted target remains unaffected symbolic link points target sometime later target moved renamed deleted symbolic link automatically updated deleted continues exist still points old target non-existing location file symbolic links pointing moved non-existing targets sometimes called broken orphaned dead dangling symbolic links different hard links hard links link paths different volumes file systems whereas symbolic links may point file directory irrespective volumes link target reside hard links always refer existing file whereas symbolic links may contain arbitrary path point anything symbolic links operate transparently many operations programs read write files named symbolic link behave operating directly target file however effect changing otherwise hierarchical filesystem tree directed graph consequences simple operations determining current directory process even unix standard navigating directory parent directory longer works reliably face symlinks shells heuristically try uphold illusion tree-shaped hierarchy causes produce different results programs manipulate pathnames without heuristic relying operating system instead programs need handle symbolic links specially e.g. shells backup utilities thus need identify manipulate directly unix well linux distributions use symbolic links extensively effort reorder file system hierarchy accomplished several mechanisms variant context-dependent symbolic links offers opportunity create intuitive application-specific directory tree reorganize system without redesign core set system functions utilities posix-compliant operating systems symbolic links created codice_1 system call codice_2 shell command normally uses codice_3 system call creates hard link codice_4 flag specified symlink system call used instead creating symbolic link symlinks introduced 4.2bsd unix u.c berkeley following command creates symbolic link command-line interface shell target_path relative absolute path symbolic link point usually target exist although symbolic links may created non-existent targets link_path path symbolic link creating symbolic link may generally treated alias target file system management commands e.g. codice_5 codice_6 may used symbolic link commands read write file contents access contents target file codice_6 delete file command however removes link target file likewise codice_8 command moves renames link target posix directory listing application codice_9 denotes symbolic links arrow name pointing name target file see following example long directory list requested codice_10 option directory listing symbolic link points directory requested link displayed order obtain listing linked directory path must include trailing directory separator character '/ slash note example create three directory creation link /tmp directory early implementations symbolic links stored symbolic link information data regular files file contained textual reference link ’ target indicator denoting symbolic link method slow inefficient use disk-space small systems improvement called fast symlinks allowed storage target path within data structures used storing file information disk inodes space normally stores list disk block addresses allocated file thus symlinks short target paths accessed quickly systems fast symlinks often fall back using original method target path exceeds available inode space original style retroactively termed slow symlink also used disk compatibility older versions operating systems although storing link value inside inode saves disk block disk read operating system still needs parse path name link always requires reading additional inodes generally requires reading potentially many directories processing list files inodes finds match link path components link points file directory fast symlinks provide significantly better performance symlinks vast majority posix-compliant implementations use fast symlinks however posix standard require entire set file status information common regular files implemented symlinks allows implementations use solutions storing symlink data directory entries file system permissions symbolic link used access modes target file controlled target file permissions operating systems freebsd offer ability modify file permissions filesystem attributes symbolic link codice_11 codice_12 system calls respectively reported size symlink number characters path points mac os applications users also employ aliases added feature following target even moved another location volume confused shell command alias ntfs 3.1 introduced support symbolic links type file included windows xp enabled default kernel mode programs windows vista later versions windows enabled support symbolic links user mode applications well supplied command line utility codice_13 creating third-party drivers required enable support ntfs symbolic links windows xp unlike junction points symbolic link also point file remote server message block smb network path additionally ntfs symbolic link implementation provides full support cross-filesystem links however functionality enabling cross-host symbolic links requires remote system also support symbolic links designed aid migration application compatibility posix operating systems microsoft aimed windows vista symbolic links function like unix links however implementation varies unix symbolic links several ways example windows vista users must manually indicate creating symbolic link whether file directory windows 7 vista support maximum 31 reparse points therefore symbolic links given path i.e given path 31 indirections windows gives users new create symbolic link privilege administrators default create symbolic links desired behavior must changed local security policy management console additionally ntfs symbolic links files distinct ntfs symbolic links directories therefore used interchangeably unlike posix symbolic link refer either files directories windows vista later working directory path ends symbolic link current parent path reference refer parent directory symbolic link rather target behaviour also found shell level least posix systems including linux never accessing files directories operating system calls instance bash builtin commands operate current logical directory often used scripts determine actual current working directory path used system call use use actual filesystem parent directory containing pseudo-directory entry may return completely different results example example 2 windows 2000 version ntfs introduced reparse points enabled among things use volume mount points junction points junction points directories moreover local directories junction points remote shares unsupported windows 2000 xp resource kits include program called linkd create junction points powerful one named junction distributed sysinternals mark russinovich standard applications support reparse points noticeably backup suffers problem issue error message 0x80070003 folders backed contain reparse point shortcuts supported graphical file browsers operating systems may resemble symbolic links differ number important ways one difference type software able follow another difference capabilities mechanism almost like shortcuts transparent windows shell implemented ordinary folders need read and/or system attribute containing shortcut named target.lnk refers target hidden desktop.ini least following contents folder shortcuts created used windows shell network neighborhood example shell objects shell folders defined windows registry used implement sort symbolic link like folder shortcuts transparent windows shell minimal implementation clsid 00000000-0000-0000-0000-000000000000 used placeholder documents folder desktop well fonts administrative tools folders control panel examples shell objects redirected file-system folders cygwin simulates posix-compliant symbolic links microsoft windows file system uses identical programming user utility interfaces unix see creates windows shortcuts .lnk files additional information used cygwin time symlink resolution cygwin symlinks compliant windows posix standard additionally cygwin set support native windows symbolic links used cygwin without restrictions requires differences exist however cygwin way specify shortcut-related information – working directory icon – place parameters codice_14 command create standard microsoft .lnk files cygwin provides codice_15 codice_16 utilities cygwin user guide information topic command creating symbolic links codice_17 also used hard links internally dos.library returns error code indicating target soft link try perform actions legal file applications wish follow symbolic link needs explicitly make call follow link retry operation amigados shell follow links automatically os/2 operating system symbolic links somewhat resemble shadows graphical workplace shell however shadows due fully object-oriented system object model considerably powerful robust simple link example shadows lose capabilities renamed either object subject link relocated symbolic links may implemented context-dependent variable fashion link points varying targets depending configuration parameter run-time parameter instantaneous condition variable variant symbolic link symbolic link variable name embedded allows flexibility filesystem order possible standard symbolic link variables embedded symbolic link may include user environment specific information operating systems make use variant symbolic links include netbsd dragonfly bsd domain/os tru64 uses context dependent symbolic link context cluster member number pyramid technology osx operating system implemented conditional symbolic links pointed different locations depending universe program running universes supported sysv.3 berkeley software distribution bsd 4.3 example ps command run att universe symbolic link directory /bin would point /.attbin program /.attbin/ps would executed whereas ps command run ucb universe /bin would point /.ucbbin /.ucbbin/ps would executed similar conditional symbolic links also created directories /lib /usr/lib /usr/include
Computer file systems
openntpd openntpd also known openbsd ntp daemon unix daemon implementing network time protocol synchronize local clock computer system remote ntp servers also able act ntp server ntp-compatible clients openntpd primarily developed henning brauer part openbsd project design goals include secure non-exploitable easy configure accurate enough purposes portable version like openssh developed child project adds portability code openbsd version releases separately portable version developed brent cook project developers receive funding openbsd foundation development openntpd motivated combination issues current ntp daemons difficult configuration complicated difficult audit code unsuitable licensing openntpd designed solve problems make time synchronization accessible wider userbase period development openntpd first appeared openbsd 3.6 first release announced 2 november 2004 openntpd attempt openbsd team produce ntp daemon implementation secure simple audit trivial set administer reasonably accurate light system resources design goals openntpd security ease use performance security openntpd achieved robust validity check network input path use bounded buffer operations via strlcpy privilege separation mitigate effects possible security bugs exploiting daemon privilege escalation order simplify use ntp openntpd implements smaller set functionalities available ntp daemons provided network time protocol project objective provide enough features satisfy typical usage risk unsuitability esoteric niche requirements openntpd configured configuration file ntpd.conf minimal number options offered ip address hostname openntpd listen timedelta sensor device used set servers time synchronized accuracy openntpd best-effort daemon attempts accurate possible specific accuracy guaranteed openntpd gradually adjusts system clock seen output openntpd running linux system openntpd criticized less accurate ntp daemon produced internet software consortium isc internally openntpd maintain millisecond accuracy vary 50-200ms real time omits variety algorithms increase accuracy favour code simplicity openntpd project acknowledged criticism stated lack microsecond precision design tradeoff benefited simplicity security openntpd design goals state project intent r reasonable accuracy without sacrificing secure design getting last nanosecond obscure edge case september 2004 shortly release openntpd 3.6 isc ntp contributor brad knowles published article entitled openntpd considered harmful criticizing various aspects openntpd implementation ntp protocol well split development model project employs also used development openssh openbgpd december 2004 darren tucker principal developer portable branch openntpd wrote detailed response knowles acknowledging issues valid rejecting several others unwarranted considering yet others misleading among serious issues raised knowles openntpd servers claimed stratum 1 servers issue however already fixed time tucker response march 2005 knowles acknowledged tucker response stated going everything could work tucker get remaining issues resolved additionally openbsd networking faq expanded response knowles initial criticism openntpd openbsd kernel ignore leap seconds care taken using openntpd higher-stratum source ntpd servers high-resolution time requirements reference coordinated universal time leap seconds used coordinated universal time international atomic time global positioning system time signals united states naval observatory bureau international des poids et mesures recommends systems implementing leap seconds referenced international atomic time directly gps time signals
Operating systems
caro caro computer antivirus research organization organization established 1990 research study malware organization perhaps best known virus naming convention 1991 subsequent revisions though widely adopted still faced usage obstacles led proposal new naming systems product vendors industry groups annual workshop biggest caro event workshop usually organized hosted one anti-virus firm home country workshops started 2007 attendance limited 120-130 top anti-malware experts strict policy photography recordings kind br caro collaboration eicar european institute computer antivirus research developed eicar test file executable string designed test integrity antivirus software caro membership private issue members choosing publicize membership members caro founders current publicly stated membership point include friðrik skúlason founder frisk software international dr. alan solomon founder dr solomon antivirus toolkit vesselin bontchev mikko hyppönen cro f-secure eugene kaspersky founder kaspersky lab nick fitzgerald peter ferrie dmitry gryaznov igor muttik atley padgett peterson costin raiu peter kruse morton swimmer righard zwienenberg philipp wolf
Computer security
session border controller session border controller sbc network element deployed protect sip based voice internet protocol voip networks early deployments sbcs focused borders two service provider networks peering environment role expanded include significant deployments service provider access network backbone network provide service residential and/or enterprise customers term session refers communication two parties – context telephony would call call consists one call signaling message exchanges control call one call media streams carry call audio video data along information call statistics quality together streams make session job session border controller exert influence data flows sessions term border refers point demarcation one part network another simple example edge corporate network firewall demarcates local network inside corporation rest internet outside corporation complex example large corporation different departments security needs location perhaps kind data case filtering routers network elements used control flow data streams job session border controller assist policy administrators managing flow session data across borders term controller refers influence session border controllers data streams comprise sessions traverse borders one part network another additionally session border controllers often provide measurement access control data conversion facilities calls control sbcs commonly maintain full session state offer following functions advent webrtc sbcs also assumed role sip webrtc gateway translate sip one signalling protocol mandated webrtc specifications sip websockets rfc 7118 often used partially due applicability sip envisaged communication scenarios well availability open source software jssip case sbc acts gateway webrtc applications sip end points sbcs inserted signaling and/or media paths calling called parties voip call predominantly using session initiation protocol sip h.323 mgcp call-signaling protocols many cases sbc hides network topology protects service provider enterprise packet networks sbc terminates inbound call initiates second call leg destination party technical terms used sip protocol defines back-to-back user agent b2bua effect behavior signaling traffic also media traffic voice video controlled sbc cases sbc capability provide media services sbcs also able redirect media traffic different element elsewhere network recording generation music-on-hold media-related purposes conversely without sbc media traffic travels directly endpoints without in-network call signaling elements control path cases sbc simply modifies stream call control signaling data involved call perhaps limiting kinds calls conducted changing codec choices ultimately sbcs allow network operators manage calls made networks fix change protocols protocol syntax achieve interoperability also overcome problems firewalls network address translators nats present voip calls show operation sbc one compare simple call establishment sequence call establishment sequence sbc simplest session establishment sequence one proxy user agents proxy ’ task identify callee ’ location forward request proxy also adds via header address indicate path response traverse proxy change dialog identification information present message tag header call-id cseq proxies also alter information sip message bodies note session initiation phase user agents exchange sip messages sdp bodies include addresses agents expect media traffic successfully finishing session initiation phase user agents exchange media traffic directly without involvement proxy sbcs designed many applications used operators enterprises achieve variety goals even sbc implementation might act differently depending configuration use case hence easily possible describe exact sbc behavior would apply sbc implementations general possible identify certain features common sbcs example sbcs implemented back-to-back user agent b2bua proxy-like server splits sip transaction two call legs side facing user agent client uac acts server side facing user agent server uas acts client proxy usually keeps state information related active transactions b2buas keep state information active dialogs e.g. calls proxy receives sip request save state information transaction e.g. receiving response state information soon deleted b2bua maintain state information active calls delete information call terminated sbc included call path sbc acts b2bua behaves user agent server towards caller user agent client towards callee sense sbc actually terminates call generated caller starts new call towards callee invite message sent sbc contains longer clear reference caller invite sent sbc proxy includes via contact headers point sbc caller sbcs often also manipulate dialog identification information listed call-id tag case sbc configured also control media traffic sbc also changes media addressing information included c lines sdp body thereby sip messages traverse sbc also audio video packets invite sent sbc establishes new dialog sbc also manipulates message sequence number cseq well max-forwards value note list header manipulations listed subset possible changes sbc might introduce sip message furthermore sbcs might listed manipulations sbc expected control media traffic might need change anything sdp header sbcs change dialog identification information others might even change addressing information sbcs often used corporations along firewalls intrusion prevention systems ips enable voip calls protected enterprise network voip service providers use sbcs allow use voip protocols private networks internet connections using nat also implement strong security measures necessary maintain high quality service sbcs also replace function application-level gateways larger enterprises sbcs also used conjunction sip trunks provide call control make routing/policy decisions calls routed lan/wan often tremendous cost savings associated routing traffic internal ip networks enterprise rather routing calls traditional circuit-switched phone network additionally sbcs allow voip calls set two phones using different voip signaling protocols e.g. sip h.323 megaco/mgcp well performing transcoding media stream different codecs use sbcs also provide firewall features voip traffic denial service protection call filtering bandwidth management protocol normalization header manipulation also commonly provided sbcs enabling communication different vendors networks ip multimedia subsystem ims 3gpp 3rd generation partnership project architecture perspective sbc integration p-cscf ims-alg signaling plane ims access gateway media plane access side interconnect side sbc maps ibcf iwf signaling plane trgw transition gateway media plane ims/tispan architecture perspective sbc integration p-cscf c-bgf functions access side ibcf iwf thig i-bgf functions peering side sbcs decomposed meaning signaling functions located separate hardware platform media relay functions – words p-cscf separated c-bgf ibcf/iwf separated i-bgf functions physically standards-based protocol h.248 ia profile used signaling platform control media one sbcs use proprietary protocols infancy concept sbc controversial proponents end-to-end systems peer-to-peer networking controversy surrounding sbcs pertains whether call control remain solely two endpoints call service owners rather shared network elements owned organizations managing various networks involved connecting two call endpoints example call control remain alice bob two callers call control shared operators ip networks involved connecting alice bob voip phones together debate point vigorous almost religious nature wanted unfettered control endpoints also greatly frustrated various realities modern networks firewalls filtering/throttling side network operators typically concerned overall network performance interoperability quality want ensure secure sbc may provide session media usually rtp signaling often sip wiretap services used providers enforce requests lawful interception network sessions standards interception services provided atis tia cablelabs etsi among others according jonathan rosenberg author rfc 3261 sip numerous related rfcs dynamicsoft developed first working sbc conjunction aravox product never truly gained marketshare newport networks first ipo london stock exchange aim may 2004 nng cisco publicly traded since 1990 acme packet followed october 2006 floating nasdaq field narrowed acquisition nextone merged reefpoint becoming nextpoint subsequently acquired 2008 genband time emerged “ integrated ” sbc border control function integrated another edge device 2009 ingate systems ’ firewall became first sbc earn certification icsa labs milestone certifying voip security capabilities sbc continuing growth voip networks pushes sbcs edge mandating adaptation capacity complexity voip network grows traffic volume increases sessions passing sbc vendors addressing new scale requirements variety ways developed separate load balancing systems sit front sbc clusters others developed new architectures using latest generation chipsets offering higher performance sbcs scalability using service cards
Computer security
nature research nature research formerly known nature publishing group division international scientific publishing company springer nature publishes academic journals magazines online databases services science medicine nature research flagship publication nature weekly multidisciplinary journal first published 1869 also publishes nature- titled research journals nature reviews journals since 2000 society-owned academic journals range open access journals including scientific reports nature communications springer nature also publishes scientific american 16 languages magazine intended general public 2013 prior merger springer creation springer nature nature publishing group owner holtzbrinck publishing group bought controlling stake frontiers springer nature formed 2015 nature research nature publishing group part macmillan science education fully owned subsidiary holtzbrinck publishing group nature research employs 800 people offices london new york city san francisco seoul washington d.c. boston tokyo paris berlin munich madrid hong kong shanghai delhi melbourne mexico city buenos aires são paulo basingstoke september 2016 nature research publishes 148 academic journals former nature clinical practice series rebranded folded nature reviews series april 2009 also publish npj nature partner journals series cases costs springer nature publications recovered via subscription individuals institutions 40 journals allow authors publish open access articles author institution research funder paying publication charge journal publisher also several open access journals authors also allowed post accepted unedited papers websites funding body archives earlier 6 months publication june 2010 letter outlining university california libraries pricing challenges npg distributed university faculty campus librarians support systemwide university committee library scholarly communication letter also described potential boycott dispute resolved august 2010 joint statement released stating two organizations agreed work together coming months address mutual short- long-term challenges including exploration potential new approaches evolving publishing models 2 december 2014 npg announced would make content nature journals available online free however articles presented using digital rights management system readcube funded macmillan subsidiary digital science provides read-only access allow readers download copy print otherwise distribute content additionally links articles generated nature subscribers group selected media outlets—but links publicly distributed online articles social networks afterwards providers also provide annotations linked articles move designed counter trend dark sharing leveraging readcube provide analytics considering compromise fully restricted access critics consider true open access scheme due restrictions use distribution 2011 nature launched first line electronic textbooks college market starting principles biology adopted california state university textbook line described vikram savkar senior vice president publishing director nature publishing group potentially breaking traditional textbook publishing model active nature research services include past experiments offering online services include
Databases
playstation broadband navigator playstation broadband navigator also referred bb navigator psbbn software japanese playstation 2 consoles formats hard disk drive use consoles provides interface manipulating data hard disk drive works official playstation 2 hdd units apparently playstation broadband navigator strict region lock normal playstation 2 software software boot ntsc-j systems model number ending 0 meaning sold japan making software unusable korean asian ntsc-j playstation 2 consoles playstation broadband navigator offers many features available original hdd utility disc software japanese releases take advantage features may even require specific version higher software sony computer entertainment america released hdd march 23 2004 hdd utility disc 1.01 bundled final fantasy xi consumers knew playstation broadband navigator confused n't included hdd utility disc scea response always playstation broadband navigator would released north america later date date appears never light scea switched manufacturing slim hdd-incompatible playstation 2 models stopping manufacture hdd units region sony computer entertainment europe sony computer entertainment australia never released hdd outside linux kit switching manufacturing slim playstation 2 model appears neither hdd utility disc playstation broadband navigator released regions broadband navigator used ps2 using modified var games require playstation broadband navigator either certain features work game work
Computer architecture
read system call modern posix compliant operating systems program needs access data file stored file system uses read system call file identified file descriptor normally obtained previous call open system call reads data bytes number specified caller file stores buffer supplied calling process read system call takes three arguments read system call interface standardized posix specification data file read calling read function value returned number bytes read zero indicates end file file position advanced number error number smaller number bytes requested may happen example fewer bytes actually available right maybe close end-of-file reading pipe terminal system call interrupted signal alternatively -1 returned error occurs case errno set appropriately left unspecified whether file position changes
Computer architecture
mac os nanokernel mac os nanokernel extremely simple operating system kernel serving basis powerpc based system software versions 7 9 classic mac os predating mac os x initial revision software extremely simple single tasking system delegates tasks emulator running motorola 68000 series 68k version operating system second major revision supports multitasking multiprocessing message passing would properly called microkernel unlike 68k-derived mac os kernel running within powerpc kernel exists protected memory space executes device drivers user mode nanokernel different copland os microkernel although created succession similar goals original nanokernel tightly integrated mac 68k emulator written emulation consultant gary davidian main purpose allow existing motorola 68k version operating system run new hardware normal state system running 68k code operating system little activated interrupt quickly mapped 68k equivalent within virtual machine tasks may include switching back powerpc mode necessary upon completion interrupt handler mapping macintosh virtual memory system powerpc hardware however software little documented might instead handled emulator running user mode nanokernel stored mac os rom chip integrated old world rom computers inside mac os rom file disk new world rom computers rather installed familiar sense progress 1994 demanded additional functionality forward-looking architecture introduced pci card drivers anticipation copland microkernel called nukernel supports memory protection open transport networking architecture introduced standardized powerpc synchronization primitives daystar digital genesis mp macintosh clone requires kernel extensions support multiprocessing evolution would later affect overhaul nanokernel mac os 8.6 mac os 8.6 nanokernel rewritten rené a. vega add multiprocessing services 2.0 support powermacinfo distributed multiprocessing sdk application displays statistics nanokernel operation
Computer architecture
patrick cousot patrick cousot born 3 december 1948 french computer scientist currently silver professor computer science courant institute mathematical sciences new york university usa professor école normale supérieure ens paris france école polytechnique palaiseau france university metz france research scientist french national center scientific research cnrs joseph fourier university grenoble france together wife radhia cousot 1947–2014 patrick cousot originator abstract interpretation influential technique formal methods 2000s worked practical methods static analysis critical embedded software astrée found avionics 1999 received cnrs silver medal 2006 great prize eads foundation 2001 bestowed honorary doctorate saarland university germany radhia cousot received acm sigplan programming languages achievement award 2013 ieee computer society harlan d. mills award 2014 “ invention ‘ abstract interpretation ’ development tool support practical application ” received humboldt research award 2008 2018 ieee john von neumann medal introducing abstract interpretation powerful framework automatically calculating program properties broad application verification optimisation knight chevalier ordre national du mérite ordre des palmes académiques member academia europaea informatics section since 2006 member board trustees imdea software institute
Programming language topics
b.a.t.m.a.n better approach mobile adhoc networking b.a.t.m.a.n routing protocol multi-hop mobile ad hoc networks development german freifunk community intended replace optimized link state routing protocol olsr b.a.t.m.a.n crucial point decentralization knowledge best route network — single node data technique eliminates need spread information concerning network changes every node network individual node saves information direction received data sends data accordingly data gets passed node node packets get individual dynamically created routes network collective intelligence created early 2007 b.a.t.m.a.n developers started experimenting idea routing layer 2 ethernet layer instead layer 3 differentiate layer 3 routing daemon suffix adv advanced chosen instead manipulating routing tables based information exchanged via udp/ip provides virtual network interface transparently transports ethernet packets batman-adv kernel module part official linux kernel since 2.6.38 b.a.t.m.a.n elements classical routing protocols detects b.a.t.m.a.n nodes finds best way route also keeps track new nodes informs neighbors existence static networks network administrators technicians decide computer reached via way cable radio networks undergo constant changes low participation-thresholds vital part freifunk -networks foundation task automated much possible regular basis every node sends broadcast thereby informing neighbors existence neighbors relay message neighbors carries information every node network order find best way certain node b.a.t.m.a.n counts originator-messages received logs neighbor message came like distance-vector protocols b.a.t.m.a.n try determine entire route using originator-messages packet first step right direction data handed next neighbor direction turn uses mechanism process repeated data reaches destination addition radio networks b.a.t.m.a.n also used common wired cable connections ethernet task create protocol easy small fast possible seemed therefore sensible split development several phases implement complex functions using iterative process first phase routing algorithm implemented tested practicality suitability task hand sending receiving originator-messages information existence udp port 1966 chosen version one algorithm made significant assumption soon node receives existence data another node assumes also send data back radio networks however may well one-way communication possible i.e. asymmetric links mechanism incorporated protocol allow solve arising problems mechanism enables node determine whether neighbouring node provides bidirectional communication bidirectional nodes considered part network one-way nodes longer fully included greatest innovation version b.a.t.m.a.n support multiple network devices computer router running b.a.t.m.a.n deployed central location like church another high building several wired wireless network interfaces attached deployed b.a.t.m.a.n relay network data one direction without retransmission delay certain unusual phenomena special circumstances could appear determination best route network tackled counteracted prevent circular routing prevent data reaching destination occurring node inform network provides access internet nodes use information evaluate whether connection internet close much bandwidth available either use specific gateway allow b.a.t.m.a.n determine gateway use based criteria connection speed announcing devices running b.a.t.m.a.n also included version usually method used connect home networks mesh-networks antenna installation roof connect wireless network b.a.t.m.a.n rest building simply announced thus also reachable version b.a.t.m.a.n shown exhibit high levels stability slightly slow convergence times real-world conditions confirmed theoretical analysis batman-experimental bmx aims approximate real exponent also sending ogms multiple times independent broadcast datagrams originated independent branch batman developed axel neumann extended version incorporates securely-entrusted multi-topology routing semtor called bmx7 2017 b.a.t.m.a.n written whiteboard hbo series silicon valley season 4 episode 2 show lead character richard hendricks appears include b.a.t.m.a.n component new internet concept text visible top-right whiteboard
Distributed computing architecture
lace card lace card punched card holes punched also called whoopee card ventilator card flyswatter card ibm doily mainly used practical jokes cause unwanted disruption card readers card readers tended jam lace card inserted resulting card little structural strength avoid buckling inside mechanism card punches could also jam trying produce cards holes punched owing power-supply problems lace card fed reader card knife card saw flat tool used punched card readers card punches needed clear jam
Computer security
appendix h appendix h name infamous appendix pentium processor family developer manual volume 3 appendix contained reference documentation available legally binding nda ndaed documentation described various new features introduced pentium processor notably virtual mode extensions vme 4 mb paging vme confused later intel vt virtualization technology vme added additional feature existing virtual 8086 mode introduced 80386 processor included optimized handling delivery interrupts virtual machines appendix referenced official chapters documentation provoking irritation among public allowed access detailed descriptions started movement observers trying reverse-engineer information various ways notably robert collins writing dr. dobb journal christian ludloff owner sandpile.org website played major role
Computer architecture
wazuh wazuh free open-source host-based intrusion detection system hids performs log analysis integrity checking windows registry monitoring rootkit detection time-based alerting active response provides intrusion detection operating systems including linux openbsd freebsd os x solaris windows wazuh centralized cross-platform architecture allowing multiple systems monitored managed wazuh fork ossec
Computer security
hdos hdos early microcomputer operating system originally written heathkit h8 computer system later also available heathkit h89 zenith z-89 computers author heath company employee gordon letwin later early employee microsoft lead architect os/2 hdos originally came limited set system software tools including assembler many commercial large set freeware programs hug heath user group became available eventually hdos 2.0 notable one first microcomputer operating systems use loadable device drivers achieve degree device independence extensibility device names followed rsx-11-style convention dkn first two letters device driver file name n number dk0 dk1 would handled dk.sys similarities rsx included use pip file transfer use eot file termination similar heath/zenith published complete schematics part lists computers company sold users source code hdos full source paper listing held yesterpc.org old computer museum item references heathkit part number hos-1-sl part number 595-2466
Operating systems
data retrieval data retrieval means obtaining data database management system odbms case considered data represented structured way ambiguity data order retrieve desired data user present set criteria query database management system dbms software managing databases selects demanded data database retrieved data may stored file printed viewed screen query language structured query language sql used prepare queries sql american national standards institute ansi standardized query language developed specifically write database queries dbms may language relational reports queries two primary forms retrieved data database overlaps queries generally select relatively small portion database reports show larger amounts data queries also present data standard format usually display monitor whereas reports allow formatting output however like normally printed reports designed using report generator built dbms
Databases
architectuul architectuul online architecture catalog uses crowdsourcing build content founded 2010 team architects graphic designers software engineers content images uploaded site use creative commons license making process similar wikipedia architectuul buildings various era large range 20th century rare constructivist architecture architectuul utilised source several publications universities including wall street journal
Databases
single user mode single user mode mode multiuser computer operating system boots single superuser mainly used maintenance multi-user environments network servers tasks may require exclusive access shared resources example running codice_1 network share mode also used security purposes network services run eliminating possibility outside interference systems lost superuser password changed switching single user mode asking password circumstances viewed security vulnerability unix-like operating systems provide single user mode functionality either system v-style runlevels bsd-style boot-loader options boot-time options run-level usually changed using codice_2 command runlevel 1 boot single user mode boot-loader options changed startup execution kernel freebsd dragonfly bsd changed rebooting system command codice_3 bootloader offers option bootup start single user mode solaris command codice_4 cause reboot single user mode macos users accomplish holding powering system user may required enter password set firmware os x el capitan later releases macos mode reversed single user mode command codice_5 terminal system fully rebooted single-user mode command codice_6 single user mode different safe mode boot system goes directly console instead starting core elements macos items codice_7 ignoring codice_8 codice_9 et al. users encouraged prompt run fsck command line utilities needed installed microsoft windows provides recovery console last known good configuration safe mode recently windows recovery environment standard recovery means also bootable bartpe-based third-party recovery discs available recovery console recovery discs different single user modes operating systems independent maintained operating system works like chrooting environment kernel linux
Operating systems
cyber-collection cyber-collection refers use cyber-warfare techniques order conduct espionage cyber-collection activities typically rely insertion malware targeted network computer order scan collect exfiltrate sensitive information cyber-collection started far back 1996 widespread deployment internet connectivity government corporate systems gained momentum since time numerous cases activity addition state sponsored examples cyber-collection also used organized crime identity e-banking theft corporate spies operation high roller used cyber-collection agents order collect pc smart-phone information used electronically raid bank accounts rocra aka red october collection system espionage hire operation organized criminals sell collected information highest bidder cyber-collection tools developed governments private interests nearly every computer smart-phone operating system tools known exist microsoft apple linux computers iphone android blackberry windows phones major manufacturers commercial off-the-shelf cots cyber collection technology include gamma group uk hacking team italy bespoke cyber-collection tool companies many offering cots packages zero-day exploits include endgame inc. netragard united states vupen france state intelligence agencies often teams develop cyber-collection tools stuxnet require constant source zero-day exploits order insert tools newly targeted systems specific technical details attack methods often sells six figure sums common functionality cyber-collection systems include several common ways infect access target cyber-collection agents usually installed payload delivery software constructed using zero-day attacks delivered via infected usb drives e-mail attachments malicious web sites state sponsored cyber-collections efforts used official operating system certificates place relying security vulnerabilities flame operation microsoft states microsoft certificate used impersonate windows update forged however experts believe may acquired humint efforts
Computer security
ebean ebean object-relational mapping product written java designed simpler use understand jpa java persistence api jdo java data objects products ebean simpler api jpa achieves 'session less architecture ebean require jpa entitymanager jdo persistencemanager removes concepts detached/attached beans issues associated flushing/clearing 'session management entitymanagers adds make ebean api much easier learn understand use although ebean full orm features equivalent jpa also incorporated 'sql/relational features idea many development efforts require control exact sql calling stored procedures simply solved 'relational approaches ultimate goal ebean combine best orm features jpa best 'relational features products like mybatis single persistence framework ebean uses mapping jpa entity table onetomany etc annotations xml mapping entity beans compatible ebean jpa going beyond jpa ebean supports java generics fetching partial objects query object
Databases
fedora project fedora project project sponsored red hat primarily co-ordinate development linux-based fedora operating system operating vision project creates world free culture welcoming widespread collaboration commonplace people control content devices project also oversees extra packages enterprise linux special interest group maintains eponymous packages project founded 2003 result merger red hat linux rhl fedora linux projects red hat employees make 35 project contributors 2,000 contributors unaffiliated members community fedora project founded red hat decided split red hat linux red hat enterprise linux rhel community-based operating system fedora red hat professional workstation created time intention filling niche rhl filled created without certain future option quickly fell wayside non-enterprise rhl users favor fedora first edition fedora operating system—then known fedora core 1—was released november 6 2003 fedora community continues thrive fedora distribution reputation foss distribution focuses innovation close work upstream linux communities project current vision statement new october 2010 board worked synthesize ideas many different parts community concise statement 2017 board project leader matthew miller began work drafting updated mission statement august 2008 several fedora servers compromised upon investigation found one compromised servers used signing fedora update packages fedora project stated attacker get package signing key could used introduce malicious software onto fedora users systems update process project administrators performed checks software find anything suggest trojan horse introduced software precaution project converted new package signing keys fedora published full details march 30 2009 fedora project separate legal entity organization red hat retains liability actions fedora council currently top-level community leadership governance body council composed mix representatives different areas project named roles appointed red hat variable number seats connected medium-term project goals previous governance structure fedora board comprised five red hat appointed members five community-elected members additionally fedora project leader veto power board decision current model voting members block issues valid reason red hat one point announced intentions create separate fedora foundation govern project consideration variety issues canceled favor board model currently place community also involved organizing lower levels leadership fedora engineering steering committee fesco mindshare committee responsible technical community oversight respectively community-elected bodies manage significant portions project project facilitates online communication among developers community members public mailing lists wiki pages also coordinates two main events known fedora users developers conference fudcon flock flock fedora fudcon free software event held different locations two designated regions latin america asia/pacific typically revolves around combination conferencing social events hackathon flock similar event replaced fudcon north america europe/the middle east task-specific flexibly scheduled events known fedora activity days also gather many project contributors together various regions
Operating systems
asteroidos asteroidos open source operating system designed smartwatches available firmware replacement android wear devices motto asteroidos project hack wrist asteroidos built like embedded linux distribution openembedded works top linux kernel systemd service manager asteroidos also includes various mobile linux middlewares originally developed mer nemo mobile lipstick mce user interface completely written qt5 framework applications coded qml graphic components coming qt quick qml-asteroid sdk cross-compilation toolchain integrated qt creator generated openembedded easier development asteroid-launcher wayland compositor customizable home screen managing applications watchfaces notifications quick settings asteroid-launcher runs top libhybris compatibility layer make use bionic gpu drivers asteroidos offers bluetooth low energy synchronization capabilities asteroid-btsyncd daemon running top bluez5 reference client named asteroidos sync available android users 1.0 release following applications shipped pre-installed default asteroidos
Operating systems
nubuntu nubuntu network ubuntu project take existing ubuntu operating system livecd full installer remaster tools needed penetration testing servers networks main idea keep ubuntu ease use mix popular penetration testing tools besides usage network server testing nubuntu made desktop distribution advanced linux users nubuntu uses light window manager fluxbox includes used security programs linux wireshark nmap dsniff ettercap april 4 2010 official website closed explanation list previous current releases
Operating systems
internet protocol control protocol computer networking internet protocol control protocol ipcp network control protocol ncp establishing configuring internet protocol point-to-point protocol link ipcp responsible configuring ip addresses well enabling disabling ip protocol modules ends point-to-point link ipcp uses packet exchange mechanism link control protocol ipcp packets may exchanged ppp reached network-layer protocol phase ipcp packets received phase reached silently discarded ipcp ncp protocol code number 0x8021 two endpoints ppp connection must send ipcp configure request peer tcp/ip options independent direction ppp connection ppp endpoint request specific ip address peer also ask peer suggest ip address requesting address 0.0.0.0 peer sends suggestion ipcp nak packet first peer must subsequently request order complete negotiation practice protocols like pppoe commonly used home broadband connections latter method request suggestion nak suggestion request suggested address used set ip address isp client endpoint i.e customer-premises equipment former method request address used inform client isp endpoint ip provider edge equipment similar ncp ipv6 control protocol exists ipv6 used together ipcp ppp connection dual stack link interfacing newer older equipment n't support ipv6 one sees lcp protrej messages protocol 0x8057 side n't support ipv6cp configuration done link able carry ip data payload ppp frame code indicates ip data carried ipcp header code 8 bits. br specifies function performed identifier 8 bits used match requests replies length 16 bits. br size packet including header data variable length. br zero bytes data indicated length field may contain one options ipcp configuration options allow negotiatiation desirable internet protocol parameters ipcp uses configuration option format defined lcp link control protocol separate set options ipcp configuration options option 8 bits length 8 bits data variable length microsoft implementation common ipcp options include ip address ip addresses dns netbios name servers
Internet protocols
marc rochkind marc j. rochkind invented source code control system working bell labs well wrote advanced unix programming founded xvt software inc
Operating systems
lispme lispme interpreter scheme programming language developed fred bayer palm os pdas free software released gnu general public license reasonably close standard scheme fully r5rs compliant scheme source programs stored palm os memopad format scheme sessions stored palm os pdb database files interrupted restarted support palm os user interface primitives lispme also provides database support lispme sessions given starter icon appears applications menu enabling session run palm pilot application product ended development august 2008 fairly complete quite robust
Programming language topics
cispe cloud infrastructure services providers europe cispe cloud infrastructure services providers europe trade association gathering infrastructure service iaas cloud providers express views european scale cispe non profit organisation registered belgium declared european union transparency register 041495920038-44 association started since iaas players difficulties make business model understood policy makers association aims advocate eu wide cloud first public procurement policy engage european digital single market including promotion high level security data protection rules/standards well avoiding vendor lock-in although association formally registered early 2017 operating since 2015 order help iaas providers customers reach compliance coming eu general data protection regulation gdpr enter force 25 may 2018 cispe released cispe data protection code conduct top required compliance meet gdpr code also ensures iaas customers may choose data located processed exclusively europe supplier re-use customer data compliance declared cisps/iaas providers service service cispe code conduct launched 27 september 2016 european parliament first 30 services declared first cisps/iaas providers 14 february 2017 announcements received large press coverage across europe including le monde infodsi el pais la repubblica silicon cloud magazine computer sweden tom hardware l'informaticien global security mag eu observer politico computer weekly iapp il corriere della sicurezza lemagit bloomberg tv itr manager heise.de cor.com zdnet eleconomista.es channel europapress 01net register cio dive many others members supportive organizations manage operations 15 european countries including france germany italy ireland uk finland sweden netherlands spain bulgaria poland switzerland companies members cispe and/or supporting code conduct includes arsys art automation aruba aws bit dada daticum dominion enter fasthosts fjordit gigas hetzner online home host europe group ids ikoula leaseweb lomaco netalia netcetera outscale ovh seeweb serverplan solidhost upcloud vtx xxl webhosting 1 1 internet cispe non profit association belgian law general assembly elects within members board less 10 members composition board directors time take account composition rules majority board composed european headquartered companies majority board composed small mid caps eur 1b turnover represent least 3 different eu countries considering worldwide hq location first chairman board alban schmutz general secretary named board first general secretary francisco mingorance board also names code conduct task force cispe cctf charge working evolution improvements cispe data protection code conduct organization open member operating least one iaas service one european country engaging declare least one service cispe code conduct within 6 months
Distributed computing architecture
balloon fight player controls unnamed balloon fighter two balloons attached helmet repeatedly pressing button holding b button causes balloon fighter flap arms rise air balloon popped player flotation decreased making harder rise life lost balloons popped enemy balloon fighters player falls water gets eaten large piranha near surface water hit lightning two modes play 1-player/2-player game goal clear screen enemies balloon trip goal avoid obstacles side-scrolling stage original arcade game include balloon trip level layouts completely different take advantage vertical scrolling addition minor gameplay differences defeat enemies screen clear stage mode played alone co-operatively second player player starts three extra lives 3ds balloon fight port comes download play option allows play along friend another 3ds system enemy balloon fighters float around screen player must hit balloons defeat enemy also fall water eaten fish flying close water surface enemy defeated falls water bubble rise screen hit extra points play progresses stages number enemies platforms increases every three stages bonus stage goal burst balloons float screen chimneys bottom single-player game goal avoid lightning sparks collect balloons aiming move ranks compete high score player starts one life home nintendo entertainment system version ported nec pc-8801 october 1985 sharp x1 november 1985 game boy advance balloon fight-e e-reader united states september 16 2002 part famicom mini series japan may 21 2004 also played animal crossing gamecube nintendo released game watch version name based nes version balloon trip mode protagonist balloon man unlike balloon fighters balloon men use rocket suits instead flapping hands elevate holding balloons sequel balloon fight called balloon kid released october 1990 north america january 31 1991 europe game boy expands game roots revamped full platforming adventure title released japan game boy colorized versions titled hello kitty world published character soft famicom balloon fight gb game boy color later released japan september 2001 game ported sharp zaurus series pdas balloon fighter flipper trophies obtainable super smash bros. melee flipper also usable item replacing bumper previous game balloon fighter considered playable role development super smash bros. melee ice climbers chosen instead original background music balloon trip balloon fight heard melee icicle mountain stage alternate music giant fish makes cameo appearance super smash bros. brawl appears ice climber-based stage summit tries attack players sea addition remixed version main theme titled balloon trip available summit stage well stickers balloon fighter balloon fight enemy collected brawl addition villager animal crossing series uses balloon fighter helmet one special moves super smash bros. nintendo 3ds wii u 3ds version game stage based balloon fight appears original 8-bit graphics stage returns super smash bros ultimate balloon fighter appears spirit said game warioware inc. series 9-volt games based balloon fight also minigame functioning three-dimensional version balloon trip players use wii remote microgame version also use nunchuk complete 3d balloon trip original tech demo yoshi touch go called yoshi balloon trip balloon fight theme touch mode tetris ds although mode almost nothing game music decorative graphics april 12 2007 club nintendo released tingle balloon fight nintendo ds exclusive game featuring tingle nintendo character originated legend zelda series game remake home version featuring balloon fight balloon trip modes levels expanded slightly utilize screens similar arcade game except based entirely around nes levels gallery contained concept art also included piece could unlocked completing specific in-game tasks balloon fighter appears super mario maker unlockable mystery mushroom costume part update balloon fight re-released part nintendo virtual console june 8 2007 balloon fight released europe followed release north america july 16 2007 japan november 12 2007 game released virtual console nintendo 3ds part system ambassador program september 2011 nintendo land attraction called balloon trip breeze similar balloon trip original balloon fight game released wii u virtual console service january 23 2013 north america february 23 2013 part promotion celebrating 30th anniversary release original nintendo famicom balloon fight became first wii u virtual console title released november 11 2016 game alongside 29 games included nes classic edition nintendo classic mini europe nes version balloon fight re-released one launch titles nintendo switch online september 18 2018
Computer architecture
ws-context ws-context web services specification developed oasis organization part ws-caf suite purpose provide means reference shared context relates set interactions web services termed activity context provides details application-specific execution environment services typically included header soap message contexts may passed value reference case retrieved using context manager service context service described allows management activities means begin complete operations create destroy context respectively
Web technology
refal refal recursive functions algorithmic language functional programming language oriented toward symbolic computations including string processing language translation artificial intelligence one oldest members family first conceived 1966 theoretical tool first implementation appearing 1968 refal intended combine mathematical simplicity practicality writing large sophisticated programs one first functional programming languages unlike lisp time refal based pattern matching pattern matching works conjunction term rewriting basic data structure lisp prolog linear list built cons operation sequential manner thus n access list n th element refal lists built scanned ends pattern matching working nested lists well top-level one effect basic data structure refal tree rather list gives freedom convenience creating data structures using mathematically simple control mechanisms pattern matching substitution refal also includes feature called freezer support efficient partial evaluation refal applied processing transformation tree structures similarly xslt refal hello world example shown program includes two functions named go hello function written name function followed function body curly braces go function marked entry point program using entry directive one could think expressions function bodies function calls lisp-like syntax example hello function appears call built-in prout function string 'hello world argument meaning mechanism call however quite different illustrate difference consider following function determines whether string palindrome example shows function complex body consisting four sentences clauses sentence begins pattern followed equal sign followed general expression right hand side sentence terminated semicolon example pattern second sentence function s.1 expression true example shows patterns include pattern variables form character identifying type variable variable matches followed variable identifier variables begin match single symbol begin e match arbitrary expression variable identifier arbitrary alphanumeric sequence optionally separated type identifier dot function executes comparing argument patterns sentences order appear definition first pattern matches function replaces argument expression right hand side matched sentence result function application includes subexpression angle brackets third sentence example applied result processed refal invoking function identified first symbol brackets execution stops result angle brackets expand way function pal thus read informally expression empty replace true otherwise expression single symbol replace true otherwise expression symbol followed arbitrary expression e.2 followed symbol replace expression pal e.2 words throw away two identical symbols beginning end recurse otherwise replace expression false pattern e.1 always matches following three step-by-step execution traces annotated sentence numbers applied step produce next see hello world example fact executes sequence following expression transformations fact 0 1 0 matches 0 number produces 1 symbol number multiply result fact s.n 1 note prefix style operators fact s.n loop s.n 1 seen s.n acts loop counter equal function defined given two terms terms first clause matches produces true else second clause matches produces false important property refal functions refal single argument may decomposed terms expression defining control structures easy e1 evaluated expression entered matches 'true e1 else e2 e2 squeeze first clause matches whenever function squeeze encounters double blanks input expression replaces single blank second clause matches first one returns resultant value current expression squeeze
Programming language topics
nokia e90 communicator nokia e90 communicator 3g smartphone nokia fifth generation communicator also part eseries announced 11 february 2007 3gsm show barcelona succeeded nokia 9500 communicator unlike predecessors e90 runs s60 platform symbian os 3rd edition feature pack 1 v9.2 respectively previous communicators meanwhile based either geos symbian-based series 80 move common s60 good software compatibility get rid exclusive series 80 ui behaviours e90 also first communicator umts/hsdpa connectivity integrated gps features osgi ercp eclipse rcp embedded systems first nokia e90 unit sold auction jakarta indonesia 17 may 2007 rp 45,000,000 5,000 us indonesia one largest market share nokia communicator series cited reason unit first launch location early user-feedback reviews highlighted defect microphone communicator nokia initially denied existence defect nokia europe later acknowledged q3 earnings report released 18 october 2007 stated issue fully resolved replacement qwerty-ridden interface series 80 s60 software designed used one thumb criticised people communicator firmware version 7.40.1.2 released late october 2007 added support a-gps improved gps performance version also upgraded maps application communicator recent firmware version 400.34.93 free navigation program ovi maps also available communicator currently without free navigation
Operating systems
nonstop sql nonstop sql commercial relational database management system designed fault tolerance scalability currently offered hewlett packard enterprise latest version sql/mx 3.4 product originally developed tandem computers tandem acquired compaq 1997 compaq later acquired hewlett packard 2002 hewlett packard split 2015 hp inc. hewlett packard enterprise nonstop sql rest nonstop product line went hewlett packard enterprise product primarily used online transaction processing tailored organizations need high availability scalability database system typical users product stock exchanges telecommunications pos bank atm networks nonstop sql designed run effectively parallel computers adding functionality distributed data distributed execution distributed transactions first released 1987 second version 1989 added ability run queries parallel product became fairly famous one systems scales almost linearly number processors machine adding second cpu existing nonstop sql server almost exactly doubled performance second version added /mp name massively parallel third version nonstop sql/mx attempt tandem computers create product ansi sql compliant predecessor nonstop sql/mx shipped nonstop platform since 2002 access tables created nonstop sql/mp although native sql/mx tables offer ansi compliance many oracle-like enhancements hp neoview business intelligence platform built using nonstop sql origins nonstop sql/mx hp oltp database product parts neoview code base open-sourced 2014 name trafodion top-level apache project
Computer architecture
internet police internet police generic term police government agencies departments organizations charge policing internet number countries major purposes internet police depending state fighting cybercrime well censorship propaganda several attempts made introduce tools would allow law enforcement security agencies eavesdrop online communications without warrant latest bill c-30 tabled february 2012 abandoned strong public opposition computer emergency response team estonia cert estonia established 2006 organization responsible management security incidents .ee computer networks task assist estonian internet users implementation preventive measures order reduce possible damage security incidents help responding security threats cert estonia deals security incidents occur estonian networks started notified citizens institutions either estonia abroad cyber crime investigation cell wing mumbai police india deal computer crimes enforce provisions india information technology law namely information technology act 2000 various cyber crime related provisions criminal laws including indian penal code companies act india subsection it-sector responsibilities corporate measures protect cybersecurity cyber crime investigation cell part crime branch criminal investigation department mumbai police andhra pradesh cyber crime investigation cell wing hyderabad police india deal cyber crimes indian computer emergency response team cert-in also deals cyber security cyber police hi-tech crime enquire cell kerala police dutch police reported set internet brigade fight cybercrime allowed infiltrate internet newsgroups discussion forums intelligence gathering make pseudo-purchase provide services reported 2005 departments provincial municipal governments mainland china began creating teams internet commentators propaganda police departments offering classes marxism propaganda techniques internet reported guide discussion public bulletin boards away politically sensitive topics posting opinions anonymously false names chinese internet police also erase anti-communist comments posts pro-government messages chinese communist party leader hu jintao declared party intent strengthen administration online environment maintain initiative online opinion 2006 coup thailand thai police active monitoring silencing dissidents online censorship internet carried ministry information communications technology thailand royal thai police collaboration communications authority thailand telecommunication authority thailand 29 april 2010 wipas raksakulthai arrested charges lèse majesté following post facebook account criticizing king bhumibol may 2011 amnesty international named prisoner conscience internet watch foundation iwf recognised organisation united kingdom operating internet 'hotline public professionals report exposure potentially illegal content online works partnership police government public internet service providers wider online industry
Computer security
list qualcomm snapdragon systems-on-chip list qualcomm snapdragon chips snapdragon family mobile system chip soc made qualcomm use smartphones tablets watches smartbook devices three types snapdragon s4 s4 play s4 plus s4 pro launched 2012 snapdragon s4 prime mpq8064 processor announced part snapdragon 600 series snapdragon 208 snapdragon 210 announced september 9 2014 snapdragon 212 announced july 28 2015 qualcomm 205 mobile platform formally falls mobile platform brand practically snapdragon 208 x5 lte modem announced march 20 2017 qualcomm 215 announced july 9 2019 snapdragon 410 announced december 9 2013 qualcomm first 64-bit mobile system chip snapdragon 412 announced july 28 2015 snapdragon 415 older snapdragon 425 later cancelled announced february 18 2015 snapdragon 425 427 430 435 pin software compatible software compatible snapdragon 429 439 450 625 626 632 snapdragon 430 announced september 15 2015 new snapdragon 425 snapdragon 435 announced february 11 2016 snapdragon 427 announced october 18 2016 snapdragon 450 announced june 28 2017 pin software compatible snapdragon 625 626 632 software compatible snapdragon 425 427 429 430 435 439 snapdragon 429 439 announced june 26 2018 snapdragon 429 439 pin software compatibility software compatible snapdragon 425 427 430 435 450 625 626 632 snapdragon 600 announced january 8 2013 snapdragon 610 snapdragon 615 announced february 24 2014 snapdragon 615 qualcomm first octa-core soc snapdragon 616 announced july 31 2015 snapdragon 617 announced september 15 2015 snapdragon 625 announced february 11 2016 snapdragon 626 announced october 18 2016 snapdragon 625 626 632 450 pin software compatible software compatible snapdragon 425 427 429 430 435 439 snapdragon 618 snapdragon 620 announced february 18 2015 since renamed snapdragon 650 snapdragon 652 respectively snapdragon 653 announced october 18 2016 snapdragon 630 636 660 pin software compatible snapdragon 630 snapdragon 660 announced may 9 2017 snapdragon 636 announced october 17 2017 snapdragon 632 announced june 26 2018 pin software compatible snapdragon 625 626 450 software compatible snapdragon 425 427 429 430 435 439 snapdragon 670 announced august 8 2018 pin software compatible snapdragon 710 snapdragon 675 announced october 22 2018 snapdragon 665 announced april 9 2019 february 27 2018 qualcomm introduces new snapdragon 700 mobile platform series snapdragon 710 announced may 23 2018 pin software compatible snapdragon 670 snapdragon 712 announced february 6 2019 snapdragon 730 730g announced april 9 2019 snapdragon 802 chip 8092 use smart tvs formerly announced qualcomm later confirmed released demand processors market smaller anticipated snapdragon 800 announced january 8 2013 snapdragon 801 announced february 24 2014. notable features snapdragon 805 announced november 20 2013 snapdragon 808 810 announced april 7 2014 snapdragon 808 notable features predecessor 805 snapdragon 810 notable features lower end 808 snapdragon 820 announced mobile world congress march 2015 first phones featuring soc released early 2016 snapdragon 821 announced july 2016 821 provides 10 improvement performance 820 due faster clocked cpu otherwise similar features qualcomm stating 821 designed complement rather replace 820. notable features predecessor snapdragon 808 810 snapdragon 835 announced november 17 2016 snapdragon 835 mobile compute platform windows 10 pcs announced december 5 2017. notable features predecessor 821 snapdragon 845 announced december 7 2017 snapdragon 845 notable features snapdragon 850 mobile compute platform windows 10 pcs announced june 4 2018 essentially over-clocked version snapdragon 845 snapdragon 855 announced december 5 2018 snapdragon 855 qualcomm first 7 nm finfet chipset notable features predecessor 845 snapdragon 8cx compute platform windows 10 pcs announced december 6 2018. notable features 855 snapdragon 855+ announced july 15 2019 different video codecs supported snapdragon socs decode e encode fhd fullhd 1080p 1920x1080px hd 720p 1366x768px 1280x720px different video codecs supported snapdragon 200 series different video codecs supported snapdragon 400 series different video codecs supported snapdragon 600 series different video codecs supported snapdragon 700 series different video codecs supported snapdragon 800 series qualcomm snapdragon wear 2100 processor designed smartwatches available connected 4g/lte 3g tethered bluetooth wi-fi versions lg watch style uses processor snapdragon wear 2500 announced june 26 2018 snapdragon wear 3100 announced september 10 2018 snapdragon 602a application motor industry announced january 6 2014 snapdragon 820a announced january 6 2016 snapdragon 410e embedded snapdragon 600e embedded announced september 28 2016 snapdragon 800 embedded snapdragon 810 embedded snapdragon 820e embedded announced february 21 2018 qualcomm vision intelligence platform announced april 11 2018 qualcomm vision intelligence platform purpose built bring powerful visual computing edge computing machine learning wide range iot devices qualcomm smart audio platform apq8009 apq8017 announced june 14 2017 qualcomm 212 home hub apq8009 qualcomm 624 home hub apq8053 announced january 9 2018 qcs400 series announced march 19 2019 may 2018 qualcomm announced snapdragon xr1 platform first purpose-built soc augmented reality virtual reality mixed reality qualcomm also announced htc vive pico meta vuzix would announcing consumer products featuring xr1 end 2018 following qualcomm acquisition csr 2015 qualcomm designs ultra-low-power bluetooth socs csr qca qcc brands wireless headphones earbuds qualcomm worked amazon google reference designs help manufactures develop headsets support alexa google assistant google fast pair qualcomm announced qcc5100 series ces 2018
Computer architecture
clean url clean urls also sometimes referred restful urls user-friendly urls search engine-friendly urls uniform resource locators urls intended improve usability accessibility website web service immediately intuitively meaningful non-expert users url schemes tend reflect conceptual structure collection information decouple user interface server internal representation information reasons using clean urls include search engine optimization seo conforming representational state transfer rest style software architecture ensuring individual web resources remain consistently url makes world wide web stable useful system allows durable reliable bookmarking web resources clean urls also contain implementation details underlying web application carries benefit reducing difficulty changing implementation resource later date example many urls include filename server-side script underlying implementation resource changed urls would need change along likewise urls clean site database moved restructured potential cause broken links internally external sites latter lead removal search engine listings use clean urls presents consistent location resources user-agents regardless internal structure potential benefit use clean urls concealment internal server application information improve security system url often comprise path script name query string query string parameters dictate content show page frequently include information opaque irrelevant users—such internal numeric identifiers values database illegibly-encoded data session ids implementation details clean urls contrast contain path resource hierarchy reflects logical structure users easily interpret manipulate implementation clean urls involves url mapping via pattern matching transparent rewriting techniques usually takes place server side clean url often form seen user search engine optimization purposes web developers often take opportunity include relevant keywords url remove irrelevant words common words removed include articles conjunctions descriptive keywords added increase user-friendliness improve search engine rankings fragment identifier included end clean url references within page need user-readable systems define slug part url identifies page human-readable keywords usually end part url interpreted name resource similar basename filename title page name based use word slug news media indicate short name given article internal use slugs typically generated automatically page title also entered altered manually page title remains designed display human readability slug may optimized brevity consumption search engines long page titles may also truncated keep final url reasonable length slugs may entirely lowercase accented characters replaced letters english alphabet whitespace characters replaced dash underscore avoid encoded punctuation marks generally removed also remove short common words conjunctions example original title outré collection would generated slug
Web technology
disk array disk array disk storage system contains multiple disk drives differentiated disk enclosure array cache memory advanced functionality like raid virtualization components typical disk array include typically disk array provides increased availability resiliency maintainability using additional redundant components controllers power supplies fans etc often point single points failure spofs eliminated design additionally disk array components often hot-swappable typically disk arrays divided categories primary vendors storage systems include coraid inc. datadirect networks dell emc fujitsu hewlett packard enterprise hitachi data systems huawei ibm infortrend netapp oracle corporation panasas pure storage companies often act oem vendors market storage components manufacture
Computer architecture
spursengine spursengine microprocessor toshiba built media oriented coprocessor designed 3d- video processing consumer electronics set-top boxes computers spursengine processor also known quad core hd processor announced 20 september 2007 spursengine stream processor powered four synergistic processing elements spe also used cell processor featured sony playstation 3 processing elements fed chip h.264 mpeg-2 codecs controlled die host cpu connected chip pcie controller contrast cell processor chip cpu ppe similar work enable smoother interaction host spursengine toshiba also integrated simple proprietary 32-bit control core spursengine employs dedicated xdr dram working memory spursengine designed work much lower frequencies cell toshiba also optimized circuit layout spes reduce size 30 resulting chip consumes 10-20 w power spursengine accessible developer device driver developed windows linux systems software supporting spursengine limited primarily realm video editing encoding first generation spursengine processors specified follows april 2008 toshiba shipped samples spursengine se1000 device pcie-based reference board toshiba included spursengine processors qosmio laptops models f50 g50 g55 third quarter 2008
Computer architecture
kenneth minihan kenneth a. minihan born december 31 1943 former united states air force lieutenant general served director national security agency defense intelligence agency retiring may 1 1999 minihan born pampa texas entered united states air force 1966 distinguished graduate reserve officer training corps program florida state university also member phi kappa psi served senior intelligence officer air force senior staff officer positions pentagon headquarters tactical air command langley air force base virginia electronic security command kelly air force base texas defense intelligence agency washington d.c. national security agency fort george g. meade maryland commanded squadrons groups major air command united states overseas assistant chief staff intelligence headquarters united states air force washington d.c. director defense intelligence agency retiring united states air force minihan served president security affairs support association 1999 2002 currently serves managing director paladin capital group
Computer security
weitek weitek corporation american chip-design company originally focused floating-point units number commercial cpu designs early mid-1980s weitek designs could found powering number high-end designs parallel-processing supercomputers early 1990s cpu designs started including fpus built system basically “ free ” weitek made series attempts break general cpu graphics driver market 1995 company almost dead late 1996 remains purchased rockwell semiconductor systems quickly disappeared weitek started 1981 several intel engineers left form company weitek developed math coprocessors several systems including based motorola 68000 family 1064 intel-based i286 systems 1067 intel fpu design i386 fell far behind development weitek delivered 1167 later upgrades design led 2167 3167 4167 weitek would later deliver similar fpus mips architecture known xl line weitek fpus several differences compared x87 offerings lacking extended double precision register-file rather stack-based model orders increased supercomputer applications weitek found seriously disadvantaged fab becoming rather “ outdated ” hp approached deal use newer fabs proved advantageous soon hp ’ fabs open anyone weitek also worked hp design latest pa-risc design sold version known risc 8200 sold embedded design use laser printers late 1980s weitek saw new opportunity started developing frame buffers sun microsystems workstations early 1990s also introduced sparc power µp “ power-up ” technically referred wtl 8601 pin-compatible version sparc processor µp could dropped existing sparcstation 2 sparcstation ipx workstations ran 80 mhz double clock speed cpus replaced 8701 ran twice fast internally providing boost 50–60 overall speed due bus getting faster however pursue concept later generations sparc processors weitek turned frame-buffer experience pc market early 90s introduced series svga multimedia chipsets known “ power ” systems consisting two chips one drawing graphics known p9000 another handling output videopower 5x86 power series used number third-party designs based vesa local bus standard p9001 moved pci became fairly popular 1994 known viper designs diamond orchid final generation p9100 combined p9001 5286 single chip weitek adapters fairly successful early days 486 market fell use less expensive systems introduced host new players mid-1990s weitek attempted re-enter low-end market w464 486 w564 p5 systems used host machine ram frame buffer lower costs one reasons company purchased rockwell shortly shipped
Computer architecture
web services flow language web services flow language 1.0 wsfl xml programming language proposed ibm 2001 describing web services compositions language considered two types compositions first type describing business processes collection web services second describing interactions partners wsfl proposed layered top web services description language 2003 ibm microsoft combined wsfl xlang bpel4ws submitted oasis standardization oasis published bpel4ws ws-bpel properly fit naming ws-* standards web services endpoint language wsel xml format proposed used description non-operational characteristics service endpoints quality-of-service cost security properties format proposed part report published web service flow language never gained wide acceptance
Web technology
miis programming language miis meditech interpretive information system mumps-like programming language created a.neil pappalardo curt w. marble dec pdp mass general hospital 1964 1968 mumps evolution took two major directions mumps proper miis mumps became ansi iso-standard language many mumps implementations standardized compatible miis standardize became proprietary system instead example differences mumps miis value logical expression mumps may false zero 0 true non-zero canonically one 1 miis value false empty string value true string consisting ascii delete character code 127 decimal also philosophical difference dialects miis often takes approach code march along regardless possible errors mumps error prevent serious problems example encountering undefined variable mumps generates error miis treats nil 1980s brigham women hospital massachusetts used miis program data general mainframe 1986 scamc reported vancouver general hospital also integrated cardiology patient management system written miis miis language used programming library systems well health industry systems oclc library system one example also used create financial systems insurance brokers seen ireland uk late 1970s
Programming language topics
vivante corporation vivante corporation fabless semiconductor company headquartered sunnyvale california r center shanghai china company founded 2004 giquila focused portable gaming market company first product directx-compatible graphics processing unit gpu capable playing pc games 2007 giquila changed name vivante changed direction company focus design licensing embedded graphics processing unit designs company licensing mobile visual reality semiconductor solution providers serve embedded computing markets mobile gaming high-definition home entertainment image processing automotive display entertainment vivante named contributor hsa heterogeneous system architecture foundation 2015 verisilicon holdings co. ltd. acquired vivante corporation all-stock transaction since changing directions vivante developed range gpu cores compliant opengl es 1.1 2.0 standards well openvg standard created verisilicon support vulkan api 1.0 openvx 1.0 provided least 6 major desktop embedded operating systems 2d graphics products vector gpus summarized vendor term composition processing cores cpc sometimes mentioned feature single pass composition blending capability 8 higher gc300 gc320 gc350 gp355 openvg core additional listing gc200 gc420 nxp mentions gc255 presentation i.mx models nxp i.mx8 series come 2 units gc7000lite gc7000 vector processor 3d graphics products please see table legend notes listing announced 2009 least fifteen licensees used gpus twenty embedded designs application processors using vivante gpu technology vivante sold verisilicon arcturus gc8000 series released verisilicon supports newer technologies opencl 2.0 openvx 1.1 openvg 1.1 opengl es 3.2 opengl 4.0 vulkan 1.0 plans writing new drm/kms driver kernel driver vivante hardware since vivante previously put linux kernel component gnu general public license gpl instead maintaining proprietary blob free gallium3d-style device driver codice_1 surpassed vivante proprietary user-space driver benchmarks supports vivante product line gc400 series gc800 series gc1000 series gc2000 series gc3000 series gc4000 series
Computer architecture
powtoon powtoon company sells cloud-based software saas creating animated presentations animated explainer videos powtoon founded january 2012 following 180k seed round investment december 2011 company released beta version august 2012 seen fast subscriber growth since december 2012 powtoon secured 600,000 investment los angeles-based venture capital firm startup minds february 2013 powtoon introduced free account option allowing users create animated videos exported youtube free videos include powtoon branding powtoon web-based animation software allows users create animated presentations manipulating pre-created objects imported images provided music user-created voice-overs powtoon uses apache flex engine generate xml file played powtoon online viewer exported youtube downloaded mp4 file powtoon also available google chrome store application edmodo.com
Distributed computing architecture
tower cabin tower cabin unusual spinoff fantasy role-playing video game series called japanese developer microcabin tower cabin released microcabin decided discontinue development msx tower cabin also ported nec pc9801 game player plays new microcabin employee wander microcabin headquarters building japan goal work various lead programmers developers making company successful similar japanese game known segagaga dreamcast player runs entire sega company president sega corporation game featured many characters xak series latok fray pixie two unlockable mini-games tower cabin short fighting game pixie fray text adventure called crusader took place within xak universe game setting takes place microcabin office building japan player descends ascends various floors throughout building carrying various business related tasks besides main character player several miscellaneous npc player talk order proceed game addition characters microcabin games make cameo appearance game played traveling office building various departments relaying information employees completing various business related tasks order ensure success microcabin company
Computer architecture
list tools create live usb systems list utilities creating live usb multiboot means tool allows multiple systems usb stick well bootloader usb flash drive choose system load boot time
Operating systems
arp spoofing computer networking arp spoofing arp cache poisoning arp poison routing technique attacker sends spoofed address resolution protocol arp messages onto local area network generally aim associate attacker mac address ip address another host default gateway causing traffic meant ip address sent attacker instead arp spoofing may allow attacker intercept data frames network modify traffic stop traffic often attack used opening attacks denial service man middle session hijacking attacks attack used networks use arp requires attacker direct access local network segment attacked address resolution protocol arp widely used communications protocol resolving internet layer addresses link layer addresses internet protocol ip datagram sent one host another local area network destination ip address must resolved mac address transmission via data link layer another host ip address known mac address needed broadcast packet sent local network packet known arp request destination machine ip arp request responds arp reply contains mac address ip arp stateless protocol network hosts automatically cache arp replies receive regardless whether network hosts requested even arp entries yet expired overwritten new arp reply packet received method arp protocol host authenticate peer packet originated behavior vulnerability allows arp spoofing occur basic principle behind arp spoofing exploit lack authentication arp protocol sending spoofed arp messages onto lan arp spoofing attacks run compromised host lan attacker machine connected directly target lan generally goal attack associate attacker host mac address ip address target host traffic meant target host sent attacker host attacker may choose inspect packets spying forwarding traffic actual default destination avoid discovery modify data forwarding man-in-the-middle attack launch denial-of-service attack causing packets network dropped simplest form certification use static read-only entries critical services arp cache host ip address-to-mac address mappings local arp cache may statically entered hosts n't need transmit arp requests entries exist static entries provide security spoofing result maintenance efforts address mappings systems network must generated distributed scale large network since mapping set pair machines resulting n n arp entries configured n machines present machine must arp entry every machine network n-1 arp entries n machines software detects arp spoofing generally relies form certification cross-checking arp responses uncertified arp responses blocked techniques may integrated dhcp server dynamic static ip addresses certified capability may implemented individual hosts may integrated ethernet switches network equipment existence multiple ip addresses associated single mac address may indicate arp spoof attack although legitimate uses configuration passive approach device listens arp replies network sends notification via email arp entry changes antiarp also provides windows-based spoofing prevention kernel level arpstar linux module kernel 2.6 linksys routers drops invalid packets violate mapping contains option repoison/heal virtualized environment kvm also provides security mechanism prevent mac spoofing guest running host additionally ethernet adapters provides mac vlan anti-spoofing features openbsd watches passively hosts impersonating local host notifies case attempt overwrite permanent entry operating systems react differently linux ignores unsolicited replies hand uses responses requests machines update cache solaris accepts updates entries timeout microsoft windows behavior arp cache configured several registry entries hkey_local_machine\system\currentcontrolset\services\tcpip\parameters arpcachelife arpcacheminreferencelife arpuseethersnap arptrsingleroute arpalwayssourceroute arpretrycount techniques used arp spoofing also used implement redundancy network services example software allows backup server issue gratuitous arp request order take defective server transparently offer redundancy arp spoofing often used developers debug ip traffic two hosts switch use host host b communicating ethernet switch traffic would normally invisible third monitoring host m. developer configures mac address b b mac address also configures forward packets monitor traffic exactly man-in-the-middle attack tools used carry arp spoofing attacks
Computer security
disk array controller disk array controller device manages physical disk drives presents computer logical units almost always implements hardware raid thus sometimes referred raid controller also often provides additional disk cache disk array controller name often improperly shortened disk controller two confused provide different functionality disk array controller provides front-end interfaces back-end interfaces single controller may use different protocols back-end front-end communication many enterprise controllers use fc front-end sata back-end modern enterprise architecture disk array controllers sometimes also called storage processors sps parts physically independent enclosures disk arrays placed storage area network san network-attached storage nas servers external disk arrays usually purchased integrated subsystem raid controllers disk drives power supplies management software controllers provide advanced functionality various vendors name differently simple disk array controller may fit inside computer either pci expansion card built onto motherboard controller usually provides host bus adapter hba functionality save physical space hence sometimes called raid adapter hardware raid controllers available long time always required expensive scsi hard drives aimed server high-end computing market scsi technology advantages include allowing 15 devices one bus independent data transfers hot-swapping much higher mtbf around 1997 introduction atapi-4 thus ultra-dma-mode 0 enabled fast data-transfers less cpu utilization first ata raid controllers introduced pci expansion cards raid systems made way consumer market users wanted fault-tolerance raid without investing expensive scsi drives ata drives make possible build raid systems lower cost scsi ata raid controllers lack dedicated buffer high-performance xor hardware parity calculation result ata raid performs relatively poorly compared scsi raid controllers additionally data safety suffers battery backup finish writes interrupted power outage hardware raid controllers present assembled raid volumes operating systems n't strictly required implement complete configuration assembly controller often basic features implemented open-source software driver extended features provided binary blobs directly hardware manufacturer normally raid controllers fully configured card bios operating system booted operating system booted proprietary configuration utilities available manufacturer controller exact feature set controller may specific manufacturer product unlike network interface controllers ethernet usually configured serviced entirely common operating system paradigms like ifconfig unix without need third-party tools manufacturer raid controller usually provides proprietary software tooling operating system deem support ensuring vendor lock-in contributing reliability issues example freebsd order access configuration adaptec raid controllers users required enable linux compatibility layer use linux tooling adaptec potentially compromising stability reliability security setup especially taking long term view mind however greatly depends controller whether appropriate hardware documentation available order write driver controllers open-source versions configuration utilities example codice_1 codice_2 available freebsd since freebsd 8.0 2009 well codice_3/codice_4 since 2015 supporting respective device drivers latter fact contributing code bloat operating systems implemented generic frameworks interfacing raid controller provide tools monitoring raid volume status well facilitation drive identification led blinking alarm management hot spare disk designations within operating system without reboot card bios example approach taken openbsd 2005 bio 4 pseudo-device driver bioctl utility provide volume status allow led/alarm/hotspare control well sensors including drive sensor health monitoring approach subsequently adopted extended netbsd 2007 well bioctl feature set intentionally kept minimum controller supported tool way initial configuration controller meant performed card bios initial configuration day-to-day monitoring repair possible unified generic tools bioctl set accomplish
Computer architecture
dbedit dbedit 2 database editor connect oracle db2 mysql database provides jdbc driver runs windows linux solaris dbedit free open source software distributed gnu general public license source code hosted sourceforge dbedit developed jef van den ouweland first windows version released january 2006 used edit oracle db2 database written java later generic jdbc support added application could connect basically type database provides jdbc driver one year first release support operating systems linux solaris added last version dbedit released may 2012
Databases
red programming language red computer programming language red made overcome limitations programming language rebol introduced 2011 nenad rakocevic red imperative functional programming language syntax general usage overlaps interpreted rebol language introduced 1997 implementation choices red intend create full stack programming language red used extremely high-level programming dsls guis well low-level programming operating systems device drivers key approach language two parts red/system red red seeks remain independent toolchain code generation therefore possible cross-compile red programs platform supports via command-line switch red red/system distributed open-source software modified bsd license runtime library distributed permissive boost software license version 0.6.4 red includes garbage collector simple gc red introduced netherlands february 2011 rebol boron conference author nenad rakocevic september 2011 red programming language presented larger audience software freedom day 2011 rakocevic long-time rebol developer known creator cheyenne http server red syntax semantics close rebol like rebol strongly supports metaprogramming domain-specific languages dsls therefore highly efficient tool dialecting creating embedded dsls red includes dialect called red/system c-level language provides system programming facilities red easy integrate tools languages dll libred lightweight around 1 mb also able cross-compile various platforms see cross compilation section create packages platforms require e.g. .apk android red also includes fully reactive cross-platform gui system based underlying reactive dataflow engine 2d drawing dialect comparable svg compile-time runtime macro support 40 standard datatypes following list red goals presented software freedom day 2011 red development planned done two phases red currently supports following cross-compilation targets important intended syntax examples red 64-bit support integer example overflow 32-bit integer quickly changing float go farther merely show syntax language following factorial example red following factorial example red/system simple case source code similar red version
Programming language topics
john michael mcconnell john michael mcconnell born july 26 1943 former vice admiral united states navy naval career served director national security agency 1992 1996 civilian career includes serving united states director national intelligence 20 february 2007 27 january 2009 bush administration seven days obama administration currently vice chairman booz allen hamilton mcconnell born grew greenville south carolina mcconnell received commission united states navy 1967 worked intelligence officer j2 chairman joint chiefs staff united states secretary defense operation desert shield/storm dissolution soviet union developed improving information flow among intelligence agencies combat forces gulf war 1992 1996 mcconnell served director national security agency nsa led nsa adapted multi-polar threats brought end cold war leadership nsa routinely provided global intelligence information security services white house cabinet officials united states congress broad array military civilian intelligence customers also served member director central intelligence senior leadership team address major intelligence programmatic substantive issues 1992 1996 1996 mcconnell retired navy vice admiral 29 years service – 26 career intelligence officer addition many nation highest military awards meritorious service holds nation highest award service intelligence community also served chairman intelligence national security alliance mcconnell second person hold position director national intelligence nominated president george w. bush january 5 2007 sworn bolling air force base washington d.c. february 20 2007 mcconnell appointment post initially greeted broad bipartisan support although since attracted criticism advocating bush administration controversial policies nomination dni mcconnell served senior vice president consulting firm booz allen hamilton focusing intelligence national security areas 2005 confirmation dni 2007 also chairman board intelligence national security alliance premier not-for-profit nonpartisan private sector professional organization providing structure interactive forum thought leadership sharing ideas networking within intelligence national security communities whose members include leaders industry government academia tuesday august 14 2007 mcconnell visited texas house intelligence committee chairman silvestre reyes review border security granted wide-ranging interview el paso times newspaper surprised many intelligence community candor sensitive topics recent changes foreign intelligence surveillance act nsa warrantless surveillance controversy end interview mcconnell cautioned reporter chris roberts consider whether enemies u.s. could gain information shared leaving paper decide publish el paso times put entire unexpurgated interview website august 22 executive editor dionicio flores saying n't believe damaged national security endangered people resurgent taliban back charge parts afghanistan mcconnell told cnn february 27 2008 assessment differed one made january 2008 defense secretary robert gates january 24 2009 announced mcconnell would return booz allen senior vice president two months taking office mcconnell created series initiatives designed build foundation increased cooperation reform u.s. intelligence community ic plan dubbed 100 day plan integration collaboration focused efforts enable ic act unified enterprise collaborative manner focused six enterprise integration priorities 100 day plan accomplished launch civilian joint duty program improved security clearance processing times increased diversity intelligence workforce information sharing across community 500 day plan designed sustain momentum expanded set initiatives greater level participation set deepen integration community people processes technologies plan address new performance management framework entail six performance elements agencies must entail 100 day plan meant jump start series initiatives based deliberate planning process specific deadlines measures ensure needed reforms implemented 500 day plan started august 2007 designed accelerate sustain momentum expanded set initiatives broader ic participation contains 10 core initiatives tracked senior leadership intelligence community 33 enabling initiatives initiatives based six focus areas described 100 day plan top initiatives director mcconnell ended office near 400th day 500-day plan mcconnell approached congress early august 2007 need modernize fisa claiming two changes needed initial efforts began april – see factsheet first intelligence community required technology changes since 1978 obtain court orders effectively collect foreign intelligence foreign targets located overseas also argued telecoms sued violating nation wiretapping laws must protected liability—regardless veracity charges shortly thereafter mcconnell took active role capitol hill legislation drafted congress august 3 mcconnell announced strongly oppose house proposal n't strong enough heated debate congress updated fisa passing protect america act 2007 september 10 2007 testimony senate committee homeland security governmental affairs mcconnell asserted recently passed protect america act 2007 eased restrictions fisa helped foil major terror plot germany u.s. intelligence-community officials questioned accuracy mcconnell testimony urged office correct statement issued september 12 2007 critics cited incident example bush administration exaggerated claims contradictory statements surveillance activities counterterrorism officials familiar background mcconnell testimony said believe made inaccurate statements intentionally part strategy administration persuade congress make new eavesdropping law permanent officials said believed mcconnell gave wrong answer overwhelmed information merely mixed facts testimony mcconnell blamed death kidnapped american soldier iraq requirements fisa slowness courts however timeline later released showed delays mostly inside nsa casting doubt mcconnell truthfulness mcconnell speaking congressional panel defense protect america act said russian chinese foreign intelligence services nearly active cold war september 18 2007 testimony house judiciary committee mcconnell addressed nsa warrantless surveillance controversy saying agency conducted telephone surveillance americans without obtaining warrant advance since became director national intelligence february 2007 mcconnell called fisa foundational law important legacy protecting rights americans passed era watergate aftermath church pike investigations stressed changes honor legacy privacy foreign threats july 2008 director mcconnell issued directive icd 205 analysts build relationships outside experts topics concern intelligence community—a recommendation highlighted wmd commission report director mcconnell worked white house overhaul executive order 12333 outlines fundamental guidance intelligence agencies mcconnell believes update necessary incorporate intelligence community ’ new organizations new technologies methods redo expected help sixteen intelligence agencies work together reflect post 9/11 threat environment july 2008 president bush issued executive order 13470 amended 12333 one mcconnell last acts dni signed icd501 discovery dissemination retrieval information within intelligence community dramatically increase access several databases held various agencies community policy establishes rules govern disputes access granted dni final adjudicator resolve disputes organizations also established intelligence information integration program i2p leadership then-cio patrick gorman nsa-cio dr. prescott winter goal i2p create shared infrastructure family shared services means increase information access sharing collaboration throughout us intelligence community mcconnell led effort create integrated planning programming budgeting system fully integrate optimize capabilities intelligence community previously agency budget developed independently aggregated congress issuance icd106 strategic enterprise management ic sem intelligence community budget closely aligned strategic goals objectives requirements performance criteria icd 106 replaced icd 116 2011 early april 2010 admiral mcconnell called expanding powers dni giving tenure creating department intelligence dni oversee fully control settle continued fighting amongst agencies within various departments
Computer security
sap converged cloud sap converged cloud private managed cloud developed marketed sap set cloud computing services offers managed private cloud based openstack technology-based public cloud used sap organization internal resources create mix different cloud computing environments made openstack services offers compute storage platform services accessible sap 2012 sap promoted aspects cloud computing october 2012 sap announced platform service offering called sap cloud platform may 2013 managed private cloud offering called s/4hana enterprise cloud service announced sap converged cloud announced january 2015 sap converged cloud managed sap business unit established 2015 named converged cloud unit headed markus riedinger unit manager converged cloud beta went live may 2017 included openstack technology-based storage compute network components shared new services made sap later designate dns service added well 2017 year sap charged superior cloud innovation customers sizes sap s/4hana cloud sap ariba sap successfactors sap cloud applications customers access complete portfolio cloud-based solutions support digital transformation journeys june 7 2017 sap announced company plans invest 1 billion cloud next two years business organizations want use cloud computing choice using private cloud cloud infrastructure run specifically single organization built third-party public cloud whereby service provider makes available applications storage resources general public decision use based number factors whether company operates highly regulated sector pharmaceuticals industry must comply rules regarding control security data business must bring services market quickly web applications developer first would opt private cloud security peace mind web developer would choose public cloud offering companies would operate mixture two also known hybrid cloud delivery employing hybrid delivery cloud strategy lets organizations use different cloud delivery services specific applications instance public cloud may cost-effective service compute-intensive task processing analytics data would remain local private comply regulations hybrid delivery strategy lets organizations run applications services across different clouds collocation data centers example benefit delivery mechanism organizations move app one geographic location another major storms different types hybrid clouds specific tasks infrastructure service iaas model hybrid cloud could use operating systems virtualization technologies public private cloud infrastructure provide cloud services models mix on-premises cloud public cloud technologies include platform service paas includes infrastructure services combined development tools middleware software service saas used develop packaged software however moving data cloud difficult procedure case software service saas difficult particularly incumbent cloud provider used proprietary software altered open source application way mitigate cloud migration difficulties architect applications cloud reduce eliminate dependencies cloud application stack capabilities cloud service provider another way select generic higher-level applications move cloud first place another method select open standards cloud computing best practice avoiding cloud migration problems use management platform support applications environment user organization likely use described using best-of-breed approach companies engage cloud professional services consultants help plan incorporate cloud services business operations consultants advise businesses whether use public private hybrid delivery model implement consume delivery models example cloud professional services consultants might recommend businesses interested cost savings place appropriate applications public cloud keep higher-security application private cloud hybrid cloud 2013 competitive vendor analysis report international data corporation market research firm authors state cloud professional services help companies map short-term long-term strategy use cloud way aids business goals common reason businesses engage cloud professional services assistance incorporating cloud technology existing environments plan implement cloud according study published february 2014 independent research firm technology business research inc according published reports use cloud professional services indicates businesses adequate internal resources knowledgeable implementing cloud sap converged cloud follows premise converged infrastructure integration compute storage networking components technologies self-provisioning pools shared resources supported services one benefits data center based converged infrastructure including converged infrastructure data center delivers cloud services manual tasks automated thus reducing time cost carry sap converged cloud supporting vmware hypervisors supports multiple operating systems microsoft red hat ubuntu etc supports wide range development environments based openstack technology means compatible public cloud platforms based openstack technology rackspace nebula sap converged cloud consultants work sap users help configure best cloud approach users receive advice implement cloud consistent manner get value cloud investment users also receive advice manage cloud sap cloud marketing—delivers information possible uses cloud services solutions identifies opportunities begin implementing cloud sap converged cloud includes security features businesses connect private cloud on-site network using software-defined networking technology multiple copies virtual lan vlan supplied providing method businesses connect firewall on-site network converged cloud appearing part on-site network backup service load balancing using f5 networks allows service load balancing across virtual servers cloud storage data stored off-site file systems server operating systems sap retains local backups postgresql swift containers 30 days user organizations choose 50gb 100gb one-terabyte blocks storage area network san storage server nodes high-availability clustering added instances microsoft windows server red hat enterprise linux suse linux enterprise server sap converged cloud service solution sap hana private service developed sap sap hana in-memory database migration services businesses want move sap hana platform system designed enable businesses analyze big data november 2016 sap opened walldorf first data centers host converged cloud according published reports data centers provide disaster recovery services high availability
Distributed computing architecture
cyber resilience cyber resilience refers entity ability continuously deliver intended outcome despite adverse cyber events cyber resilience evolving perspective rapidly gaining recognition concept essentially brings areas information security business continuity organizational resilience together entities potential need cyber resilience abilities include limited systems critical infrastructure business processes organizations societies nation-states adverse cyber events negatively impact availability integrity confidentiality networked systems associated information services events may intentional e.g cyber attack unintentional e.g failed software update caused humans nature combination thereof objective cyber resilience maintain entity ability deliver intended outcome continuously times means even regular delivery mechanisms failed crisis security breach concept also includes ability restore regular delivery mechanisms events well ability continuously change modify delivery mechanisms needed face new risks backups disaster recovery operations part process restoring delivery mechanisms resilience defined presidential policy directive ppd-21 ability prepare adapt changing conditions withstand recover rapidly disruptions cyber resilience focuses preventative detective reactive controls information technology environment assess gaps drive enhancements overall security posture entity cyber resilience review crr one framework assessment entity resiliency created department homeland security another framework created symantec based 5 pillars prepare/identify protect detect respond recover national institute standards technology special publication 800-160 volume 2 offers framework engineering secure reliable systems—treating adverse cyber events resiliency security issues particular 800-160 identifies fourteen techniques used improve resiliency cyber security consists technologies processes measures designed protect systems networks data cyber crimes effective cyber security reduces risk cyber attack protects entities organisations individuals deliberate exploitation systems networks technologies cyber resilience looks wider scope comprises cyber security business resilience cyber security effective without compromising usability systems robust continuity business plan resume operations cyber attack successful cyber resilience helps businesses recognize hackers advantage innovative tools element surprise target successful attempt concept helps business prepare prevent respond successfully recover intended secure state cultural shift organization sees security full-time job embedded security best practices day-to-day operations comparison cyber security cyber resilience requires business think differently agile handling attacks
Computer security
computer compatibility family computer models said compatible certain software runs one models also run models family computer models may differ performance reliability characteristic differences may affect outcome running software software compatibility refer compatibility particular software running particular cpu architecture intel powerpc software compatibility also refer ability software run particular operating system rarely compiled software compatible multiple different cpu architectures normally application compiled different cpu architectures operating systems allow compatible different system interpreted software hand normally run many different cpu architectures operating systems interpreter available architecture operating system software incompatibility occurs many times new software released newer version operating system incompatible older version operating system may miss features functionality software depends hardware compatibility refer compatibility computer hardware components particular cpu architecture bus motherboard operating system hardware compatible may always run highest stated performance nevertheless work legacy components example ram chips run lower sometimes higher clock rate rated hardware designed one operating system may work another device kernel drivers unavailable example much hardware mac os x proprietary hardware drivers unavailable use operating systems linux
Computer architecture
device driver synthesis verification device drivers programs allow software higher-level computer programs interact hardware device software components act link devices operating systems communicating systems executing commands provide abstraction layer software also mediate communication operating system kernel devices usually operating systems comes support common device drivers usually hardware vendors provide device driver hardware devices platforms aggressive scaling hardware devices complex software components made device driver development process cumbersome complex size functionality drivers started increasing device drivers became key factor defining reliability system created incentive towards automatic synthesis verification device drivers article sheds light approaches synthesis verification device drivers device drivers principal failing component systems berkeley open infrastructure network computing boinc project found os crashes predominantly caused poorly written device driver code windows xp drivers account 85 reported failures linux kernel 2.4.1 device driver code accounts 70 code size driver fault crash whole system running kernel mode findings resulted various methodologies techniques verification device drivers alternative develop techniques synthesize device drivers robustly less human interaction development process proper specification device operating systems lead reliable drivers motivation driver synthesis large number flavors operating systems device combinations set input/output control specifications makes support hardware devices operating systems difficult ability use device operating system requires availability corresponding device driver combination hardware vendors usually supply drivers windows linux mac os due high development porting costs technical support difficulties unable provide drivers platforms automated synthesis technique help vendors providing drivers support devices operating system two challenges limit testing device drivers wave verification device drivers initiated microsoft slam project early year 2000 motivation project 500,000 crashes reported day found caused one video driver leading concern great vulnerability using complex device drivers details found speech delivered bill gates large number static runtime techniques since proposed bug detection isolation static analysis means analyzing program check whether complies safety-critical properties specified example system software conform rules check user permissions writing kernel data structures n't reference null pointer without check prohibit overflowing buffer size etc checks made without actually executing code checked using traditional testing process dynamic execution requires writing many test cases exercise paths drive system error states process take long time effort practical solution another theoretically possible approach manual inspection impractical modern systems millions lines code involved making logic complex analyzed humans rules straightforward mapping source code checked using compiler rule violations found checking source operation make sense example rules like enabling interrupt disabled checked looking order function calls source code type system specify rules semantics compilers catch errors kind many type-safe languages allow memory safety violations resulting unsafe type casting detected compiler another approach use meta-level compilation mc metacompilers constructed purpose may extend compilers lightweight system specific checkers optimizers extensions need written system implementers high level language dynamically linked compilers strict static analysis software model checking algorithmic analysis programs prove properties executions automates reasoning program behavior respect given correct specifications model checking symbolic execution used verify safety-critical properties device drivers input model checker program temporal safety properties output proof program correct demonstration exists violation specification means counterexample form specific execution path tool sdv static driver verifier microsoft uses static analysis windows device drivers back end analysis engine slam used model checking symbolic execution compile time static verification rules observed drivers api specified c like language slic specification language interface checking analysis engine finds paths lead violations api usage rules presented source level error paths driver source code internally abstracts c code boolean program set predicates rules observed program uses symbolic model checking validate predicates boolean program model checker blast berkeley lazy abstraction software verification tool used find memory safety incorrect locking errors linux kernel code uses abstraction algorithm called lazy abstraction build model driver c code successful verifying temporal safety properties c programs 50k lines code also used determine change source code affects proof property previous version demonstrated windows device driver avinux another tool facilitates automatic analysis linux device drives built top bounded model checker cbmc exist fault localization methods find bug location model checking tools return long counter example trace hard find exact faulty location dynamic program analysis performed running program sufficient test inputs produce interesting behaviors safe drive low overhead system detecting recovering type safety violations device drivers 4 changes source code linux network drivers able implement safedrive give better protection recovery linux kernel similar project using hardware isolate device drivers main kernel nook place device drivers separate hardware protection domain called nooks separate permission setting pages making sure driver modify pages domain read kernel data since share address space another similar work area automatic recovery operating systems due driver faults minix 3 operating system isolate major faults defects detected failing components replaced fly alternative verification isolation faults deploy techniques device driver development process make robust given device specification operating system functions one method synthesize device driver device helps reduce human introduced errors well cost time involved developing system software synthesis methods rely form specification hardware device manufacturers operating system functions hardware operating code usually low level prone errors code development engineer rely hardware documentation typically contains imprecise inaccurate information several interface definition languages idl express hardware functionalities modern oses uses idls glue components hide heterogeneity like remote procedural call idl applies hardware functionalities well section discuss writing device drivers domain specific languages helps abstract low level coding use specific compilers generate code devil allows high level definition communication device hardware components expressed i/o ports memory-mapped registers specifications converted set c macros called driver code thus eliminates error induced programmer writing low level functions ndl enhancement devil describing driver terms operational interface uses devil interface definition syntax includes set register definitions protocols accessing registers collection device functions device functions translated series operations interface device driver generation one first write driver functionalities interface specification languages use compiler generate low level driver code hail hardware access interface language another domain-specific device driver specification language driver developer needs write following hail compiler takes inputs translates specification c code hardware software co-design designer specifies structure behavior system using finite state machines communicate among series testing simulation formal verification done state machines deciding components go hardware software hardware usually done field programmable gate arrays fpgas application specific integrated circuits asics whereas software part translated low-level programming language approach mostly applies embedded systems defined collection programmable parts interact continuously environment sensors existing techniques intended generating simple micro-controllers drivers standalone synthesis device system software done separately device modeled using hardware description language hdl software developer access hdl specifications hardware developers put forth device interface data sheet device data sheet driver developer extracts register memory layout device behavioral model form finite state machines expressed domain specific languages described interface language section final step involves generating code specifications tool termite takes three specifications generate driver given specifications termite generate driver implementation translates valid sequence os request sequence device commands due formal specification interfaces termite generate driver code holds safety liveness properties another interesting hacking effort done revnic generates driver state machine reverse engineering existing driver create inter-portable safe drivers new platforms reverse engineer driver wiretaps hardware i/o operations executing driver using symbolic concrete executions output wiretap fed synthesizer reconstructs control flow graph original driver multiple traces along boilerplate template corresponding device class using methods researchers ported windows drivers network interfaces linux embedded operating systems many static analysis tools widely used many driver synthesis verification tools seen widespread acceptance practice one reasons drivers tend support multiple devices driver synthesis work usually generates one driver per device supported potentially lead large number drivers another reason drivers also processing state machine model drivers depict processing various verification synthesis techniques surveyed article advantages disadvantages example runtime fault isolation performance overhead whereas static analysis cover classes errors complete automation device driver synthesis still early stages promising future research direction progress facilitated many languages available today interface specification eventually consolidate single format supported universally device vendors operating systems teams payoff standardization effort could realization completely automated synthesis reliable device drivers future
Operating systems
stuffit expander stuffit expander proprietary freeware closed source decompression software utility developed allume systems subsidiary smith micro software formerly known aladdin systems runs classic mac os macos microsoft windows prior 2011 linux version also available download latest version mac platform follows stuffit target criticism dissatisfaction mac users past file format changes frequently notably introduction stuffit version 5.0 expander 5.0 contained many bugs file format readable earlier version 4.5 leaving mac users time without viable compression utility latest stand-alone version windows 2009 13.0 unlike version 12.0 able decompress newer .sitx zip archives version 2009 claims able decompress 30 formats listed executables require .net v2.0 framework msvc 2008 9.0 runtimes previous stand-alone version able decompress .sit classic mac os-specific archives 7.02 distributed stuffit v7.0.x windows versions 7.5.x 11 expander capabilities actually performed stuffit standard edition allowed decompression even end trial period start stuffit expander mode following command line switches used -expand -uiexpander note registration reminder dialogue box shown case older versions stuffit expander classic mac os platform stuffit expander 3.5 possible enhance capabilities stuffit expander add support decompressing additional archive formats means shareware dropstuff expander enhancer software aladdin systems also command line dos application called unstuff v1.1 allows decompression .sit files stuffit expander 2009 decompresses files following formats
Computer file systems
ios 8 ios 8 eighth major release ios mobile operating system developed apple inc. successor ios 7 announced company worldwide developers conference june 2 2014 released september 17 2014 succeeded ios 9 september 16 2015. ios 8 incorporated significant changes operating system introduced continuity cross-platform mac iphone ipad system enables communication devices different product categories ability answer calls reply sms mac ipad continuity includes handoff feature lets users start task one device continue another changes included new spotlight suggestions search results feature provides detailed results family sharing family link together accounts share content one parent administrator permission controls updated keyboard quicktype providing contextual predictive word suggestions extensibility allows easier sharing content apps third-party developers got additional features integrate apps deeper operating system including support widgets notification center ability make keyboards users replace default ios keyboard app updates release included new health app aggregate data different fitness apps well enabling medical id accessible lock screen emergencies support icloud photo library photos app enables photos synchronized stored cloud icloud drive lets users store files cloud browse across devices ios 8.4 apple updated music app streaming service called apple music 24-hour radio station called beats 1 reception ios 8 positive critics praised continuity extensibility major features enabling easier control interaction different apps devices also liked quicktype keyboard word suggestions highlighted spotlight suggestions making iphone almost portable search portal everything however reviewers noted full potential ios 8 would realized third-party developers integrated apps support new features particularly widgets notification center roughly week release ios 8 reached 46 ios usage share october 2014 reported adoption rate stalled increasing single percentage point previous month situation blamed requirement high amount free storage space install upgrade especially difficult iphones sold 8 16 gigabytes maximum storage space following december ios 8 reached 63 usage share notable 16 increase october measurement ios 8 introduced company worldwide developers conference june 2 2014 first beta made available conference attendees keynote presentation ios 8 officially released september 17 2014. ios 8.0.1 released september 24 2014 first update ios 8 update meant bring various bug fixes however update withdrawn due issue disabled touch id cellular network connectivity models apple instead recommended affected users reinstall initial ios 8 release wait version 8.0.2 ready ios 8.0.2 released september 25 2014 day release ios 8.0.1 included fixes bugs present previous update ios 8.1 released october 20 2014 update introduced apple pay iphone 6 6 plus united states added icloud photo library beta status returned camera roll photos added continuity features enable iphone users read send sms mms ipad mac also introduced instant hotspot allowing mac users remotely activate personal hotspot feature nearby iphone ios 8.1.1 released november 17 2014 bug fixes performance improvements iphone 4s ipad 2. ios 8.1.2 released december 9 2014 fix issue ringtones purchased itunes store would removed ios device ios 8.1.3 released january 27 2015 update included bug fixes reduced amount storage space required perform ios update ios 8.2 released march 9 2015 update included support apple watch apple watch app iphone providing app store configuration options access health options units measurement well lots stability improvements bug fixes release ios 8.3 apple announced public beta testing program allowing consumers receive test upcoming versions ios software official general release ios 8.3 released april 8 2015 update included emoji improvements updated emoji keyboard picker organizes emoji categories new diversified emoji skin tone modifiers new languages siri support wireless carplay well major bug fixes improvements ios 8.4 released june 30 2015 update introduced apple music therefore overhauled existing music app apple music service ios 8.4 also relocated audiobooks music app ibooks app ios 8.4.1 released august 13 2015 various fixes apple music ios 8 introduced continuity cross-platform mac iphone ipad system enables communication devices different product categories continuity enables phone call functionality ipad mac calls routed iphone secondary device secondary device serves speaker phone also brings sms support ipad mac extension imessage feature previous versions continuity adds feature called handoff lets users start task one device continue another composing e-mail iphone continuing ipad sending mac order support handoff continuity macs needed os x yosemite operating system released october 2014 well support bluetooth low energy ios 8 introduced spotlight suggestions new search feature integrates many websites services show detailed search results including snippets wikipedia articles local news quick access apps installed device itunes content movie showtimes nearby places info various websites spotlight suggestions available ios home screen well safari web browser search bar drop-down notification center redesigned allow widget functionality third-party apps add widget support apps let users see information notification center without open respective app users add rearrange remove widgets time examples widgets include weather app showing current weather calendar app showing upcoming events notifications actionable allowing users reply message appears quick drop-down act notification notification center ios 8 includes new predictive typing feature called quicktype displays word predictions keyboard user types apple allows third-party developers make keyboard apps users replace default ios keyboard added privacy apple added settings toggle called allow full access optionally enables keyboard act outside app sandbox synchronizing keyboard data cloud third-party keyboards allowed use siri voice dictation secure text fields allow input ios 8 introduced family sharing allows 6 people register unique itunes accounts linked together one parent becoming administrator controlling overall experience purchases made one account shared family members purchases made kids 13 years age require parental approval purchases made adults visible kids family sharing also extends apps shared album automatically generated photos app family member allowing everyone add photos videos comments shared place ask buy feature allows anyone request purchase items app store itunes store ibooks store well in-app purchases icloud storage administrator option either approve deny purchase multitasking screen shows list recently called favorited contacts feature turned settings ios 8 includes additional data roaming option settings european users allowing greater control data usage abroad siri personal voice assistant integrated shazam support asking siri song identify song playing wi-fi calling added allow mobile phone calls wi-fi mobile operator carriers enable voice-over-wi-fi functionality services camera app gets two new features time-lapse self-timer time-lapse records frames shorter intervals normal film frequencies builds movies showing events faster speed self-timer gives user option three-second ten-second countdown automatically taking photo ipads take pictures panoramic mode ios 8 added icloud photo library support photos app enabling photo synchronization different apple devices photos videos backed full resolution original formats feature almost meant lower-quality versions photos could cached device rather full-size images potentially saving significant storage space models limited storage availability photos app received better search different search categorization options including nearby one year ago favorites home based geolocation date photo capture additionally photos app gained precise editing controls including improved rotation one-touch auto-enhancement tools deeper color adjustments brightness contrast exposure shadows also option hide photo without deleting apple added extensibility feature ios 8 allows filters effects third-party apps accessed directly within menu standard photos app rather import export photos respective app apply effects initial release ios 8 apple removed camera roll feature photos app camera roll overview photos device replaced recently added photo view displaying photos recently user captured despite replaced recently added album removal camera roll sparked user complaints apple returned feature ios 8.1 update ios 8 messages gets new features group conversations including disturb mode disables conversation notifications well ability remove participants chat new tap talk chat button lets users send quick voice comments recipient record button allows users record short videos interaction two apple users messages app allows users send short picture video audio clips 2-minute expiration time settings app user option messages automatically deleted certain time period safari web browser developers add support safari password sharing allows share credentials sites apps potentially cutting number times users need type credentials apps services browser also adds support webgl graphics api similar style file manager icloud drive file hosting service enabled settings lets users save kind file app media synchronized ios devices well mac ios 8 apple updated app store explore tab providing improved app discovery trending searches search tab ability developers bundle multiple apps single discounted package new preview videos allow developers visually show app function healthkit service allows developers make apps integrate new health app health app primarily aggregates data fitness apps installed user device except steps flights climbed tracked motion processor user iphone users enter medical history medical id accessible lock screen case emergency homekit serves software framework lets users set iphone configure communicate control smart-home appliances designing rooms items actions homekit service users enable automatic actions house simple voice dictation siri apps manufacturers homekit-enabled devices required purchase license homekit products required encryption co-processor equipment manufactured without homekit-support enabled use gateway product hub connects devices homekit service passbook app ios 8 updated include apple pay digital payment service available iphone 6 6 plus release ios 8.1 new music streaming service apple music introduced ios 8.4 update allows subscribers listen unlimited number songs on-demand subscriptions release music service standard music app ios revamped visually functionally include apple music well 24-hour live radio station beats 1 notes received rich text editing support ability bold italicize underline text image support allowing users post photos app weather app uses weather data weather channel instead yahoo app also received slight changes user interface ios 8 added new tips app shows tips brief information features ios weekly basis ios 8 allows touch id used third-party apps ios 8 received positive reviews brad molen engadget highlighted continuity major advancement users multiple apple devices also praised extensibility feature allowing apps share data liked support third-party keyboards however molen noted new introductions family sharing continuity icloud drive require diving apple ecosystem work particularly enjoyed actionable notifications third-party widget support notification center charles arthur guardian also liked extensibility well new quicktype word suggestions functionality ios keyboard criticized lack option choosing default apps also criticized settings menu confusing unintuitive darrell etherington techcrunch praised improvements imessage writing best ability mute leave group conversations something ’ sorely missing since introduction group imessage conversations liked new search editing features photos quicktype feature keyboard particularly highlighted spotlight suggestions one better features ios 8 even ’ small service addition noting makes iphone almost portable search portal everything martin bryant next web wrote real advances yet come adding apple included demonstrations done true power ’ hood realized coming days weeks months third-party developers gradually incorporate new features apps september 23 2014 roughly week release ios 8 user adoption ios 8 reached 46 october 2014 andrew cunningham ars technica reported ios 8 user adoption rate stalled climbing single percentage point since previous september measurement 46 cunningham blamed over-the-air update requiring 5 gigabytes install unusually large amount may posed challenges using 8 gigabyte 16 gigabyte devices alternative apple offered update via itunes software cunningham noted itunes hookup going even way days years ago least apple spent last three years coaching people use idevices independently computers december new report ars technica stated ios 8 usage increased 63 solid 16 percent study apteligent formerly crittercism found rate apps crashed tests 3.56 ios 8 higher 2 found ios 7.1 september 2014 ios 8.0.1 update caused significant issues touch id iphone 6 cellular network connectivity models apple stated affected users reinstall initial ios 8 release version 8.0.2 ready ios 8.0.2 released one day 8.0.1 fix issues caused 8.0.1 update forbes published several articles focusing problems ios 8 regarding wi-fi battery bluetooth calendar may 2015 news outlets reported bug receiving text message specific combination symbols arabic characters caused messages application crash iphone reboot bug named effective power could potentially continuously reboot device message visible lock screen flaw exploited purpose trolling intentionally causing others phones crash bug fixed ios 8.4 update released june 2015 september 2014 hoax apple advertisement alleged feature called wave ios 8 circulated twitter promised users would able recharge iphone heating microwave oven feature exist media cited numerous people reporting twitter destroyed iphone following procedure described advertisement release apple dropped support iphone 4
Operating systems
screening router screening router performs packet-filtering used firewall cases screening router may used perimeter protection internal network entire firewall solution
Computer security
movddup x86 assembly programming language movddup name specific action performable modern x86 processors 3rd-generation streaming simd extensions sse3 action involves copying number temporary space processor use computations specifically movddup causes one double-precision floating-point source copied lower half upper half xmm register source operand either xmm register xmm2 memory address m64 source operand xmm register lower half register used operation source operand memory address assumed address 8-byte region value used operation destination operand must xmm register xmm1 x86 instruction listings
Computer architecture
route poisoning route poisoning method prevent router sending packets route become invalid within computer networks distance-vector routing protocols computer networks use route poisoning indicate routers route longer reachable considered routing tables unlike split horizon poison reverse route poisoning provides sending updates unreachable hop counts immediately nodes network protocol detects invalid route routers network informed bad route infinite ∞ route metric makes nodes invalid route seem infinitely distant preventing routers sending packets invalid route distance-vector routing protocols rip use maximum hop count determine many routers traffic must go reach destination route hop count number assigned incremented routing information passed router router route considered unreachable hop count exceeds maximum allowed route poisoning method quickly forgetting outdated routing information router routing tables changing hop count unreachable higher maximum number hops allowed sending routing update case rip maximum hop count 15 perform route poisoning route hop count changed 16 deeming unreachable routing update sent updates lost nodes network would informed route invalid could attempt send packets bad route cause problem known routing loop therefore route poisoning used conjunction holddowns keep update messages falsely reinstating validity bad route prevents routing loops improving overall efficiency network
Internet protocols
amazon simpledb amazon simpledb distributed database written erlang amazon.com used web service concert amazon elastic compute cloud ec2 amazon s3 part amazon web services announced december 13 2007 ec2 s3 amazon charges fees simpledb storage transfer throughput internet december 1 2008 amazon introduced new pricing free tier 1 gb data 25 machine hours transfer amazon web services free charge simpledb provides eventual consistency weaker form consistency compared database management systems often considered limitation harder reason makes harder write correct programs make use simpledb limitation result fundamental design trade-off foregoing consistency system able achieve two highly desirable properties component failures assumed inevitable thus properties deemed necessary order provide reliable web service cap theorem states possible system exhibit properties along consistency thus designers needed settle weaker form consistency published limitations conditional put conditional delete new operations added february 2010 address problem arises accessing simpledb concurrently consider simple program uses simpledb store counter i.e number incremented program must three things program runs programs access simpledb work correctly however often desirable software applications particularly web applications access data concurrently data accessed concurrently race condition arises would result undetectable data loss continuing previous example consider two processes b running program suppose simpledb services requests data described step 1 b b see value let say current value counter 0 steps 2 3 try store 1 b try thus final counter value 1 even though expected final counter value 2 system attempted two increment operations one another b problem solved use conditional put suppose change step 3 follows instead unconditionally storing new value program asks simpledb store new value value currently holds value retrieved step 1 sure counter value actually increases introduces additional complexity simpledb able store new value current value expected program must repeat steps 1-3 conditional put operation actually changes stored value consistent read new feature released time conditional put conditional delete name suggests consistent read addresses problems arise due simpledb eventual consistency model see limitations section consider following sequence operations simpledb eventual consistency guarantee allow us say data retrieved step 2 reflects updates made step 1 eventual consistency guarantees step 2 reflects complete set updates step 1 none updates consistent read used ensure data retrieved step 2 reflect changes step 1 reason inconsistent results arise consistent read operation used simpledb stores data multiple locations availability new data step 1 might written locations simpledb receives data request step 2 case possible data request step 2 serviced one locations new data written amazon discourages use consistent read unless required correctness reason recommendation rate consistent read operations serviced lower regular reads talk simpledb superseded dynamodb longer iterated though amazon plan remove dynamodb appears successor
Databases
internet explorer 7 windows internet explorer 7 ie7 codenamed rincon web browser windows released microsoft october 2006 internet explorer 7 part long line versions internet explorer first major update browser 5 years default browser windows vista windows server 2008 replace internet explorer 6 windows xp windows server 2003 unlike version 6 version support windows nt 4.0 windows 98 windows 98 se windows 2000 windows portions underlying architecture including rendering engine security framework improved new features include tabbed browsing page zooming integrated search box feed reader better internationalization improved support web standards although pass acid2 acid3 tests security enhancements include phishing filter stronger encryption windows vista 256-bit 128-bit xp delete browsing history button easily clear private data also first version internet explorer branded marketed name 'windows instead 'microsoft ie7 shipped default browser windows vista windows server 2008 offered replacement internet explorer 6 windows server 2003 windows xp ie7 superseded internet explorer 8 march 2009 2001 microsoft released internet explorer 6 update windows 98 second edition windows windows nt 4.0 service packs 6 windows 2000 included default windows xp release ie6 service pack 1 2003 microsoft announced future upgrades internet explorer would come future upgrades windows stating improvements ie require enhancements underlying os february 15 2005 rsa conference san francisco microsoft chairman bill gates announced microsoft planning new version internet explorer would run windows xp dean hachamovitch general manager internet explorer team cited needed security improvements primary reason new version first beta ie7 released july 27 2005 technical testing first public preview version internet explorer 7 beta 2 preview pre-beta 2 version released january 31 2006 final public version released october 18 2006 day yahoo provided post-beta version internet explorer 7 bundled yahoo toolbar yahoo -specific customizations late 2007 microsoft announced ie7 would included part windows xp sp3 internet explorer 6 7 receiving updates pc manufacturers however pre-installed internet explorer 7 well 8 new xp pc especially netbooks october 8 2007 microsoft removed windows genuine advantage component ie7 allowing downloaded installed without genuine copy windows within year ie7 release end 2006 end 2007 support calls microsoft decreased 10-20 december 16 2008 security flaw found internet explorer 7 exploited crackers steal users passwords following day patch issued fix flaw estimated affected around 10,000 websites estimates ie7 global market share 1.5-5 version internet explorer renamed microsoft internet explorer windows internet explorer part microsoft rebranding components included windows internet explorer 7 introduces windows rss platform tightly integrated subscribe rss atom feeds synchronize update schedule display built-in style sheet version 7 intended defend users phishing well deceptive malicious software also features full user control activex better security framework including integrated much windows previous versions thereby increasing security unlike previous versions internet explorer activex control hosted windows explorer process rather runs process also includes bug fixes enhancements support web standards tabbed browsing tab preview management multiple-engine search box web feeds reader internationalized domain name support idn antiphishing filter october 5 2007 microsoft removed 'genuine software validation install means versions windows whether able pass validation able install browser integrated search box supports opensearch windows vista internet explorer operates special protected mode runs browser security sandbox write access rest operating system file system running protected mode ie7 low integrity process gain write access files registry keys outside low-integrity portions user profile feature aims mitigate problems whereby newly discovered flaws browser add-ons hosted inside allowed crackers subversively install software user computer typically spyware microsoft addressed security issues two distinct ways within windows vista user account control forces user confirm action could affect stability security system even logged administrator protected-mode ie runs web browser process much lower permissions user first vulnerability exclusive internet explorer 7 posted 6 days january 12 2016 new microsoft lifecycle support policy internet explorer went effect wepos became remaining supported os ie7 support continued wepos reached eol april 12 2016 making april 2016 security update last ever public update ie7 users criticised phishing filter easy circumvent one successful method bypassing internet explorer phishing filter reported redirecting blacklisted web page another non-blacklisted page using server-side redirect new page blocked well attack remain active flaw means phishers keep links previous emails functioning simply moving new server original web page blacklisted adding redirect criticised doubly serious presence phishing filter may lull users false sense security filter bypassed phishing filter went developed renamed safety filter smartscreen microsoft development internet explorer 8 internet explorer 7 adds support per-pixel alpha transparency png well minor improvements html css dom support microsoft stated goal version 7 fix significant bugs areas caused trouble developers however full compatibility standards postponed internet explorer 7 additionally features update wininet api new version better support ipv6 handles hexadecimal literals ipv6 address also includes better support gzip deflate compression communication web server compressed thus require less data transferred internet explorer protected mode support wininet exclusive windows vista although internet explorer 7 compliant previous versions according figures remains least standards-compliant compared major browsers period pass acid2 acid3 tests two test cases designed web standards project verify css compliance 2008 msnbc article tim berners-lee said lack support internet explorer responsible holding back widespread adoption webmasters several new open technology standards specifically scalable vector graphics svg supported elsewhere since 2001 available internet explorer using 3rd party plugin release internet explorer 9 ie7 requires least
Operating systems
mlx software mlx series machine language entry utilities published magazines compute compute gazette well books compute publications programs designed allow relatively easy entry type-in machine language listings often included publications versions available commodore 64 pet vic-20 atari 8-bit family apple ii mlx introduced december 1983 issue compute versions commodore 64 atari 8-bit family followed january 1984 issue compute gazette version vic-20 8k expansion march 1984 issue tiny mlx version unexpanded vic-20 versions mlx shared format consisting six data bytes decimal format plus seventh byte served checksum although line began memory address bytes separated commas typed program auto-incremented address automatically printed comma delimiters every three characters invalid keystrokes filtered line completely typed automatically verified checksum value matched user would prompted next line warning buzzer would sound invalid input would discarded user could retype line commodore version beginning may 1984 issue compute several keyboard keys redefined create makeshift numeric keypad mlx listings reserved relatively long machine language programs speedscript shorter programs often printed form basic loaders used codice_1 statements codice_2 code memory although original mlx efficient entry method basic loaders codice_1 statements number issues foremost among codice_2d data entered directly affected area memory since many machine language programs located partially entirely basic ram area meant user manually adjust pointers top bottom basic ram using codice_2 statements provided article running mlx keep entry program encroaching code vice versa program entered multiple sittings done time also decimal storage required seven keystrokes two bytes entered taking account checksums furthermore many transposition errors overlooked original mlx unsophisticated checksum algorithm new version mlx introduced apple ii june 1985 issue version used 8-byte-per-line hexadecimal format sophisticated hash algorithm implemented catch errors overlooked original failing notice substitution 0xff 0x00 improved layout hashing backported commodore 64 version also added editor buffer located single location memory removing need codice_2 memory locations startup new version known title screen mlx ii otherwise simply new mlx first appeared december 1985 issue compute appeared compute gazette following month replacement version mlx continued used compute gazette switched disk-only format december 1993
Computer architecture
phantasie video game phantasie first video game phantasie series based isle gelnor phantasie allows group six characters adventure countryside try defeat evil black knights sorcerer leader nikademus players could choose one six character classes thief fighter ranger monk priest wizard could also choose races human dwarf halfling elf gnome selecting random one could also choose ogre troll pixie gnoll orc lizard man minotaur races game notable taking advantage broad mix styles game town window allowed purchasing various shops top-down style dungeon crawl view top-down world map separate combat window character class unique fighting styles options characters could choose strategy particular round turn-based combat segments combat experience awarded players would return town purchase levels qualified 50,000 copies sold north america phantasie successful ssi company best-selling commodore game late 1987 game reviewers hartley pattie lesser 1987 complimented atari st version phantasie role computers column dragon 120 1987 recommending atari st owners consider phantasie game well-worth attention analog computing 1988 called phantasie sequel best fantasy role-playing games atari 8-bit 1991 1993 computer gaming world scorpia called phantasie surprisingly good little game many interesting features phantasie phantasie iii questron ii later re-released together reviewed 1994 dragon 203 sandy petersen eye monitor column petersen gave compilation 2 5 stars
Computer architecture
plot hack america plot hack america putin cyberspies wikileaks tried steal 2016 election non-fiction book malcolm nance author describes russian interference 2016 united states elections published paperback audiobook e-book formats 2016 skyhorse publishing second edition also published year third edition 2017 nance researched russian intelligence working russian interpreter studying kgb history nance described black propaganda warfare known active measures rt russia today sputnik news recounts vladimir putin kgb rise details trump campaign ties russia nance concludes putin managed cyberattack hacker groups cozy bear fancy bear wall street journal placed book list best-selling books week february 19 2017 seventh place category nonfiction e-books new york journal books called essential primer anyone wanting fully informed unprecedented events surrounding 2016 u.s. presidential election napa valley register described nance work best book subject huffington post remarked putin played game thrones election newsweek wrote problem disinformation tactics time debunked public already consumed falsehoods book dedicated u.s. army officer humayun khan begins foreword spencer ackerman nance details russian interference 2016 u.s. elections describes march 2016 democratic national committee dnc servers hacked someone seeking opposition research donald trump nance learnt hacker guccifer 2.0 would release hacked dnc materials nance gives context including trump motivations run president made fun 2011 white house correspondents association dinner criticism barack obama entry 2016 race white house nance discusses black propaganda techniques used russian federation characterizes rt russia today sputnik news agencies disinformation asserts putin intimately involved russian intelligence operation elect trump directing entire covert operation trump agents putin assets nance delves links trump associates russian officials asserting multiple agents trump assets putin providing access trump nance identifies putin strategy electing trump u.s. president referred operation lucky-7 kremlin plan elect president describes multitask effort involving hacking dnc acquire personal information members well seek compromising material known kompromat battles cyber bears describes two hacker entities tied russian intelligence cozy bear fancy bear cozy bear believed linked russian federal security service fsb foreign intelligence service svr fancy bear associated russian military intelligence agency gru nance describes russian intelligence attempted make releases leaked dnc emails appear deniable wikileaks russia intelligence laundromat likens use whistleblower website wikileaks money laundering nance asserts wikileaks willingly collaborated operation cyber bears attack describes impact podesta emails dnc email leaks 2016 clinton campaign finally cyberwar defend democracy nance reiterates u.s. target cyberwarfare russian intelligence agencies gru fsb directly ordered putin nance writes russia succeeded casting doubt citizens strength u.s. democracy posits u.s. populace large internalize future acts cyberwarfare dangerous attempts subvert daily life could lead actual war beginning research plot hack america nance gained counter-intelligence experience u.s. navy senior chief petty officer naval cryptology served 1981–2001 garnered expertise within fields intelligence counterterrorism author learned russian history interpreter russian began working intelligence field research history soviet union spying agency kgb devoted years research analyzing foreign relations russia prior analyzing russian interference 2016 u.s. elections nance background counter-intelligence analysis included management think tank called terror asymmetrics project strategy tactics radical ideologies consisting central intelligence agency military intelligence officers direct prior field experience nance books counter-terrorism include end al-qaeda terrorist recognition handbook terrorists iraq defeating isis hacking isis nance began work plot hack america incidentally already engaged writing hacking isis course research hacking isis discovered computer hacking germany legislative body bundestag french television station tv5monde time hacks thought caused isis instead traced back russian hacking group cyber bears nance knew russian intelligence gru operated group realized attribution isis false flag operation throw investigators trail gave nance prior knowledge russian intelligence tactics cyber bears infiltrate servers purposes disrupting government case germany injecting propaganda case france 2016 hack dnc apparent nance identical foreign agency carried attack gru nance suspicions borne accurate security firm crowdstrike determined cozy bear fancy bear behind attack nance saw akin watergate scandal albeit virtual attack instead physical break-in democratic facilities nance told c-span majority working life identified member u.s. republican party describing colin powell school republicanism plot hack america written desire intelligence expert document background behind attack foreign power u.s. democratic institutions nance realized gravity attack considered operation must sanctioned managed former kgb officer vladimir putin nance member board directors international spy museum washington d.c work museum nance befriended former kgb general oleg kalugin advised kgb always kgb nance considered putin objectives would simply harm hillary clinton actually attempt achieve ascendancy donald trump u.s. president plot hack america first published online format september 23 2016 day united states intelligence community assessments russian interference 2016 united states elections delivered president barack obama appendix book notes timing points many conclusions included consensus opinion principal three intelligence agencies nsa cia fbi identical plot hack america first paperback format published october 10 2016 second edition released year addition ebook format another edition published 2017 along audiobook narrated gregory itzin author subject hecklers appeared event discuss work books books miami florida 2017 book commercial success wall street journal placed plot hack america list best-selling books week february 19 2017 7th place category nonfiction e-books book included reading course political science pasadena city college review new york journal books michael lipkin effusive writing malcolm nance plot hack america essential primer anyone wanting fully informed unprecedented events surrounding 2016 u.s. presidential election lipkin wrote author expertise subject matter patriot highly experienced respected intelligence expert bringing bear deep extensive knowledge conclusions perhaps one important developments american history lawrence swaim gave nance work favorable reception book review napa valley register wrote quick read present easily best book subject swaim recommended resources back book writing ’ really killer nance book appendix contains extremely revealing assessments made american intelligence agencies presented unclassified format kenneth j. bernstein wrote daily kos convince read important book echoed warning conclusion dangers posed cyberwarfare bernstein wrote book argumentation strengthened every single assertion nance offers backed material ... clearly documented end notes bernstein wrote favorably addition book foreword guardian editor national security spencer ackerman italian language newspaper la stampa called book molto bello writing independent andy martin commented suppose weak spot subtitle word 'tried surely 'try maclean wrote plot hack america prescient russia ’ meddling 2016 u.s election brian lamb founder retired ceo c-span commented book titled choice seemed political nature strategic finance noted nance focuses new hybrid cyber warfare kompromat uses cyber assets way attack political enemies techgenix journalist michael adams wrote nance provides in-depth analysis issue characterized multiple commentators national controversy rivalling watergate scandal adams called book engaging tale espionage including context russian intelligence background vladimir putin kgb voice america commented nance capably outlined evidence book fears russian foreign manipulation 2016 election bob burnett wrote huffington post nance described game thrones strategem vladimir putin using donald trump tool embarrass hillary clinton barack obama burnett observed nance posited trump putin play trump avarice narcissism jeff stein newsweek wrote power disinformation tactics described nance book genius technique correction takes days weeks catch fiction gullible masses digested fabrications truth plot hack america published october 2016 nance interviewed april 2017 c-span book impact media operations american society argued russia today actions back notion black propaganda operations effective referencing impact disinformation operations nance cited research senate intelligence committee house intelligence committee director national intelligence russia today methods publishing propaganda propagating fake news traced larger problem echo chambers wherein false invented story sputnik news traveled bloggers breitbart news became believed factual trump administration officials eventually re-reported russia today falsely stating simply reporting events created white house author recalled c-span days soviet union soviet intelligence operation practice infiltrate manage reporting agencies communist party addition political figures right left perspectives order denigrate u.s. democratic interests nance warned russia control vladimir putin motivated identical initiative armed greater tools funding soviet union past lamented prior putin appointment prime minister russia boris yeltsin country taking steps towards democracy nance traced putin rise descent democracy russia favor oligarchy ruling class wealthy individuals managing autocratic society nance said u.s. citizens become agents russia employ russia today due naivete nature russian propaganda operations geared harm u.s. values civil liberties nance placed utilization propaganda russian intelligence agencies russia today outlets including social media part larger effort global cyberwarfare characterized form hybrid warfare blending traditional propaganda computer tools subversion media organizations case study cited aleksandr dugin russian neofascist political activist views favored putin whose tweets expound perspectives u.s democratic institutions successful
Computer security
shading language shading language graphics programming language adapted programming shader effects characterizing surfaces volumes objects language forms usually consist special data types like vector matrix color normal due variety target markets 3d computer graphics different shading languages developed shading languages used offline rendering produce maximum image quality material properties totally abstracted little programming skill hardware knowledge required kind shaders often developed artists get right look texture mapping lighting facets work processing shaders time-consuming computational power required expensive ability produce photorealistic results time production rendering run large computer clusters renderman shading language often referenced rsl sl short defined renderman interface specification common shading language production-quality rendering also one first shading languages ever implemented language defines six major shader types houdini vex vector expressions shading language often abbreviated vex closely modeled renderman however integration complete 3d package means shader writer access information inside shader feature usually available rendering context language differences rsl vex mainly syntactic addition differences regarding names several shadeop names gelato shading language like houdini vex closely modeled renderman differences gelato shading language rsl mainly syntactical — gelato uses semicolons instead commas separate arguments function definitions shadeops different names parameters open shading language osl developed sony pictures imageworks use arnold renderer also used blender cycles render engine osl surface volume shaders define surfaces volumes scatter light way allows importance sampling thus well suited physically-based renderers support ray tracing global illumination shading languages real-time rendering widespread provide higher hardware abstraction flexible programming model previous paradigms hardcoded transformation shading equations gives programmer greater control rendering process delivers richer content lower overhead shaders designed executed directly gpu became useful high throughput general processing stream programming model led development compute shaders running similar hardware see also gpgpu historically languages successful establishing maintaining strong market position short description languages follows opengl architecture review board established arb assembly language 2002 standard low-level instruction set programmable graphics processors high-level opengl shading languages often compile arb assembly loading execution unlike high-level shading languages arb assembly support control flow branching however continues used cross-gpu portability required also known glsl glslang standardized shading language meant used opengl language unifies vertex fragment processing single instruction set allowing conditional loops generally branches historically glsl preceded arb assembly language programming language cg developed nvidia designed easy efficient production pipeline integration language features api independence comes large variety free tools improve asset management development cg stopped 2012 language deprecated shader assembly language direct3d 8 9 main programming language vertex pixel shaders shader model 1.0/1.1 2.0 3.0 shader assembly language direct representation intermediate shader bytecode passed graphics driver execution shader assembly language directly used program unified shader model 4.0 4.1 5.0 5.1 although retains function representation intermediate bytecode debug purposes high-level shading language also called hlsl short c-style shader language directx 9 higher xbox game consoles similar nvidia cg supported directx xbox hlsl programs compiled bytecode equivalent directx shader assembly language hlsl introduced optional alternative shader assembly language direct3d 9 became requirement direct3d 10 higher shader assembly language deprecated adobe systems added pixel bender part adobe flash 10 api pixel bender could process pixel 3d-vertex data flash 11 introduced entirely new 3d api called stage3d uses shading language called adobe graphics assembly language agal offers full 3d acceleration support gpu acceleration pixel bender removed flash 11.8 agal low-level platform-independent shading language compiled example glsl sony announced pssl playstation shader language platform-specific shading language similar hlsl playstation 4 apple created low-level graphics api called metal runs macs made since 2012 iphones since 5s ipads since ipad air metal introduces shading language called metal shading language msl based c++14 implemented using clang llvm msl unifies vertex fragment compute processing
Programming language topics
ecc memory error-correcting code memory ecc memory type computer data storage detect correct most-common kinds internal data corruption ecc memory used computers data corruption tolerated circumstances scientific financial computing typically ecc memory maintains memory system immune single-bit errors data read word always data written even one bits actually stored flipped wrong state non-ecc memory detect errors although non-ecc memory parity support allows detection correction electrical magnetic interference inside computer system cause single bit dynamic random-access memory dram spontaneously flip opposite state initially thought mainly due alpha particles emitted contaminants chip packaging material research shown majority one-off soft errors dram chips occur result background radiation chiefly neutrons cosmic ray secondaries may change contents one memory cells interfere circuitry used read write hence error rates increase rapidly rising altitude example compared sea level rate neutron flux 3.5 times higher 1.5 km 300 times higher 10–12 km cruising altitude commercial airplanes result systems operating high altitudes require special provision reliability example spacecraft cassini–huygens launched 1997 contained two identical flight recorders 2.5 gigabits memory form arrays commercial dram chips thanks built-in edac functionality spacecraft engineering telemetry reported number correctable single-bit-per-word errors uncorrectable double-bit-per-word errors first 2.5 years flight spacecraft reported nearly constant single-bit error rate 280 errors per day however november 6 1997 first month space number errors increased factor four single day attributed solar particle event detected satellite goes 9 concern dram density increases thus components chips get smaller time operating voltages continue fall dram chips affected radiation frequently—since lower-energy particles able change memory cell state hand smaller cells make smaller targets moves technologies soi may make individual cells less susceptible counteract even reverse trend recent studies show single-event upsets due cosmic radiation dropping dramatically process geometry previous concerns increasing bit cell error rates unfounded work published 2007 2009 showed widely varying error rates 7 orders magnitude difference ranging 10 error/bit·h roughly one bit error per hour per gigabyte memory 10 error/bit·h roughly one bit error per millennium per gigabyte memory large-scale study based google large number servers presented sigmetrics/performance ’ 09 conference actual error rate found several orders magnitude higher previous small-scale laboratory studies 25,000 roughly 2.5 × 10 error/bit·h 70,000 roughly 7 × 10 error/bit·h 5 bit errors per 8 gigabytes ram per hour errors per billion device hours per megabit 8 dimm memory modules affected errors per year consequence memory error system-dependent systems without ecc error lead either crash corruption data large-scale production sites memory errors one most-common hardware causes machine crashes memory errors cause security vulnerabilities memory error consequences changes bit neither causes observable malfunctioning affects data used calculations saved 2010 simulation study showed web browser small fraction memory errors caused data corruption although many memory errors intermittent correlated effects memory errors greater would expected independent soft errors tests conclude isolation dram memory cells circumvented unintended side effects specially crafted accesses adjacent cells thus accessing data stored dram causes memory cell leak charges interact electrically result high cell density modern memory altering content nearby memory rows actually addressed original memory access effect known row hammer also used privilege escalation computer security exploits example single-bit error would ignored system error-checking would halt machine parity checking would invisibly corrected ecc single bit stuck 1 due faulty chip becomes changed 1 due background cosmic radiation spreadsheet storing numbers ascii format loaded character 8 decimal value 56 ascii encoding stored byte contains stuck bit lowest bit position change made spreadsheet saved result 8 0011 1000 binary silently become 9 0011 1001 several approaches developed deal unwanted bit-flips including immunity-aware programming ram parity memory ecc memory problem mitigated using dram modules include extra memory bits memory controllers exploit bits extra bits used record parity use error-correcting code ecc parity allows detection single-bit errors actually odd number wrong bits most-common error correcting code single-error correction double-error detection secded hamming code allows single-bit error corrected usual configuration extra parity bit double-bit errors detected chipkill ecc effective version also corrects multiple bit errors including loss entire memory chip seymour cray famously said parity farmers asked left cdc 6600 later included parity cdc 7600 caused pundits remark apparently lot farmers buy computers original ibm pc pcs early 1990s used parity checking later ones mostly many current microprocessor memory controllers including almost amd 64-bit offerings support ecc many motherboards particular using low-end chipsets ecc-capable memory controller detect correct errors single bit per 64-bit word unit bus transfer detect correct errors two bits per 64-bit word bios computers matched operating systems versions linux macos windows allows counting detected corrected memory errors part help identify failing memory modules problem becomes catastrophic dram chips include internal on-chip error correction circuits allow systems non-ecc memory controllers still gain benefits ecc memory systems similar effect may achieved using eos memory modules error detection correction edac depends expectation kinds errors occur implicitly assumed failure bit word memory independent resulting improbability two simultaneous errors used case memory chips one-bit wide typical first half 1980s later developments moved many bits chip weakness addressed various technologies including ibm chipkill sun microsystems extended ecc hewlett packard chipspare intel single device data correction sddc dram memory may provide increased protection soft errors relying error correcting codes error-correcting memory known ecc edac-protected memory particularly desirable high fault-tolerant applications servers well deep-space applications due increased radiation systems also scrub memory periodically reading addresses writing back corrected versions necessary remove soft errors interleaving allows distribution effect single cosmic ray potentially upsetting multiple physically neighboring bits across multiple words associating neighboring bits different words long single event upset seu exceed error threshold e.g. single error particular word accesses corrected e.g. single-bit error correcting code effectively error-free memory system may maintained error-correcting memory controllers traditionally use hamming codes although use triple modular redundancy tmr latter preferred hardware faster hamming error correction scheme space satellite systems often use tmr although satellite ram usually uses hamming error correction many early implementations ecc memory mask correctable errors acting error never occurred report uncorrectable errors modern implementations log correctable errors ce uncorrectable errors ue people proactively replace memory modules exhibit high error rates order reduce likelihood uncorrectable error events many ecc memory systems use external edac circuit cpu memory systems ecc memory use internal external edac systems external edac system designed correct certain errors internal edac system unable correct modern desktop server cpus integrate edac circuit cpu especially shift toward cpu-integrated memory controllers related numa architecture 2009 most-common error-correction codes use hamming hsiao codes provide single-bit error correction double-bit error detection sec-ded error-correction codes proposed protecting memory double-bit error correcting triple-bit error detecting dec-ted codes single-nibble error correcting double-nibble error detecting snc-dnd codes reed–solomon error correction codes etc however practice multi-bit correction usually implemented interleaving multiple sec-ded codes early research attempted minimize area delay overheads ecc circuits hamming first demonstrated sec-ded codes possible one particular check matrix hsiao showed alternative matrix odd weight columns provides sec-ded capability less hardware area shorter delay traditional hamming sec-ded codes recent research also attempts minimize power addition minimizing area delay many processors use error-correction codes on-chip cache including intel itanium xeon processors amd athlon opteron zen- zen+-based processors epyc epyc embedded ryzen ryzen threadripper dec alpha 21264. edc/ecc ecc/ecc two most-common cache error-protection techniques used commercial microprocessors edc/ecc technique uses error-detecting code edc level 1 cache error detected data recovered ecc-protected level 2 cache ecc/ecc technique uses ecc-protected level 1 cache ecc-protected level 2 cache cpus use edc/ecc technique always write-through stores level 2 cache error detected read level 1 data cache copy data recovered level 2 cache registered buffered memory ecc technologies perform different functions usual memory used servers registered allow many memory modules used without electrical problems ecc data integrity memory used desktop computers neither economy however unbuffered not-registered ecc memory available non-server motherboards support ecc functionality modules used cpu supports ecc registered memory work reliably motherboards without buffering circuitry vice versa ultimately trade-off protection unusual loss data higher cost ecc protects undetected memory data corruption used computers corruption unacceptable example scientific financial computing applications file servers ecc also reduces number crashes especially unacceptable multi-user server applications maximum-availability systems motherboards processors less critical application designed support ecc prices kept lower ecc-enabled boards processors able support unbuffered unregistered ecc also work non-ecc memory system firmware enables ecc functionality ecc ram installed ecc memory usually involves higher price compared non-ecc memory due additional hardware required producing ecc memory modules due lower production volumes ecc memory associated system hardware motherboards chipsets processors support ecc may also expensive ecc may lower memory performance around 2–3 percent systems depending application implementation due additional time needed ecc memory controllers perform error checking however modern systems integrate ecc testing cpu generating additional delay memory accesses long errors detected
Computer architecture
html5test html5test web application evaluating web browser accuracy implementing web standards html5 web sql database developed world wide web consortium well webgl standard developed mozilla foundation khronos group test suite developed dutch web programmer niels leenheer published march 2010 test web browser user must visit home page website html5test.com application returns integer score possible 555 points point total changed multiple times evolution software leenheer introduced present scoring system part major redesign test introduced november 2013 html5test evaluates browser support web storage w3c geolocation api html5-specific html elements including canvas element features evaluate browser conformance web standards cascading style sheets ecmascript scalable vector graphics document object model conformance testing standards within purview acid3 automated test published ian hickson 2008 similarly acid3 evaluate browser html5 conformance test scope html5test test scope acid3 mutually exclusive
Web technology
trashmail trashmail trashmail.net free disposable e-mail address service created 2002 stephan ferraro computer science student epitech paris belongs ferraro ltd service provides temporary email addresses abandoned start receiving email spam mainly forwards emails real hidden email address trashmail receives emails forwards real hidden email address account creation option set number total forwards date disposable email expires forwarded email counter decreased 1 counter reaches 0 date limit expired temporary email address deleted temporary email address deleted incoming email rejected smtp code 550 5.1.1 trashmail also provides free open-source add-on mozilla firefox available official store email registration community forum provided https ssl http access protect privacy additionally smtp server communication tls enabled many spammers rely harvested email addresses best method avoiding spam publish one real email address providing temporary address trashmail allows users protect real email trashmail differs disposable email address services possibility use challenge-response system free disposable email address additionally provides real-time spam stats main page possible verify current incoming spam amount site trashmail used homepage www.trashmail.net however api provided documented forum explains write custom software use free service following trashmail software written
Computer security
konrad zuse konrad zuse 22 june 1910 – 18 december 1995 german civil engineer computer scientist inventor businessman computer pioneer greatest achievement world first programmable computer functional program-controlled turing-complete z3 became operational may 1941 thanks machine predecessors zuse often regarded inventor modern computer zuse also noted s2 computing machine considered first process control computer founded one earliest computer businesses 1941 producing z4 became world first commercial computer 1943 1945 designed first high-level programming language plankalkül 1969 zuse suggested concept computation-based universe book rechnender raum calculating space much early work financed family commerce 1939 given resources nazi german government due world war ii zuse work went largely unnoticed united kingdom united states possibly first documented influence us company ibm option patents 1946 replica z3 well original z4 deutsches museum munich deutsches technikmuseum berlin exhibition devoted zuse displaying twelve machines including replica z1 several zuse paintings born berlin 22 june 1910 moved family 1912 east prussian braunsberg braniewo poland father postal clerk zuse attended collegium hosianum braunsberg 1923 family moved hoyerswerda passed abitur 1928 qualifying enter university enrolled technische hochschule berlin technical university berlin explored engineering architecture found boring zuse pursued civil engineering graduating 1935 time worked ford motor company using considerable artistic skills design advertisements started work design engineer henschel aircraft factory schönefeld near berlin required performance many routine calculations hand found mind-numbingly boring leading dream machine beginning 1935 experimented construction computers parents flat wrangelstraße 38 moving new flat methfesselstraße 10 street leading kreuzberg berlin working parents apartment 1936 produced first attempt z1 floating point binary mechanical calculator limited programmability reading instructions perforated 35 mm film 1937 zuse submitted two patents anticipated von neumann architecture finished z1 1938 z1 contained 30,000 metal parts never worked well due insufficient mechanical precision 30 january 1944 z1 original blueprints destroyed parents flat many neighbouring buildings british air raid world war ii 1987 1989 zuse recreated z1 suffering heart attack midway project cost 800,000 dm approximately 500,000 required four individuals including zuse assemble funding retrocomputing project provided siemens consortium five companies zuse completed work entirely independently leading computer scientists mathematicians day 1936 1945 near-total intellectual isolation 1939 zuse called military service given resources ultimately build z2 september 1940 zuse presented z2 covering several rooms parental flat experts deutsche versuchsanstalt für luftfahrt dvl i.e german research institute aviation z2 revised version z1 using telephone relays dvl granted research subsidies 1941 zuse started company zuse apparatebau zuse apparatus construction manufacture machines renting workshop opposite side methfesselstraße 7 stretching block belle-alliance straße 29 renamed renumbered mehringdamm 84 1947 improving basic z2 machine built z3 1941 12 may 1941 zuse presented z3 built workshop public z3 binary 22-bit floating point calculator featuring programmability loops without conditional jumps memory calculation unit based telephone relays telephone relays used machines largely collected discarded stock despite absence conditional jumps z3 turing complete computer however turing-completeness never considered zuse practical applications mind demonstrated 1998 see history computing hardware z3 first fully operational electromechanical computer partially financed german government-supported dvl wanted extensive calculations automated request co-worker helmut schreyer—who helped zuse build z3 prototype 1938—for government funding electronic successor z3 denied strategically unimportant work z4 could resumed immediately extreme privation post-war germany 1949 able resume work showed mathematician eduard stiefel swiss federal institute technology zurich eidgenössische technische hochschule eth zürich ordered one 1950 8 november 1949 zuse kg founded z4 delivered eth zurich 12 july 1950 proved reliable 1940 german government began funding aerodynamische versuchsanstalt ava aerodynamic research institute forerunner dlr used work production glide bombs zuse built s1 s2 computing machines special purpose devices computed aerodynamic corrections wings radio-controlled flying bombs s2 featured integrated analog-to-digital converter program control making first process-controlled computer machines contributed henschel werke hs 293 hs 294 guided missiles developed german military 1941 1945 precursors modern cruise missile circuit design s1 predecessor zuse z11 zuse believed machines captured occupying soviet troops 1945 working z4 computer zuse realised programming machine code complicated started working phd thesis containing groundbreaking research years ahead time mainly first high-level programming language plankalkül plan calculus elaborate example program first real computer chess engine 1945 luisenstadt bombing flew berlin rural allgäu unable hardware development continued working plankalkül eventually publishing brief excerpts thesis 1948 1959 work entirety however remained unpublished 1972 phd thesis submitted university augsburg rejected formal reasons zuse forgot pay 400 mark university enrollment fee rejection bother plankalkül slightly influenced design algol 58 implemented 1975 dissertation joachim hohmann heinz rutishauser one inventors algol wrote first attempt devise algorithmic language undertaken 1948 k. zuse notation quite general proposal never attained consideration deserved implementations followed 1998 2000 team free university berlin donald knuth suggested thought experiment might happened bombing taken place phd thesis accordingly published planned addition computing-related work described zuse began work 1956 high precision large format plotter demonstrated 1961 hanover fair became well known also outside technical world thanks frieder nake pioneering computer art work plotters designed zuse include zuse z90 zuse z9004 last years life zuse conceptualized created purely mechanical extensible modular tower automaton named helix tower helixturm structure based gear drive employs rotary motion e.g provided crank assemble modular components storage space elevating tube-shaped tower process reversible inverting input direction deconstruct tower store components deutsches museum restored zuse original 1:30 functional model extended height 2.7 m. zuse intended full construction reach height 120 envisioned use wind power generators radio transmission installations konrad zuse married gisela brandes january 1945 employing carriage dressed tailcoat top hat gisela wedding veil zuse attached importance noble ceremony son horst first five children born november 1945 zuse never became member nazi party known expressed doubts qualms working nazi war effort much later suggested modern times best scientists engineers usually choose either work less questionable business military interests faustian bargain pursuing line work according memoirs german computer pioneer heinz billing max planck institute physics published genscher düsseldorf meeting alan turing konrad zuse took place göttingen 1947 encounter form colloquium participants womersley turing porter england german researchers like zuse walther billing details see herbert bruderer konrad zuse und die schweiz retired focused hobby painting zuse atheist zuse died 18 december 1995 hünfeld hesse near fulda heart failure world war 2 zuse founded one earliest computer companies zuse-ingenieurbüro hopferau capital raised 1946 eth zurich ibm option zuse patents zuse founded another company zuse kg haunetal-neukirchen 1949 1957 company head office moved bad hersfeld z4 finished delivered eth zurich switzerland september 1950 time working computer continental europe second computer world sold beaten binac never worked properly delivered computers numbered leading z z43 built zuse company notable z11 sold optics industry universities z22 first computer memory based magnetic storage 1967 zuse kg built total 251 computers owing financial problems company sold siemens 1967 zuse also suggested universe running cellular automaton similar computational structure digital physics 1969 published book rechnender raum translated english calculating space idea attracted lot attention since physical evidence zuse thesis edward fredkin 1980s jürgen schmidhuber 1990s others expanded zuse received several awards work zuse institute berlin named honour konrad zuse medal gesellschaft für informatik konrad zuse medal zentralverband des deutschen baugewerbes central association german construction named zuse 100th anniversary birth computer pioneer celebrated exhibitions lectures workshops remember life work bring attention importance invention digital age movie revolves around world inside computer system features character named zuse presumably honour konrad zuse german posts dp ag issued commemorative stamp occasion june 6 2010 zuse portrait composed solely binary code numbers 1 0 fine print
Programming language topics
target disk mode target disk mode sometimes referred tdm target mode boot mode unique macintosh computers mac supports target disk mode started 't key held operating system boot instead mac firmware enables drives behave scsi firewire thunderbolt and/or usb-c external mass storage device mac booted target mode attached port computer mac pc appear external device hard drives within target mac example formatted partitioned etc. exactly like external drive computers also make internal cd/dvd drives internal external peripheral hardware available host computer target disk mode useful accessing contents mac booted operating system target disk mode preferred form old-computer new-computer interconnect used apple migration assistant migration assistant supports ethernet wired wi-fi tdm neither supports usb however thunderbolt-to-firewire thunderbolt-to-gigabit-ethernet usb-3.0-to-gigabit-ethernet adapters option one computers firewire thunderbolt apple introduced disk mode access original powerbook 100 continued offer subsequent powerbook series firewire-equipped macs long requisite software appeared system rom mac could booted disk mode originally called scsi disk mode special cable scsi system cable allowed original powerbook series attach desktop mac external scsi disk unique system control panel powerbook used select non-conflicting scsi id number host mac also made possible select disk startup control panel boot change ide drives starting powerbook 150 190 apple implemented hd target mode essentially enabled scsi disk mode translating external scsi commands via ata driver officially reserved apple portables powerbooks exclusively supported disk mode except 140 145 145b 150 170 however scsi disk mode implemented unofficially macintosh external scsi port suspending startup process interrupt switch long internal drives chain set different ids active host system devices apple dropped scsi interface starting agp power mac g4 “ pismo ” powerbook g3 firewire target disk mode replaced earlier disk mode implementation also receiving official support beyond laptops subsequent macs built-in firewire thunderbolt supports target disk mode 12-inch retina macbook early 2015 one expansion port usb-c port supports charging external displays target disk mode using target disk mode macbook requires cable supports usb 3.0 usb 3.1 either usb-a usb-c connector one end usb-c connector end macbook target computer computer placed tdm must host computer computer target disk mode booted computer plugged merely needs meet requirements external mass storage device using bus question access native mac formatted partitions boot volume desired support correct version hierarchical file system classic mac os means firewire 2.3.3 later mac os 8.6 later required use firewire target host computer may run microsoft windows possible shortcomings read mac hfs-formatted partitions extra drivers macdrive transmac macdisk hfsexplorer necessary users also must ensure computer possesses appropriate interface hardware order physically connect mac target mode macdrive also read-only option prevent accidental editing computer target disk mode however mode set hfs/hfs+ disk mounted addition hfs drivers apple bootcamp also become possible macs running windows read write hfs partitions without purchase software users separated drivers main bootcamp install also install windows computers host computers running linux also able read write mac hfs hfs+ formatted devices target disk mode working out-of-the-box distributions hfs+ support part linux kernel however filesystems checked errors shrinking moving partitions preferred use mac os
Operating systems
mdmx mdmx mips digital media extension also known madmax extension mips architecture released october 1996 microprocessor forum mdmx developed accelerate multimedia applications becoming popular common 1990s risc cisc systems mdmx defines new set thirty-two 64-bit registers called media registers mapped onto existing floating-point registers save hardware 192-bit extended product accumulator media registers hold two new data types octo byte ob quad half qh contain eight bytes 8-bit four halfwords 16-bit integers variants existing instructions operate data types performing saturating arithmetic logical shift compare align operations mdmx also introduced 19 instructions permutation manipulating bytes registers performing arithmetic accumulator accumulator access
Computer architecture
java metadata interface given metadata set descriptive structural administrative data group computer data example database schema java metadata interface jmi platform-neutral specification defines creation storage access lookup exchange metadata java programming language jmi specification developed java community process defined jsr 40 jsr formal document describe proposed specifications technologies adding java platform jmi based meta-object facility mof specification object management group omg mof metamodel model kind metadata used notably define unified modeling language uml supports exchange metadata xmi xmi standard exchanging metadata information via extensible markup language xml mof/xmi specifications used exchange uml models essentially jmi used write tools java manipulating uml models used model driven architecture and/or model driven development many implementations jmi including reference implementation unisys sap netweaver sun microsystems open-source implementation netbeans group jmi compatible java se 1.3
Programming language topics
derbycon derbycon computer security conference based louisville kentucky first derbycon took place 2011 founded martin bos dave kennedy alex kah adrian crenshaw conference held hyatt regency louisville typically late september january 14 2019 organizers announced derbycon 9.0 held september 2019 would last series citing increasing difficulty holding conferences face small yet vocal group people creating negativity polarization disruption derbycon common activities include along five parallel tracks also vendors tables games training village lockpick feature also included book publishers hardware vendors t-shirts printed
Computer security
dprobes dprobes dynamic probes linux kernel analysis framework created 2004 features ability insert software probes dynamically running code based kprobes first versions released june 2004. dprobes first introduced suse linux enterprise server sles since 2006 commercial linux distributions headed towards systemtap chosen analysis mechanism
Computer architecture
mta sztaki laboratory parallel distributed systems laboratory parallel distributed systems lpds department mta sztaki research laboratory distributed grid cloud technologies lpds founding member hungarian grid competence centre hungarian national grid initiative hungarian opennebula community also coordinates several european grid/cloud projects mission lpds twofold one hand would like provide efficient software development tools high-level services together customizable scientific gateways hand lpds developing easy-to-maintain middleware solutions technologies interoperability enables cost-efficient alternative distributed grid cloud platforms scientific business applications lpds laboratory cooperation departments mta sztaki involved development sztaki cloud takes part cloud-based projects lpds cloud research focusing field infrastructure service iaas -based cloud systems make previously evolved products services lpds available cloud-based executing scalable transparent way guse grid cloud user support environment well-known permanently improving open source science gateway framework enables users convenient easy access grid cloud infrastructures developed support large variety user communities provides general purpose workflow-oriented graphical user interface create run workflows various distributed computing infrastructures including clusters grids desktop grids clouds guse framework used national grid initiatives ngis support small user communities afford develop customized science gateway p-grade portal liferay technology-based web portal guse accessed via major modern web browsers like chrome firefox etc supports development submission distributed applications executed computational resources various distributed computing infrastructures dcis including clusters service grids desktop grids clouds data avenue file commander tool data transfer enabling easy data moving various storage services various network protocols data avenue integrated ws-pgrade portlet goal sztaki cloud develop deploy institutional cloud infrastructure allows significant improvement traditional institutional infrastructure new cloud-based infrastructure significantly effective cost efficient former infrastructure built traditional conceptions individual specific servers sztaki desktop grid provides enterprise solution exploit pcs clusters located different sites company institute solving large scale distributed programs via easy-to-use application programming interface extended include clusters single powerful pcs hierarchically propagate work one desktop grid lpds participated national international grid cloud research projects since 2000 outstanding results area grid/cloud resources development high-level user interfaces field important result ws-pgrade/guse used several european grid made access grid cloud systems portal convenient user-friendly way additionally lpds participates big data management storage within field agricultural research ongoing projects participation lpds laboratory maintains comprehensive list projects lpds played active role providing grid cloud trainings europe worldwide national international trainings laboratory provides knowledge transfer targets new users industry well science lpds organized hosted summer schools trainings grid- cloud-related topics since 2005 head lpds prof. dr. péter kacsuk deputy head lpds dr. robert lovas 1 dsc 10 phds 20 full part-time members work laboratory english hungarian
Distributed computing architecture
data security threats database data security threats database bdu russian federation national vulnerability database maintained russian federal service technical export control 2018 bdu contained roughly one-tenth number entries corresponding u.s. national vulnerability database
Computer security
whitix whitix desktop computer operating system written scratch x86 architecture matthew whitworth others project aims combine proven system technology unix-like kernel offering consistent clear interface new way navigate desktop operating system runs custom open source kernel written whitworth new features include icfs dynamic configuration filesystem replaces ioctl modular kernel whitix licensed gnu general public license fully preemptive multitasking kernel multithreading supports number filesystems including fat family filesystems ext3 journaling reiserfs iso9660 whitix available live cd download installed hard drive beginning version 0.2 userspace comprises native shell burn text editor fruity range ported applications c-based bsd-licensed software development kit available bindings various languages whitix contains posix compatibility library codice_1 aim full posix compliance whitix windowing environment xynth lightweight windowing environment developed alper akcan custom userspace software whitix consists range third party applications burn non-posix shell fruity simple text editor several filesystem utilities software ported whitix includes mono runtime environment c compiler python gnu compiler collection lua mplayer ports operating system self-hosting since october 2008 built gnu build chain 0.3 port gtk several linux applications planned whitix also adopts centralized approach userland configuration similar windows registry although widely used whitix software moment includes settings operating system software also linked whitix package management system currently development whitix supports several programming languages using utilities ported operating systems common collection utilities building whitix applications operating system programs found within gnu toolchain includes gnu compiler collection gcc gnu build system amongst others gcc provides compilers ada c c++ fortran whitix kernel designed built gcc ports languages python lua dynamic languages available ports .net languages also supported mono ported platform applications planned blaze platform built managed code development team issue releases ready however versions whitix declared stable general use latest release 0.2b released 1 march 2009 timing release depends stability features planned included although monthly release pattern minor versions improvements aim developers whitix.org
Operating systems
in-session phishing in-session phishing form potential phishing attack relies one web browsing session able detect presence another session visit online banking website web browser launch pop-up window pretends opened targeted session pop-up window user believes part targeted session used steal user data way phishing attacks advantage in-session phishing attacker need targeted website compromised way relying instead combination data leakage within web browser capacity web browsers run active content ability modern web browsers support one session time social engineering user technique exploited vulnerability javascript handling major browsers found amit klein cto security vendor trusteer ltd subsequent security updates browsers may made technique impossible
Computer security
ntractive ntractive privately held software development company based grand forks north dakota marketed business software small medium-sized companies established 2006 company main product elements crm mac crm customer relationship management application aimed small business use mac os x computers ipads iphones. elements crm cloud computing web application employed unique site-specific browser merge desktop web application functionality product first introduced public keynote address apple 2007 world wide developer conference official launch elements sbm products original name 1.0 took place macworld 2009 product renamed elements crm 2.0 release awarded honor apple staff pick july 2009 architecture overall development elements crm product line initially began 2003 company founder justin bartak company later founded january 2006 justin bartak dale jensen company specializing cloud computing mac crm customer relationship management apple hardware devices company elements crm platform part desktop part cloud powered webkit company ceased operations end 2016 mac customer relationship management mac crm approach managing company ’ interaction current future customers apple inc desktop computers ios devices mac crm solutions web-based applications use web browser interaction instead mac crm combination cloud based app built apple programming language objective-c swift programming language mac crms involve using apple devices technology organize automate synchronize sales marketing customer service technical support elements crm mac customer relationship management mac crm solution apple business offered subscription-based service elements crm part desktop part cloud main functions include managing leads contact information tracking communication history managing tasks follow ups tracking email communication creating estimates invoices managing projects elements crm ios universal mobile app iphone ipad ipad mini elements crm ios add-on elements crm desktop app ipad crm version elements crm ios looks works feels like desktop app iphone crm app limited version important functions desktop app elements crm mail email tracking tool works conjunction elements crm monitors user email server communication leads clients stored elements crm match found copy email stored elements crm within client record
Distributed computing architecture
structure interpretation computer programs structure interpretation computer programs sicp computer science textbook massachusetts institute technology mit professors harold abelson gerald jay sussman julie sussman known wizard book hacker culture teaches fundamental principles computer programming including recursion abstraction modularity programming language design implementation mit press published first edition 1985 second edition 1996 formerly used textbook mit introductory course electrical engineering computer science sicp focuses discovering general patterns solving specific problems building software systems make use patterns book describes computer science concepts using scheme dialect lisp also uses virtual register machine assembler implement lisp interpreters compilers several fictional characters appear book book licensed creative commons attribution sharealike 4.0 license book used textbook mit former introductory programming course 6.001 course replaced 6.0001 uses python schools also made use book course textbook used textbook mit large scale symbolic systems class 6.945 byte recommended sicp professional programmers really interested profession magazine said book easy read would expose experienced programmers old new topics sicp influential computer science education several later books inspired style
Programming language topics
label mac os labels macintosh operating systems type seven distinct colored parameters metadata attributed files folders disks operating system labels introduced system 7 kept release mac os 9 mac os x versions 10.0 10.2 lacked attribute reintroduced mac os x version 10.3 though without criticism labels macos let user give colored backgrounds system items three different types views action menu applicable selected icon older classic mac os versions choice color would cause icon completely wash color losing distinct traits process new label feature applies color background file names labeled item selected macos column view colored dot name indicates label choice seven colors easily exchanged colors names colors however changed represent categories assigned label colors label colors names customized classic mac os systems however mac os 8 9 provided functionality labels tab finder preferences dialog system 7 provided separate labels control panel labels mac os 9 earlier specific individual install booting another install another mac different disk would show different colors names unless set identically
Operating systems
openindiana openindiana free open-source unix operating system derived opensolaris based illumos developers forked opensolaris oracle corporation discontinued order continue development distribution source code openindiana project stewarded illumos foundation also stewards illumos operating system openindiana developers strive make de facto opensolaris distribution production servers security bug fixes required free charge project indiana originally conceived sun microsystems construct binary distribution around opensolaris source code base openindiana conceived negotiations takeover sun microsystems oracle proceeding order ensure continued availability development opensolaris-based os widely used uncertainty among opensolaris development community led developers form tentative plans fork existing codebase plans came fruition following announcement discontinuation support opensolaris project oracle formal announcement openindiana project made september 14 2010 jisc centre london first release operating system made available publicly time despite untested reason untested release openindiana team set launch date ahead oracle openworld order beat release solaris 11 express announcement openindiana met mainly positive response 350 people viewed online announcement iso image downloaded 2000 times twitter account obtained 500 followers numerous notable press websites wrote release broadcast bandwidth announcement substantial noted top 350mbit/second network package depot server experienced 20x much traffic interested distribution originally planned resulting threads later provisioned reporting positive online articles questioned relevance solaris given market penetration linux one article critical openindiana launch citing lack professionalism regard releasing untested build project lack commitment release schedule initial openindiana release advertised experimental directly based latest opensolaris development build preliminary opensolaris 2010 release opensolaris binary distribution moved solarisexpress real-time feed opensolaris updates discontinued concerns abounded would happen openindiana oracle decided stop feeding source code back community openindiana team mitigated concerns announced intention move source code feed illumos foundation concerns raised possible discontinuation free access oracle-owned compiler used produce openindiana response openindiana modified able compile open source gnu compiler collection hcl hardware compatibility list remains somewhat informal fragmented un-centralized requiring much end-user research hardware selection lack comprehensive centralized hcl follows fact opensolaris hcl hosted oracle server infrastructure server-side code device driver utility submission made available august 2012 founding project lead alasdair lumsden stepped project citing personal reasons frustration lack progress made project among reasons lack progress lack developers resources resignation lumsden wrote many us first open source project ever contributed included task hand vast ill equipped deal since resignation project developed team volunteers completely horizontal participative community effort september 2013 distrowatch review stated openindiana project seemingly steady decline last couple years review concluded openindiana progressed significantly state opensolaris five years may 2015 distrowatch review openindiana similarly concluded little major progress made system years review stated package selection hardware support seemed lag behind systems many system administration features either replicated ported linux bsd review concludes claims lack package support may mitigated fact 3500+ software packages provided openindiana hipster split several packages would artificially increase package count e.g like linux distributions image packaging system file-based package management providing incremental updates package facets making splitting unnecessary burden course first two years existence hipster project migrated updated 1500 packages maintains collection selected software packages relying third-party repositories like sfe add-ons extended selection pkgsrc system supported joyent readily provides 20000+ packages illumos systems openindiana fork technical sense continuation opensolaris spirit project intends deliver system v family operating system binary-compatible oracle products solaris 11 solaris 11 express however rather based os/net consolidation like opensolaris openindiana based illumos project use image packaging system ips package management system opensolaris openindiana codebase initially based majority publicly available code oracle case since oi_151a development builds based illumos september 2011 onwards project effectively moved away oracle-owned tools sun studio builds since 2013 including active hipster branch use gnu compiler collection gcc sole compiler illumos project built gcc since june 15 2012 first experimental release openindiana build 147 released september 14 2010 second experimental release build 148 released december 17 2010 first development release build 151 released september 14 2011 first release based upon illumos martux 151a0 released first sparc build openindiana build 151a7 intel/amd architectures released october 6 2012 build 151a8 released august 10 2013 opensxce 2013.01 sparc build 151a formerly martux released openindiana february 1 2013 second possibly last openindiana sparc build subsequent releases based upon dilos since development model inherited opensolaris project unsuitable community project hipster initiative created late 2013 reboot modernize openindiana hipster project fast development branch openindiana based rolling-release model horizontal contribution scheme oi-userland build system use continuous integration hipster actively maintained repository receives software updates well security fixes installation images published twice year every snapshot release announced via mailing list twitter first snapshot release delivered february 14 2014 subsequent snapshots based six-month development cycle notable features hipster list features updated development cycle roadmap page issue tracker
Computer architecture
arm accredited engineer arm accredited engineer aae program professional accreditations awarded arm holdings aae program designed computer software hardware engineers wishing validate knowledge arm technology program launched 2012 series events including arm techcon 2012 aae program consists number certifications syllabus assessed means separate one-hour multiple-choice exam aae program ended 2016 two accreditations currently available others launched next years http //ds.arm.com/developer-resources/arm-accredited-engineer-program/ aae entry-level accreditation first launched aae syllabus covers software-related aspects armv7 architecture specific focus cortex-a cortex-r profiles including applications processors real-time processors syllabus cover cortex-m systems aae certification aimed general embedded software systems developers broad knowledge arm technology syllabus covers following subject areas aame accreditation launched 16 september 2013 entry-level accreditation similar basic aae accreditation focused armv7 cortex-m profile accreditation aimed general embedded software engineers broad knowledge arm technology bias toward microcontrollers syllabus covers following subject areas following accreditations considered launch 2013 2016 aae program exams delivered prometric inc. supervised computer-based tests dedicated test platforms throughout network 10,000 authorized prometric test centers aptcs around world 70 multiple choice questions candidates given one hour complete test results issued instantly on-screen grades either pass fail letter percentage grades issued passing exam candidates also request paper certificate mailed
Computer architecture
david litchfield david litchfield born 1975 security expert united kingdom anne saita writing information security magazine called along brother mark litchfield world best bug hunters december 2003.also 2003 sister amelia litchfield born litchfield found hundreds vulnerabilities many popular products among outstanding discoveries products microsoft oracle ibm blackhat security briefings july 2002 presented exploit code demonstrate buffer overflow vulnerability discovered microsoft sql server 2000 six months later 25 january 2003 persons unknown used code template sql slammer worm several years vulnerability research litchfield made move oracle forensics documented perform forensic analysis compromised database server series white papers – oracle forensics parts 1 6 process researching developing open source tool called forensic examiner database scalpel f.e.d.s litchfield founded company named cerberus information security acquired stake july 2000 year half later founded next generation security software five colleagues stake author various software packages also many technical documents security issues author oracle hacker handbook co-author database hacker handbook shellcoder handbook sql server security also contributing author special ops david litchfield currently employed apple
Computer security
boris katz boris katz born october 5 1947 chișinău moldavian ssr soviet union chișinău moldova principal american research scientist computer scientist mit computer science artificial intelligence laboratory massachusetts institute technology cambridge head laboratory infolab group research interests include natural language processing understanding machine learning intelligent information access brother victor kac mathematician mit able get ussr help u.s senator ted kennedy end cold war last several decades boris katz developing start natural language system allows user access various types information using english boris katz born october 5 1947 chișinău family hersh katz died 1976 hayki klara landman born 1921 lipcani briceni district died 2006 cambridge middlesex county moved lipcani town located northern bessarabian chișinău war graduated moscow state university november 1978 left united states thanks personal intervention senator edward m. kennedy defended thesis candidate physical mathematical sciences 1975 supervision evgenii m. landis currently lives boston heads infolabresearch team laboratory informatics artificial intelligence massachusetts institute technology boris katz creator start information processing system since 1993 internet author several works field processing generation perception natural languages machine learning accelerated access multimedia information brothers victor gershevich katz american mathematician professor massachusetts institute technology mikhail gershevich katz israeli mathematician graduate harvard columbia ph.d. 1984 universities professor bar-ilan university author monograph systolic geometry topology mathematical surveys monographs vol 137 american mathematical society providence 2007 daughter luba katz bioinformatics scientist husband alan jasanoff neuroimaging scientist professor mit son harvard university professors jay jasanoff sheila jasanoff
Computational linguistics