text
stringlengths
6
1.88M
source
stringclasses
13 values
r5000 r5000 microprocessor implements mips iv instruction set architecture isa developed quantum effect design qed project funded mips technologies inc mti also licensor mti licensed design integrated device technology idt nec nkk toshiba r5000 succeeded qed r4600 r4700 flagship high-end embedded microprocessor idt marketed version r5000 79rv5000 nec vr5000 nkk nr5000 toshiba tx5000 r5000 sold pmc-sierra company acquired qed derivatives r5000 still production today embedded systems users r5000 workstation server computers silicon graphics inc. sgi siemens-nixdorf sgi used r5000 o2 indy low-end workstations r5000 also used embedded systems network routers high-end printers r5000 found way arcade gaming industry r5000 powered mainboards used atari midway initially cobalt qube cobalt raq used derivative model rm5230 rm5231 qube 2700 used rm5230 microprocessor whereas qube 2 used rm5231 original raq systems equipped rm5230 rm5231 cpus later models used amd k6-2 chips eventually intel pentium iii cpus final models original roadmap called 200 mhz operation early 1996 250 mhz late 1996 succeeded 1997 r5000a r5000 introduced january 1996 failed achieve 200 mhz topping 180 mhz positioned low-end workstation microprocessor competition included ibm motorola powerpc 604 hp pa-7300lc intel pentium pro r5000 two-way superscalar design executes instructions in-order r5000 could simultaneously issue integer floating-point instruction one simple pipeline integer instructions another floating-point save transistors die area reduce cost r5000 perform dynamic branch prediction cost reasons instead uses static approach utilizing hints encoded compiler branch-likely instructions first introduced mips ii architecture determine likely branch taken r5000 large l1 caches distinct characteristic qed whose designers favored simple designs large caches r5000 two l1 caches one instructions data capacity 32 kb caches two-way set-associative 32-byte line size virtually indexed physically tagged instructions predecoded enter instruction cache appending four bits instruction four bits specify whether issued together execution unit executed assisted superscalar instruction issue moving dependency conflict checking critical path integer unit executes instructions one cycle latency throughput except multiply divide 32-bit multiplies five-cycle latency four-cycle throughput 64-bit multiplies extra four cycles latency half throughput divides 36-cycle latency throughput 32-bit integers 64-bit integers increased 68 cycles floating-point unit fpu fast single-precision 32-bit design reduced cost benefit sgi whose mid-range 3d graphics workstations relied mostly single-precision math 3d graphics applications fully pipelined made significantly better r4700 r5000 implements multiply-add instruction mips iv isa single-precision adds multiplies multiply-adds four-cycle latency one cycle throughput single-precision divides 21-cycle latency 19-cycle throughput square roots 26-cycle latency 38-cycle throughput division square-root pipelined instructions operate double precision numbers significantly higher latency lower throughput except add identical latency throughput single-precision add multiply multiply-add five-cycle latency two-cycle throughput divide 36-cycle latency 34-cycle throughput square root 68-cycle latency 66-cycle throughput r5000 integrated l2 cache controller supported capacities 512 kb 1 mb 2 mb l2 cache shares sysad bus external interface cache built custom synchronous srams ssrams microprocessor uses sysad bus also used several mips microprocessors bus multiplexed address data share set wires operate clock frequencies 100 mhz initial r5000 support multiprocessing package reserved eight pins future addition feature qed fabless company fabricate designs r5000 fabricated idt nec nkk three companies fabricated r5000 0.35 µm complementary metal–oxide–semiconductor cmos process different process features idt fabricated r5000 process two levels polysilicon three levels aluminium interconnect two levels polysilicon enabled idt use four-transistor sram cell resulting transistor count 3.6 million die measured 8.7 mm 9.7 mm 84.39 mm nec nkk fabricated r5000 process one level polysilicon three levels aluminium interconnect without extra level polysilicon companies use six-transistor sram cell resulting transistor count 5.0 million larger die area around 87 mm die sizes range 80 90 mm claimed mti 0.8 million transistors versions logic remainder contained caches packaged 272-ball plastic ball grid array bga 272-pin plastic pin grid array pga pin-compatible previous mips microprocessor late 1990s quantum effect design acquired license manufacture sell mips microprocessors mti became microprocessor vendor changing name quantum effect devices reflect new business model company first products members rm52xx family initially consisted two models rm5230 rm5260 announced 24 march 1997 rm5230 initially available 100 133 mhz rm5260 133 150 mhz 29 september 1997 new 150 175 mhz rm5230s introduced 175 200 mhz rm5260s rm5230 rm5260 derivatives r5000 differ size primary caches 16 kb instead 32 kb width system interfaces rm5230 32-bit 67 mhz sysad bus rm5260 64-bit 75 mhz sysad bus addition multiply-add three-operand multiply instructions digital signal processing applications microprocessors fabricated taiwan semiconductor manufacturing company tsmc 0.35 μm process three levels interconnect packaged amkor technology power-quad 4 packages rm5230 128-pin version rm5260 208-pin version rm52xx family later joined rm5270 announced embedded systems conference 29 september 1997 intended high-end embedded applications rm5270 available 150 200 mhz improvements addition on-chip secondary cache controller supported 2 mb cache sysad bus 64 bits wide operate 100 mhz packaged 304-pin super-bga sbga pin-compatible rm7000 offered migration path rm7000 20 july 1998 rm52x1 family announced family consisted rm5231 rm5261 rm5271 microprocessors derivatives corresponding devices rm52x0 family fabricated 0.25 μm process four levels metal rm5231 initially available 150 200 250 mhz whereas rm5261 rm5271 available 250 266 mhz 6 july 1999 300 mhz rm5271 introduced priced us 140 quantities 10,000 rm52x1 improved upon previous family larger 32 kb primary caches faster sysad bus supported clock rates 125 mhz qed acquired pmc-sierra rm52xx rm52x1 families continued pmc-sierra products pmc-sierra introduced two rm52x1 derivatives rm5231a rm5261a 4 april 2001 microprocessors fabricated tsmc 0.18 μm process differ previous devices featuring higher clock rates lower power consumption rm5231a available clock rates 250 350 mhz rm5261a 250 400 mhz r5900 used sony playstation 2 modified version r5000 cpu dubbed emotion engine customized instruction/data cache arrangement sony proprietary 107 vector simd multimedia extensions mmi custom fpu n't ieee 754 compliant unlike fpus used r5000 also second mips core acted sync controller specialized vector coprocessors important 3d math time principally computed cpu
Computer architecture
blue pill software blue pill codename rootkit based x86 virtualization blue pill originally required amd-v pacifica virtualization support later ported support intel vt-x vanderpool well designed joanna rutkowska originally demonstrated black hat briefings august 3 2006 reference implementation microsoft windows vista kernel name reference red pill blue pill concept 1999 film matrix blue pill concept trap running instance operating system starting thin hypervisor virtualizing rest machine previous operating system would still maintain existing references devices files nearly anything including hardware interrupts requests data even system time could intercepted fake response sent hypervisor original concept blue pill published another researcher ieee oakland may 2006 name vmbr virtual-machine based rootkit joanna rutkowska claims since detection program could fooled hypervisor system could 100 undetectable since amd virtualization seamless design virtualized guest supposed able query whether guest therefore way blue pill could detected virtualization implementation functioning specified assessment repeated numerous press articles disputed amd issued statement dismissing claim full undetectability security researchers journalists also dismissed concept implausible virtualization could detected timing attack relying external sources time 2007 group researchers led thomas ptacek matasano security challenged rutkowska put blue pill rootkit detector software year black hat conference deal deemed no-go following rutkowska request 384,000 funding prerequisite entering competition rutkowska alexander tereshkin countered detractors claims subsequent black hat speech arguing proposed detection methods inaccurate source code blue pill since made public following license unauthorized use including publishing distribution software requires valid license copyright holder software provided educational use black hat training conference red pill technique detect presence virtual machine also developed joanna rutkowska
Computer security
vexxhost vexxhost privately-owned leading canadian openstack cloud infrastructure-as-a-service provider corporate headquarter montreal quebec founded 2006 vexxhost offers cloud computing solutions public cloud private cloud hybrid cloud solutions along kubernetes enablement openstack consulting services company data centres located montreal quebec santa clara california established 2006 vexxhost initially web hosting provider offering services shared hosting vps however advancement cloud technologies vexxhost made decision move innovative options cloud hosting leap cloud-based hosting garnered positive response encouraging vexxhost invest cloud-based solutions 2011 vexxhost adopted openstack software infrastructure since vexxhost active contributor avid user openstack transition resulted vexxhost adopting openstack software infrastructure beginnings vexxhost ’ profound relationship openstack foundation today vexxhost global provider infrastructure-as-a-service openstack public cloud private cloud hybrid cloud consulting solutions customers ranging small businesses enterprises across world vexxhost currently running stein latest release openstack able implement update clouds day release vexxhost contributing openstack community since second release bexar 2011 company also corporate sponsor infrastructure donor openstack infrastructure teamwhile maintaining presence community regularly attending openstack summits vexxhost also part interop challenge boston summit 2017 vexxhost sponsored openstack summits held berlin 2018 vancouver denver 2019 co-founder mohammed naser acting ptl openstack ’ ansible project sits chair openstack technical committee given talks montreal ottawa toronto openstack meet-ups summits well several keynotes across north america europe vexxhost plays part community actively contributing upstream code sharing feedback ptls developers along operation experience running canada ’ biggest openstack public cloud vexxhost recently awarded openstack superuser award open infrastructure summit held april 29th 2019 denver vexxhost offers fully certified openstack powered cloud solutions validated testing provide api compatibility openstack core services additionally accelerate bugfixes reporting diagnosing working community addition participation openstack ’ ironic bare metal program december 10th 2018 vexxhost announced become silver member linux foundation subsidiary cloud native computing foundation vexxhost unveiled certified kubernetes-as-a-service offering runs openstack ’ magnum month vexxhost also sponsored kubecon north america 2018 seattle located montreal canada private data centre uses green hydroelectric power ssae-16 soc type 2 compliant high level physical security every aspect infrastructure secured advanced firewalls protect users ’ data cloud platforms designed implement full isolation reduce security issues maximize reliability newly announced santa clara california data centre bring standards data security storage united states including secure ssae-16 facility undergone soc type 2 audit silicon valley region also equipped nested virtualization 40gbit internal networking high throughput low latency optimal processing big data 10gbit public internet connection region currently running latest release openstack stein vexxhost runs exclusively openstack managed services across entire infrastructure work users help architect configure optimize cloud infrastructure order reduce expenses increase productivity vexxhost also delivers high level expertise clients enabling focus core competencies vexxhost manages largest openstack public cloud canada montreal data centres addition vexxhost ’ santa clara data centre public cloud offering available globally vexxhost recently revamped billing model public cloud offers minutely billing clients following openstack projects supported readily available within vexxhost public cloud offering above-mentioned projects vexxhost offers on-demand seamless integration openstack projects vexxhost ’ private cloud offering available hosted deployment on-premise deployment anywhere world regardless data centre ownership openstack projects supported vexxhost openstack certification private cloud solution offers services available public cloud vexxhost ’ updated private cloud offering available different deployment models on-premise heavy lifting gathering requirements architecting cloud deploying testing managing openstack done vexxhost team users provide data centre hardware hosted leverage vexxhost ’ multiple ssae-16 data centres certified tested hardware bring private cloud quickly users access use cloud via encrypted vpns public internet private fibre access also option deploy private cloud anywhere world regardless data centre ownership moreover comes unique feature access virtual machines bare metal kubernetes one environment another noteworthy feature provide users access multiple architecture options intel arm well access enterprise-grade gpus customizable hardware specifications following openstack projects supported readily available within vexxhost private cloud offering above-mentioned projects vexxhost offers on-demand seamless integration openstack projects vexxhost flexible hybrid solutions offer mix public cloud private cloud on-premise solutions traditionally mixed matched meet needs user users get access dedicated single-tenant resources vexxhost ’ public cloud carve private cloud cost savings option getting access dedicated hardware vexxhost ’ dedicated load balancer distributes traffic among dedicated public private servers every load balancer platform runs within dedicated instance dedicated ip vexxhost offers consultation various cloud computing openstack troubleshooting development cloud strategy roadmap upgrades new releases launching public openstack services openstack project implementations openstack consultants help companies upgrade latest openstack release implement openstack project give guidance openstack strategy vexxhost kubernetes enablement offering developed make certified kubernetes service accessible fully managed service provides quick on-demand access certified kubernetes compatible virtual machines bare metal provides users secure container clusters enhanced isolation upgraded performance due faster deployment times simplified extensive service integrations vexxhost team currently running openstack stein openstack ’ latest 19th release since day one release result vexxhost team first production-ready private cloud running stein vexxhost offered service users past consultation offering however make easier users take advantage company broken openstack upgrades simplified solution
Distributed computing architecture
r8000 r8000 microprocessor chipset developed mips technologies inc. mti toshiba weitek first implementation mips iv instruction set architecture r8000 also known tfp tremendous floating-point name development development r8000 started early 1990s silicon graphics inc. sgi r8000 specifically designed provide performance circa 1990s supercomputers microprocessor instead central processing unit cpu built many discrete components gate arrays time performance traditional supercomputers advancing rapidly reduced instruction set computer risc microprocessors predicted risc microprocessors would eventually match performance expensive larger supercomputers fraction cost size making computers level performance accessible enabling deskside workstations servers replace supercomputers many situations first details r8000 emerged april 1992 announcement mips computer systems detailing future mips microprocessors march 1992 sgi announced acquiring mips computer systems became subsidiary sgi called mips technologies inc. mti mid-1992 development r8000 transferred mti continued r8000 expected introduced 1993 delayed mid-1994 first r8000 75 mhz part introduced 7 june 1994 priced us 2,500 time mid-1995 90 mhz part appeared systems sgi r8000 high cost narrow market technical scientific computing restricted market share although popular intended market largely replaced cheaper generally better performing r10000 introduced january 1996 users r8000 sgi used power indigo2 workstation power challenge server power challengearray cluster power onyx visualization system november 1994 top500 list 50 systems 500 used r8000 highest ranked r8000-based systems four power challenges positions 154 157 18 r8000s chip set consisted r8000 microprocessor r8010 floating-point unit two tag rams streaming cache r8000 superscalar capable issuing four instructions per cycle executes instructions program order five-stage integer pipeline r8000 controlled chip set executed integer instructions contained integer execution units integer register file primary caches hardware instruction fetch branch prediction translation lookaside buffers tlbs stage one four instructions fetched instruction cache instruction cache 16 kb large direct-mapped virtually tagged virtually indexed 32-byte line size instruction decoding register reads occur stage two branch instructions resolved well leading one-cycle branch mispredict penalty load store instructions begin execution stage three integer instructions stage four integer execution delayed stage four integer instructions use result load operand may issued cycle load results written integer register file stage five integer register file nine read ports four write ports four read ports supply operands two integer execution units branch unit considered part integer unit another four read ports supply operands two address generators four ports needed rather two base register index register address style added mips iv isa r8000 issues one integer store per cycle one final read port delivers integer store data two register file write ports used write results two integer functional units r8000 issues two integer loads per cycle two write ports used write results integer loads register file level 1 data cache organized two redundant arrays one read port one write port integer stores written arrays two loads could processed parallel one array integer functional units consisted two integer units shift unit multiply-divide unit two address generator units multiply divide instructions executed multiply-divide unit pipelined result latency multiply instruction four cycles 32-bit operands six cycles 64-bit latency divide instruction depends number significant digits result thus varies 21 73 cycles loads stores begin execution stage three r8000 two address generation units agus calculate virtual address loads stores stage four virtual addresses translated physical addresses dual-ported tlb contains 384 entries three-way set associative 16 kb data cache accessed cycle dual-ported accessed via two 64-bit buses service two loads one load one store per cycle cache protected parity error correcting code ecc event cache miss data must loaded streaming cache eight-cycle penalty cache virtually indexed physically tagged direct mapped 32-byte line size uses write-through allocate protocol loads hit data cache result written integer register file stage five r8010 executed floating-point instructions provided instruction queue r8000 queue decoupled floating-point pipeline integer pipeline implementing limited form out-of-order execution allowing floating-point instructions execute possible integer instructions group issued pipelines decoupled help mitigate streaming cache latency contained floating-point register file load queue store queue two identical floating-point units instructions except divide square-root pipelined r8010 implements iterative division square-root algorithm uses multiplier key part requiring pipeline stalled unit duration operation arithmetic instructions except compares four-cycle latency single double precision divides latencies 14 20 cycles respectively single double precision square-roots latencies 14 23 cycles respectively streaming cache external 1 16 mb cache serves r8000 l2 unified cache r8010 l1 data cache operates clock rate r8000 built commodity synchronous static rams scheme used attain sustained floating point performance requires frequent access data small low-latency primary cache would contain enough data frequently miss necessitating long latency refiles reduce performance streaming cache two-way interleaved two independent banks containing data even odd addresses therefore perform two reads two writes read write every cycle provided two accesses separate banks bank accessed via two 64-bit unidirectional buses one reads writes scheme used avoid bus turnover required bidirectional buses avoiding bus turnover cache read one cycle written next cycle without intervening cycle turnover resulting improved performance streaming cache tags contained two tag ram chips one bank chips contain identical data chip contains 1.189 mbit cache tags implemented four-transistor sram cells chips implemented 0.7 μm bicmos process two levels polysilicon two levels aluminium interconnect bicmos circuitry used decoders combined sense amplifier comparator portions chip reduce cycle time tag ram 14.8 mm 14.8 mm large packaged 155-pin cpga dissipates 3 w 75 mhz addition providing cache tags tag rams responsible streaming cache four-way set associative avoid high pin count cache tags four-way set associative logic selects set access lookup instead usual way implementing set-associative caches access streaming cache pipelined mitigate latency pipeline five stages stage one addresses sent tag rams accessed stage two stage three signals tag rams propagate ssrams stage four ssrams accessed data returned r8000 r8010 stage five r8000 contained 2.6 million transistors measured 17.34 mm 17.30 mm 299.98 mm² r8010 contained 830,000 transistors total two chips contained 3.43 million transistors fabricated toshiba vhmosiii process 0.7 µm triple-layer metal complementary metal–oxide–semiconductor cmos process packaged 591-pin ceramic pin grid array cpga packages chips used 3.3 v power supply r8000 dissipated 13 w 75 mhz
Computer architecture
kpackage kpackage kde package manager frontend supported bsd debian gentoo rpm slackware packages provided gui management upgrade existing packages installation acquirement new packages additionally provided functionality help manage package caches kpackage part kdeadmin developed kde.org
Operating systems
macintosh iicx macintosh iicx personal computer designed manufactured sold apple computer inc. march 1989 march 1991 introduced half year macintosh iix iicx resembles iix great extent provides performance seven inches narrower ten pounds lighter somewhat quieter due smaller internal fan relative compactness results three nubus slots available compared six iix new case apple first designed operate either horizontal vertical orientation remained use successors macintosh iici quadra 700 idea vertical orientation one first minitower cases suggested apple ceo john sculley running space desk despite fact new layout actually took space monitor taken account model designated iicx compact echoing earlier apple iic compact model apple ii series x apple designation 68030 processor users liked mac iicx part components parts ram nubus slots power supply snapped place inside case without need screws one central safety screw tied assembly together though often reinstalled ever removed iicx introduction jean-louis gassée demonstrated iicx modular design assembling one parts front audience made less expensive build easier repair earned heavy praise warm reception amongst mac community machine also lightest apple lineup time however unlike ii iix cpu soldered logic board therefore upgraded case also unable accommodate 5 1/4 full-height hard disk drives model superseded macintosh iici used case
Computer architecture
moovly moovly company provides cloud-based platform saas enables users create generate multimedia content animated videos video presentations animated info graphics video content includes mix animation motion graphics moovly founded belgium november 2012 brendon grunewald geert coppens vision becoming number one platform engaging customisable multimedia content creation company mission enable everyone create engaging multimedia content making affordable intuitive simple company seen steady subscriber growth multinational corporations small medium business well educational institutions.. company initially secured several rounds external investment fund growth july 2016 listed toronto venture stock exchange moovly media inc symbol mvy tsx.v mvy october 9 2018 moovly announced launch new dropbox integration allows moovly users easily access upload photo video content dropbox within moovly studio editor moovly cloud based digital media content creation software platform content created via various interfaces including editor well simple custom-made video generation interfaces using combination uploaded images videos sounds well pre-defined library objects users able quickly assemble new animated content final videos presentations downloaded mp4 example published variety video platforms moovly provides feature-rich free license allowing users create animated videos exported facebook youtube well premium licenses advanced professional use free videos include moovly branding educational tool educational purposes moovly offers specific licenses companies brands use library animated graphics fonts standard color set february 4 2019 certificate site expired one able come site
Distributed computing architecture
collaborative human interpreter collaborative human interpreter chi proposed software interface human-based computation first proposed programming language blog google blogoscoped implementable via api virtually programming language specially designed collecting making use human intelligence computer program one typical usage implementing impossible-to-automate functions example currently difficult computer differentiate images men women non-humans however easy people programmer using chi could write code fragment along lines code function codice_1 currently approximate result task easily solved person function codice_2 called system send request someone person received request process task input result person task processor inputs value codice_3 'll get value variable result program querying process highly automated november 6 2005 amazon.com launched chi business platform amazon mechanical turk first business application using chi chi originally mentioned philipp lenssen blog
Programming language topics
bounce message bounce message bounce automated message mail system informing sender previous message message delivered delivery problem occurred original message said bounced formal terms bounce message include non-delivery report non-delivery receipt ndr failed delivery status notification dsn message non-delivery notification ndn errors may occur multiple places mail delivery sender may sometimes receive bounce message mail server reporting unable send message alternatively recipient mail server reporting although accepted message unable deliver specified user server accepts message delivery also accepting responsibility deliver bounce message event delivery fails e-mail arrives destination server address mymail.example sending alice mymail.example may mail daemon unable deposit message specified user mailbox underlying hard drive server insufficient space sending e-mail service e-mail sent may unable reach destination address case sender would receive bounce message mail server common causes mail servers unable reach destination users may receive erroneous bounce messages messages never actually sent happen particular context email spam email viruses spammer sender may forge message another user intended recipient spam forges message appear yet another user third party message delivered intended recipient bounce message would returned third party instead spammer called backscatter library.example mail server known message would undeliverable instance jill user account would accepted message first place therefore would sent bounce instead would rejected message smtp error code would leave jack mail server store.example obligation create deliver bounce bounces special form autoresponder autoresponses automatic replies mails sent program—as opposed human user—in reply received mail sent bounce address examples auto replies vacation mails challenges challenge-response spam filtering replies list servers feedback reports auto replies discussed rfc 3834 auto replies sent codice_1 stated received mail triggered auto reply response typically sent empty return-path otherwise auto responders could trapped sending auto replies back forth codice_1 visible delivered mail header field codice_1 inserted smtp mail delivery agent mda usually combined mail transfer agent mta mda simply copies reverse path smtp codice_4 command codice_1 mda also removes bogus codice_1 header fields inserted mtas header field generally guaranteed reflect last reverse path seen codice_4 command today paths normally reduced ordinary email addresses old smtp 'source routing deprecated 1989 historical background info see sender rewriting scheme one special form path still exists empty path codice_8 used many auto replies especially bounces strict sense bounces sent non-empty codice_1 incorrect rfc 3834 offers heuristics identify incorrect bounces based local part left hand side address non-empty codice_1 even defines mail header field codice_11 identify auto replies mail header part mail data smtp command codice_12 mtas typically n't look mail deal envelope includes codice_4 address a.k.a codice_1 codice_15 reverse path e.g. rfc 2822-codice_16 mail header field codice_16 details important schemes like batv remaining bounces empty codice_1 non-delivery reports ndrs delivery status notifications dsns dsns explicitly solicited smtp service extension esmtp however widely used explicit requests delivery failure details much commonly implemented variable envelope return path verp explicit requests rarely implemented ndrs basic smtp function soon mta accepted mail forwarding delivery silently delete drop create send bounce message originator forwarding delivery failed excluding mdas mtas forward mails another mta next mta free reject mail smtp error message like user unknown quota etc point sending mta bounce message i.e inform originator bounce may arise also without rejecting mta rfc 5321 puts smtp server accepted task relaying mail later finds destination incorrect mail delivered reason must construct undeliverable mail notification message send originator undeliverable mail indicated reverse-path rule essential smtp name says 'simple protocol reliably work mail silently vanishes black holes bounces required spot fix problems today however common receive mostly spam emails usually uses forged codice_1s often impossible mta inform originator sending bounce forged codice_1 would hit innocent third party addition specific reasons preferable silently drop message rather reject let alone bounce quoting rfc 5321 section 6.2 discussed section 7.8 section 7.9 dropping mail without notification sender permitted practice however extremely dangerous violates long tradition community expectations mail either delivered returned silent message-dropping misused could easily undermine confidence reliability internet mail systems silent dropping messages considered cases high confidence messages seriously fraudulent otherwise inappropriate validating sender inherent flaw today smtp without deprecated source routes mentioned earlier addressed various proposals directly batv spf many reasons email may bounce one reason recipient address misspelled simply exist receiving system user unknown condition reasons include resource exhaustion — full disk — rejection message due spam filters addition muas allow users bounce message demand user-initiated bounces bogus bounces definition real bounce automated emitted mta mda bounce messages smtp sent envelope sender address codice_21 known null sender address frequently sent codice_22 header address codice_23 recipient site typically bounce message contain several pieces information help original sender understanding reason message delivered rfc 3463 describes codes used indicate bounce reason common codes 5.1.1 unknown user 5.2.2 mailbox full 5.7.1 rejected security policy/mail filter format reporting administrative messages defined rfc 6522 dsn may mime multipart/report message composed three parts second part dsn also quite readable essential understand mta played role reporting-mta responsible composing sending dsn remote-mta rejects message smtp transaction field diagnostic-code type smtp may used report value note beside numerical 3-digit value smtp response contains human readable part information
Computer security
screened subnet network security screened subnet refers use one logical screening routers firewall define three separate subnets external router sometimes called access router separates external network perimeter network internal router sometimes called choke router separates perimeter network internal network perimeter network also called border network demilitarized zone dmz intended hosting servers sometimes called bastion hosts accessible access internal external networks purpose screened subnet dmz establish network heightened security situated external presumed hostile network internet extranet internal network screened subnet essential concept e-commerce entity presence world wide web using electronic payment systems network services prevalence hackers advanced persistent threats computer worms botnets threats networked information systems separating firewall system two separate component routers achieves greater potential throughput reducing computational load router component router screened subnet firewall needs implement one general task router less complex configuration screened subnet dmz also achieved single firewall device three network interfaces term demilitarized zone military context refers area treaties agreements contending groups forbid military installations activities often along established frontier boundary two military powers alliances similarity network security screened network dmz reduced fortifications intended points ingress external network presumed hostile appears term demilitarized zone dmz popularized sales marketing term sometime development screened routers firewalls often used synonym may different meaning whereas screened subnet firewall employs two screened routers create three subnets screened host firewall employs one screened router define two subnets external network internal network screened subnet firewall secure intruder must traverse two filtered routes reach internal network bastion dmz host compromised intruder must still bypass second filtered route reach internal network hosts
Computer security
yaffs yaffs yet another flash file system designed written charles manning whitecliffs new zealand company aleph one yaffs1 first version file system designed then-current nand chips 512 byte page size 16 byte spare oob out-of-band area work started 2002 first released later year initial work sponsored toby churchill ltd brightstar engineering older chips also generally allow 2 3 write cycles per page yaffs takes advantage dirty pages marked writing specific spare area byte newer nand flash chips larger pages first 2k pages 64 bytes oob later 4k stricter write requirements page within erase block 128 kilobytes must written sequential order page must written designing storage system enforces write rule write property several advantages yaffs2 designed accommodate newer chips based yaffs1 source code major difference internal structures fixed assume 512 byte sizing block sequence number placed written page way older pages logically overwritten without violating write rule released late 2003 yaffs robust log-structured file system holds data integrity high priority secondary yaffs goal high performance yaffs typically outperform alternatives also designed portable used linux wince psos rtems ecos threadx various special-purpose oses variant 'yaffs/direct used situations os embedded oses bootloaders core filesystem simpler interfacing higher lower level code nand flash hardware yaffs codebase licensed gpl per-product licenses available aleph one special procedure initialize yaffs filesystem beyond simply erasing flash memory bad block encountered yaffs follows smart media scheme marking fifth byte block spare area blocks marked remain unallocated write file data yaffs initially writes whole page chunk yaffs terminology describes file metadata timestamps name path etc new file assigned unique object id number every data chunk within file contain unique object id within spare area yaffs maintains tree structure ram physical location chunks chunk longer valid file deleted parts file overwritten yaffs marks particular byte spare area chunk ‘ dirty ’ entire block 32 pages marked dirty yaffs erase block reclaim space filesystem free space low yaffs consolidates group good pages onto new block yaffs reclaims space used dirty pages within original blocks yaffs system mounts nand flash device must visit block check valid data scanning spare area information reconstitutes memory-resident tree data structure yaffs2 similar concept yaffs1 shares much code yaffs2 code base supports yaffs1 data formats backward compatibility main difference yaffs2 needs jump significant hoops meet write requirement modern nand flash yaffs2 marks every newly written block sequence number monotonically increasing sequence chunks inferred block sequence number chunk offset within block thereby yaffs2 scans flash detects multiple chunks identical objectids chunknumbers choose use taking greatest sequence number efficiency reasons yaffs2 also introduces concept shrink headers example file resized smaller size yaffs1 mark affected chunks dirty yaffs2 due write rule yaffs2 instead writes shrink header indicates certain number pages point invalid lets yaffs2 reconstruct final state filesystem system reboots yaffs2 uses abstract definition nand flash allowing used wider variety flash parts different geometries bad block handling rules etc yaffs2 later added support checkpointing bypasses normal mount scanning allowing fast mount times performance vary mount times 3 seconds 2 gb reported
Computer file systems
apple developer apple developer formerly apple developer connection adc apple inc. developer network designed make available resources help software developers write software macos tvos watchos ios platforms applications created xcode programs created apple inc.. ios applications uploaded app store ios watchos applications attached ios applications tvos applications uploaded app store tvos mac applications ’ common find world wide web download app store macos several leaks secret apple software prerelease program notably mac os x 10.4 tiger leaks apple sued three men allegedly leaked mac os x 10.4 prerelease builds bittorrent os x lion os x mountain lion os x mavericks leaked several times well however combat issue apple installed alert system preview builds alerting uploaded tester bittorrent system july 18 2013 intruder attempted access sensitive personal information apple developer servers information encrypted apple could guarantee information developers may accessed developer website taken maintenance thursday said undergoing maintenance sunday apple posted notice site notifying users attempted hack stated re-building servers developer system prevent happening future
Operating systems
windows 10 version history windows 10 operating system developed microsoft microsoft described windows 10 operating system service would receive ongoing updates features functionality augmented ability enterprise environments receive non-critical updates slower pace use long-term support milestones receive critical updates security patches five-year lifespan mainstream support terry myerson executive vice president microsoft windows devices group said goal model reduce fragmentation across windows platform windows 10 insider preview builds delivered insiders three different rings insiders fast ring receive updates prior slow ring might experience bugs issues insiders release preview ring receive updates version almost available public comparatively stable mainstream builds windows 10 labeled yymm yy representing two-digit year mm representing month planned release example version 1507 refers builds initially released july 2015 original version windows 10 codenamed threshold 1 retroactively named version 1507 released july 2015 carries build number 10.0.10240 microsoft stated designated release manufacturing rtm build windows 10 build 10240 described rtm build various media outlets retroactively named version 1507 microsoft per naming conventions future stable releases operating system notable changes version include final release made available windows insiders july 15 2015 followed public release july 29 2015 support version 1507 ended may 9 2017 devices current branch current branch business however devices configured receive updates current branch current branch business continued receive updates june 27 2018 windows 10 november update also known version 1511 codenamed threshold 2 first major update windows 10 second version operating system carries build number 10.0.10586 new features version windows 10 include first preview released august 18 2015 final release made available windows insiders november 3 2015 followed public release november 12 2015 unlike initial release windows branch also made available existing windows phone 8.1 devices xbox one preview release windows server 2016 pre-installed new windows 10 mobile devices support version users current branch cb current branch business cbb ended october 10 2017 last public update released april 10 2018 enterprise education versions windows 10 anniversary update also known version 1607 codenamed redstone 1 second major update windows 10 first series updates redstone codenames carries build number 10.0.14393 first preview released december 16 2015 final release made available windows insiders july 18 2016 followed public release august 2 release windows 10 supported users current branch cb current branch business cbb long-term support branch ltsb windows 10 creators update also known version 1703 codenamed redstone 2 third major update windows 10 second series updates redstone codenames carries build number 10.0.15063 first preview released insiders august 11 2016 final release made available windows insiders march 20 2017 followed public release april 5 via update assistant began roll april 11 windows 10 fall creators update also known version 1709 codenamed redstone 3 fourth major update windows 10 third series updates redstone codenames carries build number 10.0.16299 first preview released insiders april 7 2017 final release made available windows insiders september 26 2017 released public october 17 windows 10 april 2018 update also known version 1803 codenamed redstone 4 fifth major update windows 10 fourth series updates redstone codenames carries build number 10.0.17134 first preview released insiders august 31 2017 final release made available windows insiders april 16 2018 followed public release april 30 began roll may 8 windows 10 october 2018 update also known version 1809 codenamed redstone 5 sixth major update windows 10 fifth series updates redstone codenames carries build number 10.0.17763 first preview released insiders february 14 2018 update originally made available public consumers october 2 2018 rollout halted october 6 2018 due serious bug deletes users personal files updating october 9 2018 microsoft re-released update insiders stating known issues update including file deletion bug identified fixed october 25 2018 microsoft confirmed existence another bug overwrites files without confirmation extracting zip file zip bug fixed insiders october 30 2018 public rollout update resumed november 13 2018 windows 10 may 2019 update also known version 1903 codenamed 19h1 seventh major update windows 10 first use descriptive codename including year order released instead redstone threshold codename first preview released insiders opted exclusive skip ahead ring july 25 2018 update began rolling may 21 2019. notable changes may 2019 update include next feature release windows 10 codenamed 19h2 eighth major update windows 10 second use descriptive codename update intended delivered cumulative update may 2019 update first preview released insiders opted slow ring july 1 2019 next feature release windows 10 codenamed 20h1 ninth major update windows 10 third use descriptive codename first preview released insiders opted exclusive skip ahead ring february 14 2019
Operating systems
samsung wave s8500 samsung wave samsung wave gt-s8500 smartphone developed produced samsung electronics first smartphone run bada operating system developed samsung electronics commercially released june 1 2010 wave touchscreen phone powered samsung hummingbird cpu s5pc110 includes 1 ghz arm cortex-a8 cpu built-in powervr sgx 540 graphics engine also super amoled screen 720p high-definition video capture capabilities due shortage super amoled screens samsung released successor device called wave ii ceased production original s8500 model screen capacitive touchscreen super amoled anti-smudge oleophobic coating top scratch-resistant tempered-glass gorilla glass display screen resolution 800x480 wvga 283 ppi phone features 1 ghz soc internally contains arm cortex a8 cpu core model apple a4 processor graphics engine device powervr sgx 540 gpu said capable generating 90 million triangles per second soc used samsung galaxy phone features 5 megapixel edof camera supports 2560 x 1920 pixels along autofocus led flash geo-tagging face blink detection image stabilization touch focus etc shooting modes include beauty shot smile shot continuous panorama vintage shot camcorder able shoot hd recording 1280x720 30 fps flash well also able record slow motion video 320x240 120 fps flash wave first phone samsung linux based operating system bada meaning ocean samsung worked later versions bada 1.2 later 2.0 bada 1.2 released world phased manner designed improve stability january 2012 samsung declared planning merge bada linux-based tizen operating system developed collaboration intel despite collaboration supported wave unofficial ports android made due restrictions eventual cease development bada versions ported include android froyo gingerbread ice cream sandwich jellybean kitkat lollipop marshmallow features include a-gps 2 gb/8 gb internal storage microsdhc slot additional 32 gb also magnetometer compass proximity sensor accelerometer 5.1-channel surround sound mobile theater music recognition fake call service smart search social hub first phone support bluetooth version 3.0 radio connectivity includes bluetooth 3.0 wi-fi 802.11 b/g/n hsdpa 3.6 mbit/s phone available european/asian 3g bandings north american 3g bandings north american 3g bandings version phone limited availability available us phone first smartphone feature samsung bada operating system platform ui samsung touch-wiz 3.0 touch-wiz 3.0 like two predecessors touch-wiz 2.0 touch-wiz utilizes widgets three notable widgets pre-installed touch-wiz 3.0 daily briefing includes essential information weather finance ap mobile news schedule feeds updates buddies allows users call send texts read facebook/twitter feeds favorite contacts users allowed 10 home screens add widgets internet browsing samsung wave dolphin browser v2.0 based webkit 3.0 depends firmware version browser supports flash disabled default improve page loading speed default phone comes picsel viewer capable reading .pdf microsoft office file formats users selected countries buy download picsel office editor samsung apps samsung apps users also download applications games widgets application store software includes gps software comes phone lbs route 66 facebook twitter social hub mini diary daily briefing memo video player fm radio media browser voice recorder e-mail pre-installed asphalt 5 samsung wave supports mp3 aac aac+ e-aac+ wma amr wav mp4 mpeg4 h.263 h.264 wmv flv divx xvid mkv flac file formats also supports subtitles many countries end december 2011 operating system gradually updated bada 2.0 first official bada 2.0 version la1 bada 2.0 touchwiz ui reached version 4.0 gui completely redone included many new features full multitasking wac voice commands text-to-speech speech-to-text chaton caster new version dlna social apps new dolphin 3.0 browser download manager reviews forums
Operating systems
optical mesh network optical mesh network type optical telecommunications network employing wired fiber-optic communication wireless free-space optical communication mesh network architecture optical mesh networks use fiber-optic communication operated internet service providers metropolitan regional also national international scenarios faster less error prone network architectures support backup recovery plans established networks case disaster damage failure currently planned satellite constellations aim establish optical mesh networks space using wireless laser communication transport networks underlying optical fiber-based layer telecommunications networks evolved digital cross connect system dcs -based mesh architectures 1980s sonet/sdh synchronous optical networking/synchronous digital hierarchy ring architectures 1990s dcs-based mesh architectures telecommunications carriers deployed restoration systems ds3 circuits fastar fast automatic restoration mci real time restoration rtr restoring circuits minutes network failure sonet/sdh rings carriers implemented ring protection sonet unidirectional path switched ring upsr also called sub-network connection protection scnp sdh networks sonet bidirectional line switched ring blsr also called multiplex section shared protection ring ms-spring sdh networks protecting recovering network failure 50 ms less significant improvement recovery time supported dcs-based mesh restoration key driver deployment sonet/sdh ring-based protection attempts improving and/or evolving traditional ring architectures overcome limitations trans-oceanic ring architecture defined itu-t rec g.841 p-cycles protection next-generation sonet/sdh equipment handle multiple rings ability close working protection ring side share protection capacity among rings e.g. virtual line switched ring vlsr technological advancements optical transport switches first decade 21st century along continuous deployment dense wavelength-division multiplexing dwdm systems led telecommunications service providers replace sonet ring architectures mesh-based architectures new traffic new optical mesh networks support fast recovery previously available ring networks achieving better capacity efficiency resulting lower capital cost fast recovery tens hundreds milliseconds case failures e.g. network link node failure achieved intelligence embedded new optical transport equipment allows recovery automatic handled within network part network control plane without relying external network management system optical mesh networks refer transport networks built directly mesh-like fiber infrastructure deployed metropolitan regional national international e.g. trans-oceanic areas deploying optical transport equipment capable switching traffic wavelength sub-wavelength level incoming fiber outgoing fiber addition switching wavelengths equipment typically also able multiplex lower speed traffic wavelengths transport groom traffic long equipment so-called opaque see subsection transparency finally equipment also provide recovery traffic case network failure transport networks evolve toward mesh topologies utilizing intelligent network elements optical cross-connects optical switches provisioning recovery services new approaches developed design deployment operations management mesh optical networks optical switches build companies sycamore ciena sts-1 granularity switching tellium sts-48 granularity switching deployed operational mesh networks calient built all-optical switches based 3d mems technology optical mesh networks today provide trunking capacity higher-layer networks inter-router inter-switch connectivity ip mpls ethernet-centric packet infrastructure also support efficient routing fast failure recovery high-bandwidth point-to-point ethernet sonet/sdh services several planned satellite constellations spacex starlink intended global internet provisioning aim establish optical mesh networks space constellations consisting several hundred thousand satellites use laser communication high-throughput optical inter-satellite links interconnected network architecture allows direct routing user data satellite satellite enables seamless network management continuity service optical mesh networks support establishment circuit-mode connection-oriented services multiple recovery mechanisms provide different levels protection restoration different failure modes available mesh networks channel- link- segment- path- protection common protection schemes p-cycles another type protection leverages extends ring-based protection restorationis another recovery method work complement faster protection schemes case multiple failures path-protected mesh networks connections unprotected others protected single multiple failures various ways connection protected single failure defining backup path diverse primary path taken connection mesh network backup path associated resources dedicated connection dedicated backup path protection aka dedicated 1+1 path protection subnetwork connection protection sncp sdh networks upsr sonet ring networks shared among multiple connections shared backup path protection typically ones whose primary paths likely fail time thereby avoiding contention shared resources case single link node failure number protection schemes use pre-emptible paths partially diverse backup paths implemented finally multiple diverse routes designed connection multiple recovery routes recover even multiple failures examples mesh networks across atlantic pacific oceans traditional transport networks made optical fiber-based links telecommunications offices multiple wavelengths multiplexed increase capacity fiber wavelengths terminated electronic devices called transponders undergoing optical-to-electrical conversion signal reamplification reshaping retiming 3r inside telecommunications office signals handled switched transport switch aka optical cross-connect optical switch either dropped office directed outgoing fiber link carried wavelengths multiplexed fiber link towards next telecommunications office act going optical-electrical-optical o-e-o conversion telecommunications office causes network considered opaque incoming wavelengths undergo optical-to-electrical conversion switched telecommunications office optical domain using all-optical switches also called photonic cross-connect optical add-drop multiplexer reconfigurable optical add-drop multiplexer roadm systems network considered transparent hybrid schemes leverage optical bypasses provide limited o-e-o conversions key locations across network referred translucent networks roadm-based transparent optical mesh networks deployed metropolitan regional networks since mid-2000s early 2010s operational long distance networks still tend remain opaque transmission limitations impairments prevent extension transparency beyond certain point routing key control operational aspect optical mesh networks transparent all-optical networks routing connections tightly linked wavelength selection assignment process so-called routing wavelength assignment rwa due fact connection remains wavelength end-to-end throughout network sometimes referred wavelength continuity constraint absence devices translate wavelengths optical domain opaque network routing problem one finding primary path connection protection needed backup path diverse primary path wavelengths used link independently several algorithms used combined determine primary path diverse backup path without sharing resource along backup path connection service shortest path including dijkstra algorithm k-shortest path yen algorithm edge node-diverse disjoint routing including suurballe algorithm numerous heuristics general however problems optimal routing dedicated backup path protection arbitrary shared risk link groups srlgs shared backup path protection np-complete deployment optical mesh networks enabling new services applications service providers offer customers also supports new network paradigms mesh networking general wireless mesh networking particular telecommunications networking telecommunications equipment packet networking connection-oriented networking availability
Distributed computing architecture
heterogeneous computing heterogeneous computing refers systems use one kind processor cores systems gain performance energy efficiency adding type processors adding dissimilar coprocessors usually incorporating specialized processing capabilities handle particular tasks usually heterogeneity context computing referred different instruction-set architectures isa main processor one processors another usually different architecture maybe one different microarchitecture floating point number processing special case usually referred heterogeneous example arm big.little exception isas cores heterogeneity refers speed different microarchitectures isa thus making like symmetric multiprocessor smp past heterogeneous computing meant different isas handled differently modern example heterogeneous system architecture hsa systems eliminate difference user using multiple processor types typically cpus gpus usually integrated circuit provide best worlds general gpu processing apart gpu well-known 3d graphics rendering capabilities also perform mathematically intensive computations large data-sets cpus run operating system perform traditional serial tasks level heterogeneity modern computing systems gradually increasing scaling fabrication technologies allows formerly discrete components become integrated parts system-on-chip soc example many new processors include built-in logic interfacing devices sata pci ethernet usb rfid radios uarts memory controllers well programmable functional units hardware accelerators gpus cryptography co-processors programmable network processors a/v encoders/decoders etc. recent findings show heterogeneous-isa chip multiprocessor exploits diversity offered multiple isas outperform best same-isa homogeneous architecture much 21 23 energy savings reduction 32 energy delay product edp amd 2014 announcement pin-compatible arm x86 socs codename project skybridge suggested heterogeneous-isa arm+x86 chip multiprocessor making heterogeneous computing systems present new challenges found typical homogeneous systems presence multiple processing elements raises issues involved homogeneous parallel processing systems level heterogeneity system introduce non-uniformity system development programming practices overall system capability areas heterogeneity include heterogeneous computing platforms found every domain computing—from high-end servers high-performance computing machines way low-power embedded devices including mobile phones tablets
Computer architecture
session poisoning session poisoning also referred session data pollution session modification method exploit insufficient input validation within server application typically server application vulnerable type exploit copy user input session variables underlying vulnerability state management problem shared state race condition ambiguity use plain unprotected modifications state values session poisoning demonstrated server environments different non-malicious applications scripts share session states usage differ causing ambiguity race conditions session poisoning demonstrated scenarios attacker able introduce malicious scripts server environment possible attacker victim share web host session poisoning first discussed potentially new vulnerability class full disclosure mailing list alla bezroutchko inquired session data pollution vulnerabilities web applications new problem january 2006 however old vulnerability previously noted others classic state management issue yvan boily new /someone earlier examples vulnerabilities found major security resources/archives bugtraq e.g session pollution also covered articles php session security przemek sobstel 2007 example code vulnerable problem subject trivial attacks problem could exist software problem codice_5 designed assumption page accessed non-malicious way anyone realizes script designed able craft http request sets logon user arbitrarily alla bezroutchko discusses scenario codice_6 used two different purposes race condition demonstrated reset scripts could exploited change logged user arbitrarily alla bezroutchko discusses examples observed development forums allows writing arbitrary session variables first example _get something probably selection box similar attack becomes codice_7 known enable security vulnerabilities several applications php server administrators recommended disable feature note real-world examples session poisoning enabled register_globals publicly demonstrated back july 2001 article serious security hole mambo site server version 3.0.x second example /someone vulnerable attack becomes 'unknown uw-team.org discusses scenario attacker victim shares php server attack fairly easy attack requires victim attacker share php server attack dependent victim attacker virtual hostname trivial attacker move session identifier cookie one cookie domain another
Computer security
teracopy teracopy freemium file transfer utility designed alternative built-in windows explorer file transfer feature focus data integrity file transfer reliability ability pause resume file transfers teracopy uses dynamically adjusted buffers reduce seek times asynchronous copy speeds file transfer two physical hard drives processes paused resumed case transfer errors teracopy try several times skips faulty file proceeds rest operation teracopy also shows failed file transfers allows user fix problem recopy problematic files teracopy offers explanation skipped files simply reports skipped may skip copying numerous reasons user could correct known too-long file name teracopy replace windows explorer copy move functions author asserts full unicode support teracopy example freemium licensing model basic edition offered freeware may used non-commercial environments teracopy pro shareware version utility adds additional features list favorite folders used copy destination ability modify copy queue 2007 ionut ilascu softpedia.com commended utility ability error recovery functionality concluded teracopy lot faster windows explorer xp proper defragmentation vista moves tad slower even defragmentation disk performed 2009 jason fitzpatrick lifehacker praised usability stating n't overwhelm plethora settings options also called advanced enough subsequently lifehacker visitors voted teracopy large margin best windows file copier four contestants 2010 review cnet called nifty piece freeware recommended windows users
Computer file systems
list blackberry products following partial list blackberry products blackberry line wireless handheld devices first introduced 1996 manufactured canadian company blackberry formerly known research motion rim two-way pager models thumb keyboards thumbwheel scrolling monochrome text display first model inter ctive pager announced september 18 1996 within year yankee group estimating devices like inter ctive pager use fewer 400,000 people expected two-way wireless messaging services attract 51 million users 2002 provided e-mail wap services limited html access provided via third party software wolfetech pocketgenie goamerica browser built use two 1g data-only packet switched networks mobitex datatac support java without use java virtual machine add-on models first blackberry models built-in mobile phone first models natively ran java transmitted data normal 2g cellular network rim began advertise devices email-capable mobile phones rather two-way pagers time primary market still businesses rather consumers 5810 released march 4 2002 aberration list 5790 released much later date niche model 2004 many color blackberry models non-phone blackberry made available due demand java-based model could run mobitex data-only network 5810/5820 shared physical casing keyboard layout earlier 957 device 6000 series launched 2003 6210 entering influential time time 100 gadgets list 2003 monochrome models revised include color screen retaining form factor casing early color models 7230 typically used dim electroluminescent backlight leading initial reputation poor image quality later color models 7290 typically used led backlight yielding much better screen quality color lcd screens used series either reflective transflective screens yielded better image quality direct sunlight even backlight turned nearly models list 16 mb models bluetooth model 32 mb bluetooth 7290 last model released early blackberry form factor first blackberry model bluetooth 7290 also first quad-band blackberry aberration list 7270 first wi-fi blackberry released later built old form factor vein 7200 series rim expanded market introducing first blackberry models without discrete qwerty keyboard candybar form factor developed predictive text technology called suretype qwerty-like layout using two keys per button using two letters per button rather three letters per button t9 using ten-digit keypads predictive text accuracy could improved dramatically use qwerty-like layout took advantage people memory computer keyboard since button roughly relative key time size blackberry could dramatically reduced keyboards needed 5-buttons wide rather 10-buttons wide blackberries became popular mass market became similarly sized competing consumer-market cellphones models among first blackberry models aggressively marketed consumers rather businesses rim continued manufacture qwerty models give market choice traditional qwerty thumb keyboard compressed suretype keyboard beginning 8700-series models 2006 rim began aggressively add consumer features blackberry models aim capture consumer market competitors treo motorola q progression models additions include better quality screens memory built-in chat software first cameraphone microsd memory card slot built-in mapping software consumer-specific features blackberry pearl 8100 first blackberry without trackwheel replaced miniature trackball enable full 4-way mouse-style navigation blackberry look new trackball gave pearl name 9000 series launched 2008
Operating systems
project formerly known kindle forkbomb project project formerly known kindle forkbomb work done swiss-austrian-american duo known ubermorgen artists known creative use digital media combined means performance various offline medium convey ideas project showcased ubermorgen website www.uuuuuuuntitled.com project name project formerly known kindle forkbomb broken better understand meaning behind work forkbomb term used computing describing attack computer process continuously self-replicates machine resources depleted system crashes art project depicts machine process strips comments youtube uses algorithm compile comments finally titling work video title respective uploader make book book uploaded kindle publishing service placed kindle store machine monitors books making sure enough sales made keep alive store n't thriving store machine directed purchase copies thus prolonging shelf-life using process artists message intent show easily could clog store rapidly multiplying number books hence kindle forkbomb example critique digital world problems poses merely demonstration makes easier visualize world live ubermorgen describes media created human-machine combination creation new genre decentralized fiction writing artist group says books compressed form contemporary world describe snapshot frozen time type work form art sometimes referred uncreative spurred famous writer kenneth goldsmith efforts uncreative writing examples works produced project one thing note cover books feature uploader video title underneath everything text string bash shell version computer forkbomb following reference link takes website aloud read full pdf version books one project similar stephanie barber american artist uses many forms media art project relates kindle forkbomb book titled night moves book grouping youtube comments bob seger song night moves
Computer security
syslog computing syslog standard message logging allows separation software generates messages system stores software reports analyzes message labeled facility code indicating software type generating message assigned severity level computer system designers may use syslog system management security auditing well general informational analysis debugging messages wide variety devices printers routers message receivers across many platforms use syslog standard permits consolidation logging data different types systems central repository implementations syslog exist many operating systems syslog developed 1980s eric allman part sendmail project readily adopted applications since become standard logging solution unix-like systems variety implementations also exist operating systems commonly found network devices routers syslog originally functioned de facto standard without authoritative published specification many implementations existed incompatible internet engineering task force documented status quo rfc 3164 standardized rfc 5424 various companies attempted claim patents syslog implementations little effect use standardization protocol information provided originator syslog message includes facility code severity level syslog software adds information information header passing entry syslog receiver components include originator process id timestamp hostname ip address device facility code used specify type program logging message messages different facilities may handled differently list facilities available defined standard mapping facility code keyword uniform different operating systems syslog implementations list severities also defined standard meaning severity levels emergency debug relative application example purpose system process transactions update customer account balance information error final step assigned alert level however error occurring attempt display zip code customer may assigned error even warning level server process handles display messages usually includes lower severe levels display less severe levels requested messages separated individual severity warning level entry also included filtering notice info debug messages rfc 3164 message component known msg specified fields tag name program process generated message content contains details message described rfc 5424 msg called content rfc 3164 tag part header single field tag split app-name procid msgid totally resemble usage tag provides functionality cases popular syslog tools rsyslog conform new standard content field encoded utf-8 character set octet values traditional ascii control character range avoided generated log messages may directed various destinations including console files remote syslog servers relays implementations provide command line utility often called logger well software library send messages log display monitor collected logs one needs use client application access log file directly system basic command line tools tail grep log servers configured send logs network addition local files implementations include reporting programs filtering displaying syslog messages operating network syslog uses client-server architecture server listens well-known registered port protocol requests clients historically common transport layer protocol network logging user datagram protocol udp server listening port 514 udp lacks congestion control mechanisms support transport layer security required implementations recommended general use transmission control protocol tcp port 6514 since process application operating system written independently little uniformity payload log message reason assumption made formatting contents syslog message formatted rfc 5424 gives augmented backus–naur form abnf definition msg field network protocol simplex communication means acknowledging delivery originator various groups working draft standards detailing use syslog network security event logging proposed application within healthcare environment regulations sarbanes-oxley act pci dss hipaa many others require organizations implement comprehensive security measures often include collecting analyzing logs many different sources syslog format proven effective consolidating logs many open-source proprietary tools reporting analysis logs utilities exist conversion windows event log log formats syslog managed security service providers attempt apply analytical techniques artificial intelligence algorithms detect patterns alert customers problems syslog protocol defined request comments rfc documents published internet engineering task force internet standards following list rfcs define syslog protocol
Internet protocols
grammar induction grammar induction grammatical inference process machine learning learning formal grammar usually collection re-write rules productions alternatively finite state machine automaton kind set observations thus constructing model accounts characteristics observed objects generally grammatical inference branch machine learning instance space consists discrete combinatorial objects strings trees graphs grammatical inference often focused problem learning finite state machines various types see article induction regular languages details approaches since efficient algorithms problem since 1980s since beginning century approaches extended problem inference context-free grammars richer formalisms multiple context-free grammars parallel multiple context-free grammars classes grammars grammatical inference studied contextual grammars pattern languages simplest form learning learning algorithm merely receives set examples drawn language question aim learn language examples rarely counter-examples example belong language however learning models studied one frequently studied alternative case learner ask membership queries exact query learning model minimally adequate teacher model introduced angluin wide variety methods grammatical inference two classic sources also devote brief section problem cite number references basic trial-and-error method present discussed approaches infer subclasses regular languages particular see induction regular languages recent textbook de la higuera 2010 covers theory grammatical inference regular languages finite state automata d'ulizia ferri grifoni provide survey explores grammatical inference methods natural languages method proposed section 8.7 suggests successively guessing grammar rules productions testing positive negative observations rule set expanded able generate positive example given rule set also generates negative example must discarded particular approach characterized hypothesis testing bears similarity mitchel version space algorithm text provide simple example nicely illustrates process feasibility unguided trial-and-error approach substantial problems dubious grammatical induction using evolutionary algorithms process evolving representation grammar target language evolutionary process formal grammars easily represented tree structures production rules subjected evolutionary operators algorithms sort stem genetic programming paradigm pioneered john koza early work simple formal languages used binary string representation genetic algorithms inherently hierarchical structure grammars couched ebnf language made trees flexible approach koza represented lisp programs trees able find analogues genetic operators within standard set tree operators example swapping sub-trees equivalent corresponding process genetic crossover sub-strings genetic code transplanted individual next generation fitness measured scoring output functions lisp code similar analogues tree structured lisp representation representation grammars trees made application genetic programming techniques possible grammar induction case grammar induction transplantation sub-trees corresponds swapping production rules enable parsing phrases language fitness operator grammar based upon measure well performed parsing group sentences target language tree representation grammar terminal symbol production rule corresponds leaf node tree parent nodes corresponds non-terminal symbol e.g noun phrase verb phrase rule set ultimately root node might correspond sentence non-terminal like greedy algorithms greedy grammar inference algorithms make iterative manner decisions seem best stage decisions made usually deal things like creation new rules removal existing rules choice rule applied merging existing rules several ways define 'the stage 'the best also several greedy grammar inference algorithms context-free grammar generating algorithms make decision every read symbol context-free grammar generating algorithms first read whole given symbol-sequence start make decisions recent approach based distributional learning algorithms using approaches applied learning context-free grammars mildly context-sensitive languages proven correct efficient large subclasses grammars angluin defines pattern string constant symbols σ variable symbols disjoint set language pattern set nonempty ground instances i.e strings resulting consistent replacement variable symbols nonempty strings constant symbols pattern called descriptive finite input set strings language minimal respect set inclusion among pattern languages subsuming input set angluin gives polynomial algorithm compute given input string set descriptive patterns one variable x end builds automaton representing possibly relevant patterns using sophisticated arguments word lengths rely x variable state count drastically reduced erlebach et al give efficient version angluin pattern learning algorithm well parallelized version arimura et al show language class obtained limited unions patterns learned polynomial time pattern theory formulated ulf grenander mathematical formalism describe knowledge world patterns differs approaches artificial intelligence begin prescribing algorithms machinery recognize classify patterns rather prescribes vocabulary articulate recast pattern concepts precise language addition new algebraic vocabulary statistical approach novel aim broad mathematical coverage pattern theory spans algebra statistics well local topological global entropic properties principle grammar induction applied aspects natural language processing applied among many problems semantic parsing natural language understanding example-based translation morpheme analysis place name derivations grammar induction also used lossless data compression statistical inference via minimum message length mml minimum description length mdl principles grammar induction also used probabilistic models language acquisition
Computational linguistics
signaling compression signaling compression sigcomp compression method designed especially compression text-based communication data sip rtsp sigcomp originally defined rfc 3320 later updated rfc 4896 negative acknowledgement mechanism signaling compression defined rfc 4077 sigcomp work performed rohc working group transport area ietf sigcomp specifications describe compression schema located application layer transport layer e.g sip udp implemented upon virtual machine configuration executes specific set commands optimized decompression purposes namely udvm universal decompressor virtual machine one strong point sigcomp bytecode decode messages sent sigcomp allows use kind compression schema given expressed bytecode udvm thus sigcomp compatible device may use compression mechanisms exist released without firmware change additionally decoders may already standardised sigcomp may recall code needed sent connection assure message decodable requirement udvm code available compression messages executed virtual machine native code used independent system mechanism signal application conversation e.g given sip session compartment mechanism used given application may given number different independent conversations persisting session status needed/specified per compression schema udvm code
Internet protocols
symbian foundation symbian foundation non-profit organisation stewarded symbian operating system mobile phones previously owned licensed symbian ltd.. symbian foundation never directly developed platform evangelised co-ordinated ensured compatibility also provided key services members community collecting building distributing symbian source code time competed open handset alliance limo foundation foundation founded nokia sony ericsson ntt docomo motorola texas instruments vodafone lg electronics samsung electronics stmicroelectronics due change device strategy lg motorola left foundation board soon creation later replaced fujitsu qualcomm innovation center operational phase 2009 2010 also provided symbian foundation invited companies join members attracted 200 large number categories following change focus funding board members symbian foundation announced november 2010 would transition legal entity responsible licensing software intellectual property operational responsibilities staff transition result changes global economic market conditions widely attributed stiff competition os ios android along announcement nokia announced would take governance symbian platform nokia major contributor code maintaining code repository platform development ever since purchase symbian ltd. regularly releasing development public repository 17 december 2010 symbian foundation public web sites wiki code repositories shut nokia launched new symbian site however year samsung sony ericsson left foundation favor google open handset alliance android operating system leaving japan ntt docomo major nokia partner announcement nokia partnership microsoft february 2011 transition windows phone os primary platform development symbian stopped outsourced accenture nokia closed service end 2012 transition completed april 2011 symbian foundation remain trademark holder licensing entity non-executive directors involved
Operating systems
ehcache ehcache open source java distributed cache general purpose caching java ee ehcache available apache open source license ehcache developed greg luck starting 2003 2009 project purchased terracotta provides paid support software still open source new major functionalities fast restartability consistency available commercial products like enterprise ehcache bigmemory open source march 2011 wikimedia foundation announced would use ehcache improve performance wiki projects however quickly abandoned testing revealed problems approach name ehcache palindrome
Operating systems
peter van der linden peter van der linden born 1963 dutch technologist author worked companies sun microsystems apple computer written books java c linux practical jokes currently 2010 android technology evangelist motorola mobility
Operating systems
zeta distribution probability theory statistics zeta distribution discrete probability distribution x zeta-distributed random variable parameter probability x takes integer value k given probability mass function ζ riemann zeta function undefined 1 multiplicities distinct prime factors x independent random variables riemann zeta function sum terms formula_8 positive integer k appears thus normalization zipf distribution terms zipf distribution zeta distribution often used interchangeably note zeta distribution probability distribution associated zipf law exponent see also yule–simon distribution zeta distribution defined positive integers formula_9 probability mass function given formula_11 parameter formula_12 riemann zeta function cumulative distribution function given formula_14 generalized harmonic number n th raw moment defined expected value x series right series representation riemann zeta function converges values s-n greater unity thus note ratio zeta functions well defined even n − 1 series representation zeta function analytically continued change fact moments specified series therefore undefined large n moment generating function defined series definition polylogarithm valid formula_19 taylor series expansion function necessarily yield moments distribution taylor series using moments usually occur moment generating function yields obviously well defined finite value since moments become infinite large n use analytically continued terms instead moments obtain series representation polylogarithm formula_23 formula_24 given h harmonic number ζ 1 infinite harmonic series case 1 meaningful however set positive integers density i.e exists n n number members less equal n equal density latter limit also exist cases density example set positive integers whose first digit density nonetheless second limit given exists proportional benford law zeta distribution constructed sequence independent random variables geometric distribution let formula_31 prime number formula_32 random variable geometric distribution parameter formula_33 namely formula_34 random variables formula_35 independent random variable formula_36 defined formula_37 zeta distribution formula_38 stated differently random variable formula_39 infinitely divisible lévy measure given following sum dirac masses formula_40 power-law distributions
Computational linguistics
comparison backup software feature comparison backup software general comparison see list backup software
Computer security
uptime uptime measure system reliability expressed percentage time machine typically computer working available uptime opposite downtime often used measure computer operating system reliability stability time represents time computer left unattended without crashing needing rebooted administrative maintenance purposes conversely long uptime may indicate negligence critical updates require reboots platforms 2005 novell reported server 6-year uptime although might sound unusual actually common servers maintained industrial context host critical applications banking systems netcraft maintains uptime records many thousands web hosting computers server running novell netware reported shut 16 years uptime due failing hard disk versions microsoft windows include uptime field windows task manager performance tab format hh mm ss days hours minutes seconds output codice_1 command includes system time system boot time field exact text format dependent language locale time given codice_1 reliable take account time spent sleep hibernation thus boot time drifts forward every time computer sleeps hibernates codice_3 command codice_4 sub-command provides date time computer started codice_5 codice_6 variants command codice_7 shorthand codice_6 exact text date format dependent configured language locale uptime determined via windows management instrumentation wmi querying codice_9 property codice_10 class command prompt done using codice_11 command timestamp uses format codice_12 example computer last booted 8 may 2011 16:17:51.822 text lastbootuptime timestamp format vary language locale wmi also queried using variety application programming interfaces including vbscript powershell microsoft formerly provided downloadable utility called codice_13 reports elapsed time days hours minutes seconds time given codice_13 reliable take account time spent sleep hibernation thus boot time drifts forward every time computer sleeps hibernates codice_15 command also available freedos version developed m. aitchison users linux systems use bsd uptime utility also displays system load averages past 1 5 15 minute intervals shows long system since last restarted first number total number seconds system second number much time machine spent idle seconds multi core systems linux versions second number sum idle time accumulated cpu bsd-based operating systems freebsd mac os x sysvr4 uptime command see also method using sysctl call system last boot time openvms systems codice_16 command used dcl command prompt obtain system uptime first line resulting display includes system uptime displayed days followed hours minutes seconds following example command qualifier codice_17 suppresses display per-process detail lines information
Computer architecture
trusted network connect trusted network connect tnc open architecture network access control promulgated trusted network connect work group tnc-wg trusted computing group tcg tnc architecture first introduced rsa conference 2005 tnc originally network access control standard goal multi-vendor endpoint policy enforcement 2009 tcg announced expanded specifications extended specifications systems outside enterprise network additional uses tnc reported include industrial control system ics scada security physical security specifications introduced tnc work group partial list vendors adopted tnc standards also networking u.s. army planned use technology enhance security computer networks south carolina department probation parole pardon services tested tnc-scap integration combination pilot program
Computer security
macintosh quadra 650 macintosh quadra 650 originally called macintosh centris 650 personal computer designed manufactured sold apple computer february 1993 september 1994 centris 650 introduced alongside smaller centris 610 replacement macintosh iici iivi quadra 700 intended start new midrange centris line computers later 1993 apple decided follow emerging industry trend naming product families target customers – quadra business lc education performa home – folded centris 650 quadra family quadra 650 discontinued without direct replacement september 1994 although recently introduced power macintosh 7100 iivx form factor 650 similar target audience sold price range standard equipment centris 650 models includes onboard video vga support via adapter 3 nubus slots processor direct slot two adb two serial ports external scsi connector four simm slots support 4 8 16 32 mb simms allowing maximum 132 136 mb ram depending configuration ethernet-capable models aaui port system 7.1 included standard minimum required version introduced february 10 1993 introduced october 21 1993
Computer architecture
ws-addressing web services addressing ws-addressing specification transport-neutral mechanism allows web services communicate addressing information essentially consists two parts structure communicating reference web service endpoint set message addressing properties associate addressing information particular message ws-addressing standardized way including message routing data within soap headers instead relying network-level transport convey routing information message utilizing ws-addressing may contain dispatch metadata standardized soap header network-level transport responsible delivering message dispatcher capable reading ws-addressing metadata message arrives dispatcher specified uri job network-level transport done ws-addressing supports use asynchronous interactions specifying common soap header wsa replyto contains endpoint reference epr response sent service provider transmits response message separate connection wsa replyto endpoint decouples lifetime soap request/response interaction lifetime http request/response protocol thus enabling long-running interactions span arbitrary periods time endpoint reference epr xml structure encapsulating information useful addressing message web service includes destination address message additional parameters called reference parameters necessary route message destination optional metadata wsdl ws-policy service message addressing properties communicate addressing information relating delivery message web service ws-addressing originally authored microsoft ibm bea sun microsystems sap submitted w3c standardization w3c ws-addressing working group refined augmented specification process standardization ws-addressing currently specified three parts web services policy attachment endpoint reference ws-paepr specifies mechanism meaning including ws-policy expressions endpoint references ws-paepr w3c member submission
Web technology
open source kosovo first project open source kosovo adjustment open office packet december 2003 28 july 2004 albanian team users linux ggsl one first public organizations purpose getting information field open source conference called software freedom day software freedom day known first initiative foss kosovo level conference purpose conference promote free open software issues discussed linux free software open sources general another issue discussed conference operative system linux benefits kde gnome last issues discussed conference ati-kos made surveys five municipal assemblies kosovo may 2005 according survey 98.6 wanted software box mother tongue albanian another survey majority participants believed software box like open office would help increasing productivity different fields interface albanian free libre open source software kosova flossk floss kosova non-governmental organization established march 2009 promotes free open-source software initiative undertaken james michael dupont association volunteers kosovo first results organization seen august year faculty electrical computer engineering held first conference organization conference became tradition held every year conference resulted biggest conference region called “ software freedom kosova 2009 ” promoted free open-source software growth knowledge maps active members members around kosovo abroad february 2009 first person started teaching lessons operative system linux kosovo james micheal dupont courses held idi mainly concerned basic elements using linux benefits systems june year students continued teach lessons linux open street map one projects contributes mostly open source kosovo many members open street map community worked project companies like 'logisticplus companies well beginnings seen map made brod town brod town endangered environmental damages mountains sharri project introduced joachim bergerhoff told flossk un-habitat project flossk helped development project map created community included cities towns brod gjilan gjakovë ferizaj prizren pejë prishtinë interesting project also project shkodra 2010 community helped survivors flooding find streets project 'kumevotu.info project youngsters flossk less two weeks duty project help people find place vote project held 12 december 2010 dedicated especially elections year 2010 project based open street map user gives personal data interesting map find place vote project useful even youngsters participated creating olpc one attractive projects open source kosovo dedicated children olpc project dedicated poor places basic thing laptop used children learn system linux laptop based version fedora basic applications also equipped wifi people could browse internet learn new things project supported since first steps flossk different conferences project welcomed kosovo albanian community open source kosovo active field wikipedia wikimedia community dealing mainly promoting open knowledge wikipedia translating albanian made easier community informed everything initiative made flossk resulted 31,458 articles albanian language 2013 conference held called 'wikiacademykosovo direct way adding articles wikipedia project 'fedora one open source projects also active kosovo promoted distributed two ambassadors kosovo ardian haxha gent thaqi flossk association ambassadors fedras kosovo always organizes parties announce new versions mozilla firefox community active kosovo one projects flossk also promoting mozilla project ambassadors kosovo altin ukshini gent thaqi heroid shehu active promoting mozilla project kosovo also projects platform drupal flossk association unicef lab managed organize training project 6 may dave hall member free software counselor administrator systems australia participants trained knowledge drupal ways using developing cms 29 30 august 2009 first annual conference “ software freedom kosova 2009 ” held premises faculty engineering organized free libre open source software kosova flossk university pristina conference presented public figures world free open source software presented kosovo also james michael dupont – co-founder flossk conference promoted free open-source software also aim exchange experiences speakers audiences 40 topics lectures various fields ranging issues related wikipedia free encyclopedia linux intellectual property licenses building communities programming languages php python given features mentioned conference freely called one extensive southeast europe “ software freedom kosova 2010 ” held second time 25-26 september capital city kosovo prishtina sfk10 organized floss kosovo faculty electrical engineering computer fiek university pristina conference time last time focused 24 lectures kosovo region world main lecturers also guests honor conference renowned hacker fk10 prepared thanks job almost year organizing committee also topics also offered conference held premises faculty electrical computer engineering time spending tradition continued almost middle november exactly 12th 2011 organized next conference “ software freedom kosova 2011 ” one largest activities field 300 participants conference one successful held till local regional speakers full intensive day much topics touched world free software one held day focused topic “ business open source ” introductory remarks made public curious topics presented first half day second part day presentations finally long-awaited final presentation held omer keser google executive spoke google mobile applications detailing number users mobile devices numbers territories world development mobile phone use across different states conference focused aim meeting point network individuals companies sponsoring also initiating projects benefit people kosovo establishing one european centers floss soon possible result commercial benefits country aim could achieve kosovo businesses public introduce low cost alternatives rather expensive proprietary software promote respect legal licenses introduce public best methods localization software knowledge kind activity present lecturers business world use floss commercial development projects also present examples companies region using floss competitive leg outsourcing european market moreover presenting free code build helps entry level professionals companies build skills work leader towards value added projects open source software conference related developments knowledge culture mapping held prishtina kosovo largest conference kind region conference organized free libre open source kosova flossk kosovo association information oommunication technology ipko foundation faculty electrical engineering university pristina conference focused web technologies standards-based vendor html5 javascript like especially important consider recent developments global scene related touch-optimized applications mobile web fact software development kosovo centers web technologies conference held 8-9 september faculty electrical computer engineering prishtina software freedom kosova 2013 nonprofit conference 5th time edition organized flossk new details released regarding agenda speakers presented 7 september 2013 first day conference topics discussed include mobile open web hacker spaces data protection freelancing code sharing scaling cloud one first time changed traditional location organizing faculty education university pristina 170 participants many speakers welcome note done arianit dobroshi altin ukshini ardian haxha thankful anyone presented speakers donators lecture presented alex lakatos java script developer mozilla representative based cluj-napoca redon skikuli mozilla representative one co-founders design everview tirana arianit dobroshi one main member since beginning flossk arbnor hasani currently involved innovations lab kosovo design center ana risteska contributor gnome project burim shala wordpress theme developer two next days conference held place focused practical things participants like tuning postagre sql bert desmet awesome html5/css3 vleran dushi wordpress template development burim shala wmkit arduino workshop redon sikuli november 2004 klina municipality started project change computer network linux openoffice.org first part project charged firefox openoffice.org second part charged linux 3rd 6 november year 70 municipality computer network english language openoffice.org firefox albanian proliferation open source software products benefits many companies government kosovo costs significantly lower security higher undp foss club also trained municipal employees survey conducted end training 100 employees stated prefer software albanian language project translation openoffice.org albanian language started year undp foss team consisted members bulgaria kosovo 4 june 2010 richard stallman activist programmer free software visited kosovo lectured topic free digital society national library kosovo lecture freedom digital society threats welcomed large number participants lecture richard stallman mentioned many countries digital freedom directly violated denmark australia countries many webpages closed unclear reasons emphasized presence free software freedom educational institutions really necessary countries want advance societies use free software want dependent software pay also emphasized today meeting minister education kosovo offered help implementation free software schools kosovo help country develop free independent weak working project powerful give others also opportunity get knowledge freedom software richard stallman end richard stallman answered many questions put forth participants room 22-24 february faculty education near university pristina held first academy called wikiacademykosovo idea conference promote kosovo digital world emphasize good things new qualitative articles pictures wikimedia propaganda present kosovo threat idea kosovo country academy revealed articles cultural heritage social issue geography institutions economy tourism also starting point improve actual image kosovo number mentors wikipedia present event advised writers writings result writings became qualitative winners academy writings academy supported ministry internal affairs republic kosovo great britain ambassy royal ambassy norway british council ipko foundation kosovar organization flossk
Operating systems
information repository information technology repository central place aggregation data kept maintained organized way usually computer storage may aggregation data accessible place storage may also imply ability selectively extract data concept universal digital library described within reach 2012 la times article universal digital library within reach told google attempts mass-digitize termed orphan works out-of-print copyrighted works u.s copyright office european union working google reached agreements france lets publisher choose works scanned sold contrast google trying usa free digitize sell works unless copyright holders opted deal still unsuccessful attempts develop called information repository underway decades federated information repository easy way deploy secondary tier data storage comprise multiple networked data storage technologies running diverse operating systems data longer needs primary storage protected classified according captured metadata processed de-duplicated purged automatically based data service level objectives requirements federated information repositories data storage resources virtualized composite storage sets operate federated environment federated information repositories developed mitigate problems arising data proliferation eliminate need separately deployed data storage solutions concurrent deployment diverse storage technologies running diverse operating systems feature centralized management deployed data storage resources self-contained support heterogeneous storage resources support resource management add maintain recycle terminate media track off-line media operate autonomously since one main reasons implementation federated nformation repository reduce maintenance workload placed staff traditional data storage systems federated information repositories automated automation accomplished via policies process data based time events data age data content policies manage following data processed according media type storage pool storage technology federated information repositories intended reduce staff workload designed easy deploy offer configuration flexibility virtually limitless extensibility redundancy reliable failover federated information repositories feature robust client based data search recovery capabilities based permissions enable end users search information repository view information repository contents including data off-line media recover individual files multiple files either original network computer another network computer
Computer security
centurion guard centurion guard pc hardware software based security product developed centurion technologies released 1996 many different releases versions product many distributed bill melinda gates foundation computers donated libraries
Computer security
detection intrusions malware vulnerability assessment detection intrusions malware vulnerability assessment dimva event annual conference designed serve general forum discussing malware vulnerability computing systems attacks advancing computer security exchange ideas one projects german informatics society gi according official dimva website 2017 event year dimva brings together international experts academia industry government present discuss novel research areas said conference held 6 july 7 july city bonn germany sponsored entities google rohde schwarz vmray conference report demonstrated externally manipulate alfa romeo giulietta networked safety systems essentially hack vehicle attracted notice publications fiat chrysler authority
Computer security
atari dos atari dos disk operating system used atari 8-bit family computers operating system extensions loaded memory required order atari computer manage files stored disk drive extensions operating system added disk handler file management features important extension disk handler atari dos 2.0 file management system fms implementation file system loaded floppy disk meant least additional ram needed run dos loaded several versions atari dos available first version released 1979 atari using cross assembler data general aos first version dos atari commands accessible menu bundled 810 disk drives version entirely memory resident made fast occupied memory space second popular version dos atari bundled 810 disk drives early 1050 disk drives considered lowest common denominator atari doses atari-compatible disk drive read disk formatted dos 2.0s dos 2.0s consisted codice_1 codice_2 codice_1 loaded memory codice_2 contained disk utilities loaded user exited dos addition bug fixes dos 2.0s featured improved codice_5 support ability automatically run atari executable file named codice_6 since user memory erased codice_2 loaded option create codice_8 file added stored user memory temporary file codice_8 restored codice_2 unloaded previous menu option dos 1.0 codice_11 replaced codice_12 dos 2.0s version 2.0s single-density disks 2.0d double-density disks 2.0d shipped 815 dual disk drive expensive incompatible standard 810 thus sold small number making dos version 2.0d rare unusual new version dos came originally bundled 5.25-inch atari 1050 disk drive made use new enhanced density ed capability referred atari dual density confused later extra-high density ed perpendicular recording floppy disks offered 1050 increased storage 88 kb 130 kb per disk single density 88 kb formatting option maintain compatibility older atari 810 disk drives organizing sectors blocks atari anticipating larger capacity floppy disks resulted incompatibility dos 2.0s files converted dos 3 could converted back dos 2.0 result dos 3 extremely unpopular gain widespread acceptance amongst atari user community dos 3 provided built-in help via atari help key and/or inverse key help files needed present system dos disk function properly dos 3 also used special xio commands control disc operations within basic programs version 2.5 upgrade 3.0 listening complaints customers atari released improved version previous dos allowed use enhanced density disks utility read dos 3 disks additional option added menu codice_13 format single-density disks dos 2.5 shipped 1050 disk drives early xf551 disk-drives included utilities codice_14 codice_15 codice_16 codice_17 dos 4.0 designed never-released 1450xld rights returned author michael barall placed public domain later published antic software dos 4.0 used blocks instead single sectors supported single enhanced double density well single- double-sided drives dos 4.0 compatible dos 2 3 disks could read files also automatically switch densities necessary go menu manually select correct density dos xe supported double-density double-sided capabilities atari xf551 drive well burst i/o dos xe used new disk format incompatible dos 2.0s dos 2.5 requiring separate utility reading older 2.0 files also required bank-switched ram run 400/800 machines supported date-stamping files sub-directories dos xe last dos made atari atari 8-bit family many doses released manufacturers third-party drives anyone made drive modifications anyone dissatisfied available doses often doses could read disks higher densities could set drive read disks faster using warp speed ultra-speed techniques doses except spartados dos 2.0 compatible someone atari hacker community modified dos 2.0 add features allow use dual density disk drives look feel dos 2.0 one new feature added radix one could use translate hexadecimal numbers base 10 base 10 hex menu driven dos compatible dos 2.0 among first third-party dos programs support double-density drives many enhancements including sector copying verifying speed checking turning on/off file verifying drive reconfiguration published rana systems written john chenoweth ron bieber last version 8.2d dos produced optimized systems software compatible dos 2.0 allowed use double density floppies unlike atari dosses used command line instead menu dos xl provided menu program addition command line dos could read ss/sd ss/ed ss/dd ds/dd disks made use known methods speeding disk-reads supported various third-party drive manufacturers published technical support written paul nicholls menu driven dos enhanced features sorts disk directory listings set display options file directory compressed display deleted files undelete advanced features required proprietary top-dos format published eclipse software written r. k. bennett dos supports turbo 1050 happy speedy xf551 us doubler highspeed drives xl/xe published martin reitershan computertechnik written herbert barth frank bruchhäuser dos adds ability use sub-directories supports hard-drives published wordmark systems includes complete source code dos used command-line interface compatible dos 2.0 could read dos 2.0 disks supports subdirectories hard drives capable handling filesystems sized 16 mb included capability create primitive batch files sophisticated version spartados strongly resembles ms-dos look feel shipped 64 kb rom cartridge spartados compatible dos fact renamed version spartados 3.x due legal reasons realdos shareware stephen j. carden ken ames spartados compatible dos last version 1.30 released december 1995 much lower memory footprint compared original spartados use ram rom xl/xe machines allowing used older atari 400/800 models bw-dos freeware jiří bernasek xdos freeware stefan dorndorf number different formats existed atari disks atari dos 2.0s single-sided single-density disk 720 sectors divided 40 tracks formatting 707 sectors free 128-byte sector used last 3 bytes housekeeping data bytes used file number next sector leaving 125 bytes data meant disk held 707 × 125 88,375 bytes user data single-density disk holding mere 88 kb per side remained popular atari 8-bit disk format throughout series lifetime almost commercial software continued sold format variants modified copy protection since compatible atari-made disk drives 1978 percom established double-density layout standard manufacturers atari-compatible disk drives indus amdek rana —except atari itself— followed configuration block 12 bytes defines disk layout
Operating systems
channel bank telecommunications channel bank device performs multiplexing demultiplexing demux group communications channels analog digital telephone lines one channel higher bandwidth higher digital bit rate ds-1 t1 circuit channels sent simultaneously single cable called trunkline channel bank may located telephone exchange enterprise telephone closet enclosure breaks individual telephone lines high-capacity telephone trunk line connected central telephone office enterprise pbx system
Internet protocols
lizardfs lizardfs open source distributed file system posix-compliant licensed gplv3 released 2013 fork moosefs lizardfs distributed scalable fault-tolerant file system achieved spreading data several physical servers associated physical data storage storage presented end-user single logical name space file system designed possible add disks servers “ fly ” without need server reboots shut-downs lizardfs used underlying distributed file system product developed cloudweavers uses opennebula cloud management platform marketed hyper-converged infrastructure possible use cases include storage cloud hosting services render farms backups high availability native microsoft windows client licensed features available support contract alternatively time-limited trial version windows client available high availability achieved manually scripting
Computer file systems
hundra video game hundra action game developed spanish studio zeus software published dinamic software amstrad cpc msx zx spectrum 1988 loosely inspired 1983 film hundra based hundra well received spanish press including review scores 44/50 amstrad accion 9/10 micromania game famous erotic cover art best title art 1988 award microhobby
Computer architecture
alsamixer alsamixer graphical mixer program advanced linux sound architecture alsa used configure sound settings adjust volume ncurses user interface require x window system supports multiple sound cards multiple devices top-left corner alsamixer area show basic information card name mixer chip name current view mode currently selected mixer item mixer item switched displayed name volume bars located basic information area scroll left/right controls put single screen name control shown bottom volume bars currently selected item drawn red and/or emphasized mixer control volume capability shows box current volume filled box volume percentages displayed volume bar left right channels mono control one value shown mixer control turned mute appears volume bar turned green appears instead toggle switch via key mixer control capture capability capture flag appears volume bar capture turned -- -- -- shown capture red appears capture switch turned addition l r letters appear left right side indicate left right channels turned controls enumeration list n't show boxes texts indicate currently active item change item via up/down keys alsamixer three view modes playback capture playback view controls related playback shown similarly controls capture recording shown capture view view mode shows controls current view mode displayed top-left position together mixer name etc default view mode playback view changed via -v option also view mode switched via keyboard commands alsamixer comes tui started different keys used configure sound cards tui recognizes following keyboard commands configure available soundcards commands shown upper case also given lower case reminded keystrokes hit key press open list available sound cards precise list cards advanced linux sound architecture alsa device driver successfully loaded either boot-up per codice_1 command command codice_2 print list currently loaded device drivers arrow keys used select channel device depending preferred terminology also use n next p previous keys control volume currently selected device also use purpose left right signals affected control independently use increase decrease volume left channel increases volume right channel decreases function keys used change view modes switch help mode proc info mode via f1 f2 keys respectively terminals ca n't use function keys like gnome terminal keys used alternatively help proc modes keys used switch playback capture view mode respectively tab key toggles current view mode circularly quit program alt+q hitting esc key please note might need hit esc twice terminals since regarded prefix key
Operating systems
canon t90 canon t90 introduced 1986 top line canon series 35 mm single-lens reflex slr cameras last professional-level manual-focus camera canon last professional camera use canon fd lens mount although overtaken autofocus revolution canon new incompatible eos electro-optical system year production t90 pioneered many concepts seen high-end canon cameras present day particularly user interface industrial design high level automation due ruggedness t90 nicknamed tank japanese photojournalists many still rated highly even 20+ years introduction previous canon cameras wholly in-house design projects t90 canon brought german industrial designer luigi colani collaboration canon designers final design composed colani ideas kunihisa ito ods co. ltd. incorporating colani distinctive bio-form curvaceous shapes canon considered colani contribution important enough present first production t90 body engraved name computer-aided design techniques introduced canon t90 well use computer controlled cnc milling machines make molding dies shell much work went human factors engineering create ergonomic user interface camera form previous cameras largely dictated required locations mechanical controls body film advance lever rewind crank shutter speed dial shutter release etc t90 film transport control longer required others longer mechanically linked gave designers freedom shape camera make easier control hold place controls way suited user rather mechanical design t90 introduced features still used slr cameras today use lcd screen top camera right hand side new t90 – introduced t70 – t90 refined show even camera information control wheel located behind shutter release convenient right index finger used adjust camera settings conjunction buttons located right thumb left-hand side camera design still used canon digital slrs current production t90 includes integral motor driven film advance focal plane shutter mirror aperture cocking rewind functions canon broke new ground powered features camera previously cameras used one powerful electric motor geared functions instead t90 three coreless micromotors within body close functions drive maximum mechanical advantage one used wind film achieving rate 4.5 frames per second second prepares shutter mirror etc next shot third motor powers rewind function driven four aa batteries base camera control camera systems t90 uses dual cpu architecture main low-power cpu runs 32 khz sub-cpu runs 1 mhz powered needed main cpu handles lcd display overall state sub-cpu handles exposure calculations viewfinder display control camera motors architecture provides lower power usage cpus plus integrated circuits components mounted several flexible circuit boards fit around camera structure coin-type lithium battery main circuit board retains camera settings aa batteries removed user-serviceable part fails camera brought service center battery replaced canon technician expected battery life order five years although depends variety factors including duration periods without main battery 4xaa power t90 canon developed sophisticated light-metering system yet although introduced novel metering techniques assembled majority metering techniques developed one easy-to-use system first took metering options new f-1—center-weighted average metering partial area metering spot metering—and makes available press button turn command dial new f-1 requires focusing screen change switch metering patterns t90 partial area metering uses center 13 picture area spot metering uses center 2.7 canon copied metering options found olympus om-4 multi-spot metering allows photographer average eight spot meter readings different parts scene another feature borrowed olympus separate highlight shadow spot readings could taken adjust camera metering decisions ensure extremes tonal range muted grey final exposure two built-in sensors used implement metering options center-weighted partial area metering performed double-area silicon photocell spc canon standard location eyepiece spot metering performed another spc located bottom mirror box light reaches sensor via half-silvered area main mirror secondary mirror located beneath spot metering cell also allows automatic ttl off-the-film flash metering borrowed olympus notably lacking common metering mode slr cameras matrix metering nikon introduced fa 1983 canon follow suit 1987 eos 650 eight exposure modes available program ae auto-exposure mode puts exposure control completely hands camera variable shift program ae allows photographer bias camera towards narrow aperture three wide angle settings fast shutter speed three telephoto settings well standard mode manual control aperture priority ae shutter-speed priority ae allow photographer set one exposure variable manually camera chooses either latter two modes safety shift feature allows camera adjust fixed parameter obtain correct exposure otherwise example aperture priority mode photographer aperture fixed wide open photograph bright scene correct shutter speed expose correctly aperture might faster camera capable safety shift lets camera reduce aperture achieve correct exposure maximum shutter speed safety shift feature turned pressing two buttons back camera near base automation exposure desired manual mode available camera metering acts sophisticated light-meter decisions made photographer use older lenses automated aperture diaphragm stopped-down aperture priority ae stopped-down manual used instruct camera currently set aperture taking aperture therefore adjust metering calculations accordingly finally flash ae mode available flash photography t90 first canon camera support through-the-lens ttl flash metering measures actual light levels reaching film measuring reflected light film otf shutting flash unit film sufficiently exposed measurement calculated using average reflectivity color negative film system also used canon new eos system making t90 non-eos canon body compatible ttl canon flashes t90 x-sync speed 1/250 second fastest canon achieved better cameras available time production new dedicated flash unit speedlite 300tl launched alongside t90 support new flash modes zoomable head capable adjustment moving head cover fields view 24 35 50 85 mm lenses bounce flash head rotated 90° vertically 180° left 90° right well plain ttl mode 300tl supports a-ttl advanced ttl flash-to-subject distance calculated using infrared pulse detector mounted flash body bounce mode however uses 1/20th power pre-flash instead pre-flash also used fe lock mode flash exposure lock mode pre-flash used conjunction spot metering determine correct exposure advance taking picture thus camera moved reframe main subject off-center still expose correctly exposures slower x-sync speed previous slr flash systems triggered flash start exposure soon first shutter curtain finished travel however motion blurs light trails longer exposure method gives impression backwards movement since motion trails front moving object flash t90 became first mass-market camera support second-curtain flash flash fires end exposure second shutter curtain starts close although identical current 2009 canon speedlite 580 ex ii supports t90 well canon also produced dedicated macro ring flash camera ml-2 supports ttl manual models contains two flash tubes one either side fired separately together system consists flash ring fits onto end lens control unit screws hot shoe atop camera later ml-3 ring flash introduced eos system cameras also supports t90 t90 support vast range accessories available canon f-1 f-1n new f-1 number significant accessories available pentaprism interchangeable focusing screen eight different screens available different applications standard new split/microprism screen offers three common focusing aids simultaneously central circle split image prism surrounded microprism ring rest screen laser matte two optional data backs available t90 first command back 90 allows date data imprinting photographs also allowed various forms time-lapse photography second sold canon certain markets data memory back 90 stores 16 shot variables 156 exposures six variables 338 exposures computer interface data memory back 90 supports msx home computer standard third parties adapted connectors computer systems wired 60t3 remote control unit plugs socket fitted beneath right handgrip infrared remote control kit also available lc-2 unit also supports auto sensing mode completely unmanned photography trips shutter whenever something blocked path transmitter receiver—useful wildlife photography example number modifications t90 performed years canon third parties order add features missing camera as-built canon ceased supporting camera 1998 spare parts longer available subsequent difficulty obtaining repair services likely discourage remaining professional use cameras one issue lcd liquid crystal display life problem unique t90 lcd displays age wear varying rate dependent environmental conditions use factors commonly quoted lifespans five ten years thus many t90s displays nearing end lives even replaced spare part longer available third-party replacement emerged plastic battery holder t90 somewhat susceptible breakage cause camera become inoperative used cameras carefully checked broken/repaired battery holder compartments another common problem failure second internal battery retains frame number/iso settings replacement requires service person skilled soldering techniques camera disassembly another serious problem concerns shutter t90 shutter appears become sticky camera ages prone locking case camera lcd displays eee message help appears viewfinder display commonly called eee syndrome among users problem likely crop camera left unused time thus best way prevent regular use camera seem cause inaccurate shutter speeds failure problem corrected knowledgeable technician without replacing shutter mechanism reportedly caused dirt shutter magnets affecting performance left unused extended period time circuit need replaced expensive time-consuming proposition sticky shutter problem relates rubber washer involved operation shutter age atmospheric conditions tends deteriorate become sticky impedes operation shutter frequent use delay stickiness 'glueing shutter started long-term remedy shutter repaired rubber washer replaced another 10 years enjoyed camera working correctly good short term solution lightly clean shutter diaphragm cotton ball lighter fluid electronically controlled slr film cameras working canon t90 bargain used market prices used camera dealers providing warranties range approximately us 120–140 camera working condition approximately us 240–260 camera body mint condition accessories box manual canon fd lenses however remain quite affordable compared ef counterparts
Computer architecture
arpon arpon arp handler inspection computer software project improve network security attracted interest among network managers academic researchers frequently cited means protecting arp-based attacks address resolution protocol arp security issues include man middle mitm attack arp spoofing arp cache poisoning arp poison routing attacks arpon host-based solution make arp standardized protocol secure order avoid man middle mitm attack arp spoofing arp cache poisoning arp poison routing attack possible using three kinds anti arp spoofing techniques goal arpon therefore provide secure efficient network daemon provides sarpi darpi harpi anti arp spoofing technique thus making arp standardized protocol secure foreign intrusion
Computer security
bus error computing bus error fault raised hardware notifying operating system os process trying access memory cpu physically address invalid address address bus hence name modern use architectures much rarer segmentation faults occur primarily due memory access violations problems logical address permissions posix-compliant platforms bus errors usually result sigbus signal sent process caused error sigbus also caused general device fault computer detects though bus error rarely means computer hardware physically broken—it normally caused bug software bus errors may also raised certain paging errors see least three main causes bus errors software instructs cpu read write specific physical memory address accordingly cpu sets physical address address bus requests hardware connected cpu respond results answer specific address hardware responds cpu raises exception stating requested physical address unrecognized whole computer system note covers physical memory addresses trying access undefined virtual memory address generally considered segmentation fault rather bus error though mmu separate processor tell difference cpus byte-addressable unique memory address refers 8-bit byte cpus access individual bytes memory address generally access larger units 16 bits 32 bits 64 bits without units aligned specific boundary x86 platform notable exception example multi-byte accesses must 16 bit-aligned addresses given bytes 0 2 4 6 would considered aligned therefore accessible addresses 1 3 5 would considered unaligned similarly multi-byte accesses must 32-bit aligned addresses 0 4 8 12 would considered aligned therefore accessible addresses would considered unaligned attempting access unit larger byte unaligned address cause bus error systems may hybrid depending architecture used example hardware based ibm system/360 mainframe including ibm system z fujitsu b8000 rca spectra univac series 90 instructions must 16-bit boundary execution addresses must start even byte attempts branch odd address results specification exception data however may retrieved address memory may one byte longer depending instruction cpus generally access data full width data bus times address bytes access memory full width data bus mask shift address individual byte systems tolerate inefficient algorithm essential feature software especially string processing unlike bytes larger units span two aligned addresses would thus require one fetch data bus possible cpus support functionality rarely required directly machine code level thus cpu designers normally avoid implementing instead issue bus errors unaligned memory access freebsd linux solaris signal bus error virtual memory pages paged e.g disappeared e.g accessing memory-mapped file executing binary image truncated program running just-created memory-mapped file physically allocated disk full x86 exists older memory management mechanism known segmentation application loads segment register selector non-present segment posix-compliant oses done assembly language exception generated oses used swapping linux generates sigbus example unaligned memory access written c programming language assembly syntax compiling running example posix compliant os x86 demonstrates error gdb debugger shows immediate value 0x2a stored location stored eax register using x86 assembly language example register indirect addressing printing low order bits address shows aligned word boundary dword using x86 terminology
Operating systems
ghost disk utility ghost acronym general hardware-oriented system transfer disk cloning backup tool originally developed murray haszard 1995 binary research technology acquired 1998 symantec backup recovery functionality replaced symantec system recovery ssr although ghost imaging technology still actively developed available part symantec ghost solution suite binary research developed ghost auckland new zealand symantec acquisition functions translation languages moved elsewhere main development remained auckland october 2009 time much moved india technologies developed 20/20 software integrated ghost acquisition symantec april 2000 first versions ghost supported cloning entire disks however version 3.1 released 1997 supports cloning individual partitions ghost could clone disk partition another disk partition image file ghost allows writing clone image second disk machine another machine linked parallel network cable network drive tape drive version 4.0 ghost added multicast technology following lead competitor imagecast multicasting supports sending single backup image simultaneously machines without putting greater stress network sending image single machine version also introduced ghost explorer windows program supports browsing contents image file extract individual files explorer subsequently enhanced support adding deleting files image fat later ext2 ext3 ntfs file systems 2007 ghost explorer could edit ntfs images ghost explorer could work images older versions slowly version 4 images contain indexes find files rapidly version 4.0 also moved real-mode dos 286 protected mode additional memory available allows ghost provide several levels compression images provide file browser 1998 ghost 4.1 supports password-protected images version 5.0 moved 386 protected mode unlike text-based user interface earlier versions 5.0 uses graphical user interface gui binary research logo two stars revolving around plays main screen program idle 1998 gdisk script-based partition manager integrated ghost gdisk serves role similar fdisk greater capabilities norton ghost version novell netware called 2.0 released around 1999 supports nss partitions although runs dos like others ghost 6.0 released 2000 includes management console managing large numbers machines console communicates client software managed computers allows system administrator refresh disk machine remotely dos-based program ghost requires machines running windows reboot dos run ghost 6.0 requires separate dos partition used console released march 31 2001 norton ghost version 7.0 retail marketed norton ghost 2002 personal edition released december 14 2001 ghost 7.5 creates virtual partition dos partition actually exists file within normal windows file system significantly eased systems management user longer set partition tables ghost 7.5 write images cd-r discs later versions write dvds ghost 8.0 run directly windows well-suited placement bootable media bartpe′s bootable cd corporate edition supports unicast multicast peer-to-peer transfers via tcp/ip ghost 8.0 supports ntfs file system although ntfs accessible dos program off-line version ghost runs bootable media place installed operating system originally faced number driver support difficulties due limitations increasingly obsolete 16-bit dos environment driver selection configuration within dos non-trivial beginning limited space available floppy disks made disk cloning several different disk controllers difficult task different scsi usb cd-rom drives involved mouse support possible often left due limited space drivers floppy disk devices usb often work using newer features usb 2.0 instead operating 1.0 speeds taking hours taken minutes widespread support dos went decline became increasingly difficult get hardware drivers dos newer hardware disk imaging competitors ghost dealt decline dos moving recovery environments freebsd linux windows pe draw current driver development able image newer models disk controllers nevertheless dos version ghost compatible hardware configurations works much faster *nix based image backup tools ghost 8 later windows programs run windows pe bartpe hiren bootcd use plug play hardware drivers standard desktop computer making hardware support ghost much simpler norton ghost 2003 consumer edition ghost released september 6 2002 available independent product norton ghost 2003 also included component norton systemworks 2003 professional simpler non-corporate version ghost norton ghost 2003 include console windows front-end script ghost operations create bootable ghost diskette machine still needs reboot virtual partition user need interact dos symantec deprecated liveupdate support norton ghost 2003 early 2006 released november 15 2004 symantec renamed enterprise version ghost symantec ghost solution suite 1.0 helped clarify difference consumer business editions product defined february 2006 release norton save restore also known norton backup restore standalone backup application based ghost 10.0 ghost solution suite 1.1 bundle updated version ghost symantec client migration user data settings migration tool former powerquest equivalent deploycenter using pqi images ghost solution suite 1.1 released december 2005 create image file larger 2 gb ghost 8.2 earlier image files automatically split two segments segment maximum size 2 gb new features include comprehensive manufacturing tools ability create universal boot disk end 2003 symantec acquired largest competitor disk-cloning field powerquest august 2 2004 norton ghost 9.0 released new consumer version ghost based powerquest′s drive image version 7 provides live imaging windows system ghost 9 continues leverage powerquest file format meaning backward compatible previous versions ghost however version ghost 8.0 included ghost 9 recovery disk support existing ghost customers ghost 9.0 released august 2 2004 represents significant shift consumer product line ghost 2003 several ways since ghost 9 support older .gho format disk images separate cd containing ghost 2003 included retail packaging users needing access older images limitations ghost 9 compared ghost 2003 well-communicated symantec resulted many dissatisfied customers purchased ghost 9 expecting previous version′s features like making images bootable ghost environment installation required product activation supports creating images cds dvds iomega zip jaz disks well ieee 1394 firewire usb mass storage devices supports encrypting images maxtor external hard disk drives maxtor onetouch buttons ghost 10.0 compatible previous versions future versions norton save restore 1.0 released february 2006 renamed consumer version ghost used ghost 10.0′s engine addition features allow backup restoration individual files ghost solution suite 2.0 released november 2006 version provides significant improvements performance well ability edit ntfs images version also adds support windows vista x64 versions windows guid partition table gpt disks however software fully support systems extensible firmware interface efi firmware ghost 11.0 supports saving restoring native ghost image format .gho .ghs raw images .img .raw ghost 12.0 includes windows vista support updated thorough user interface supports full system backup individual files folders backup version provides lightsout restore feature restores system on-disk software recovery environment similar windows thereby allowing recovery without bootable cd upon system startup menu asks whether start operating system lightsout recovery environment lightsout restore would augment iso image comes ghost latter contains recovery environment recover system without working operating system nsr 2.0 fewer features comparison norton ghost 12 nsr 2.0 offers one-time backups file folder backup simplified schedule editor maxtor onetouch integration modifiable symantec recovery disc version supports 32-bit 64-bit versions windows xp vista version 14.0 uses volume snapshot service vss make backups store backups ftp site ghost connect threatcon symantec service monitors malware activity around world performs incremental backups specific threat level reached features include ability back network-attached storage devices support ntfs partitions 16tb ghost manage installations version 12.0 later across network version longer supports opening .gho image files stores images .v2i format incremental backup images created norton ghost saved .iv2i filename extensions alone original full backup .v2i filename extension regular basis older .gho image files restored using ghost explorer separate utility ghost software enterprise including ghost 11.5 released may 2008 new features include january 6 2010 latest build live update 11.5.1.2266 live update 5 lu5 updates ghost solution suite 2.5.1 provides support windows 7 windows server 2008 r2 furthermore ghost 11.5 compatible bartpe bootable cd using pe builder plug-in symantec ghost 11 according norton community symantec′s site following features available norton ghost 15 ghost software enterprise including ghost 12.0 deployment solution 6.9 announced march 2015 ghost software enterprise including ghost 12.0 deployment solution 6.9 released 7 march 2016 ghost software enterprise including ghost 12.0 deployment solution 6.9 released 18 may 2017 release update 3 released 22 september 2017 added support ext4 filesystem ghost software enterprise including ghost 12.0 deployment solution 6.9 released 31 october 2018 release added support ghost solution suite web console ipxe windows server 2016 smart raw imaging 4k native drive support ghost marketed os deployment solution capture deployment environment requires booting windows pe environment accomplished creating iso burn dvd usb bootable disk installed client automation folder delivered pxe server provides environment perform offline system recovery image creation ghost mount backup volume recover individual files ghost copy contents one volume another convert volume contents virtual disk vmdk vhd format initially ghost supported fat file system although could copy resize file systems performing sector-by-sector transfer ghost added support ntfs later 1996 also provided program ghostwalker change security id sid made windows nt systems distinguishable ghostwalker capable modifying name windows nt computer interface ghost added support ext2 file system 1999 ext3 subsequently support ext4 added september 2017 norton ghost discontinued april 30 2013 support via chat knowledge base available june 30 2014 removed symantec ghost web page invited ghost customers try symantec system recovery described software backup disaster recovery
Computer security
public register travel identity documents online prado council european union public register authentic travel identity documents online prado contains technical descriptions including information important security features identity travel documents countries within european union schengen area countries neighbouring countries well many third countries worldwide council joint action 98/700/jha 3 december 1998 european image archiving system fado false authentic documents online set first part system expert fado went online end 2004 secure communication among document experts 2007 ifado prado released ifado intranet fado contains important information expert fado access restricted governmental use prado small subset information published general public prado hosted general secretariat council european union gsc directorate general justice home affairs dgd 1a prado contains basic technical descriptions including information security features authentic identity travel documents information selected provided document experts member states european union eu iceland norway switzerland part information contained classified restricted expert fado system made publicly available via prado pages steering committee council european union currently working party frontiers formation false documents experts travel identity documents categorised follows document categories document types document types civil status documents information practically important documents eu schengen countries present overall number described documents third countries however differs widely country country information added every week prado users also find links websites lists travel documents officially recognised eu member states schengen states information invalid document numbers provided eu member states well third countries information related identity checking document checking document fraud also present prado available 24 official languages european union documents introduced document experts currently 31 participating countries languages standardised descriptions translated automatically thus documents immediately available supported languages additional free text information contained translated online specialised linguists general secretariat council european union website published general secretariat council european union transparency reasons also provide important service many users europe especially non-governmental organisations need legal obligation check identities example
Computer security
mysql connector/odbc mysql connector/odbc known myodbc computer software oracle corporation odbc interface allows programming languages support odbc interface communicate mysql database mysql connector/odbc originally created mysql ab
Databases
nukernel nukernel microkernel developed apple computer early 1990s written scratch apple designed using concepts mach 3.0 extensive additions soft real-time scheduling improve multimedia performance intended used basis copland operating system one version seen publicly copland alpha release proved extremely unstable development apparently ended cancellation copland 1996 ers external reference specification nukernel contained entirety object oriented message passing system method filed march 19 1996 granted december 31 1996 one-time technical lead nukernel jeff robbin one driving forces behind itunes ipod apple nukernel name confused nukernel name custom kernel beos
Computer architecture
ångström distribution ångström distribution linux distribution variety embedded devices distribution result work developers openzaurus openembedded opensimpad projects graphical user interfaces guis available opie gpe among options ångström distribution cooptition poky linux ångström based openembedded project specifically openembedded-core oe-core layer ångström poky linux based oe-core mostly utilize toolchain officially yocto compatible poky linux officially part yocto project ångström primarily differs poky linux binary distribution like e.g debian fedora opensuse ubuntu linux distributions using opkg package management hence essential part ångström builds binary package feed allowing simply install software distributed opkg packages without compile first one might install binary package aptitude dpkg according ångström wiki ångström developed least following devices
Computer architecture
gaël duval gaël duval born 1973 french entrepreneur july 1998 created mandrake linux mandriva linux linux distribution originally based red hat linux kde also co-founder mandrakesoft merged mandriva jacques le marois frédéric bastok gaël duval responsible communication mandriva management team laid company march 2006 round cost-cutting duval suspected part reason dismissal disagreement management company future strategy resulting lawsuit company duval chairman chief technology officer ulteo company bought aznetwork group 2015 2016 co-founded nfactory.io incubator-accelerator startups november 2017 gael duval created /e/ mobile operating system fork android-based lineageos accompanied set online services /e/ released first beta september 12th 2018 operating system emphasizes data privacy use proprietary google services 2018 duval founded e foundation maintains /e/ duval graduate university caen normandy france studied networks documentary applications
Operating systems
nprotect gameguard personal 2007 nprotect gameguard personal 2007 often referred nprotect ggp2007 anti-virus security suite microsoft windows 2000 xp vista developed inca internet users playing online computer games includes real-time protection forms malware including viruses trojans spyware worms keyloggers rootkits well game optimization feature like many security products nprotect gameguard personal 2007 cause collisions executed security products simultaneously collisions mainly occur running on-access scanning real-time scanning simultaneously nprotect gameguard personal 2007 available free non-free edition former lacking treatment abilities malware
Computer security
mike lesk michael e. mike lesk born 1945 american computer scientist 1960s michael lesk worked smart information retrieval system project wrote much retrieval code many retrieval experiments well obtaining ba degree physics chemistry harvard college 1964 phd harvard university chemical physics 1969 1970 1984 lesk worked bell labs group built unix lesk wrote unix tools word processing tbl refer standard ms macro package troff compiling lex networking uucp also wrote portable i/o library predecessor stdio.h c contributed significantly development c language preprocessor 1984 left work bellcore managed computer science research group lesk worked specific information systems applications mostly geography system driving directions dictionaries system disambiguating words context 1990s lesk worked large chemical information system core project cornell online computer library center american chemical society chemical abstracts service 1998 2002 lesk headed national science foundation division information intelligent systems oversaw phase 2 nsf digital library initiative currently professor faculty library information science department school communication information rutgers university lesk received flame award lifetime achievement usenix 1994 fellow acm 1996 2005 elected national academy engineering authored number books selected books michael lesk
Operating systems
christmas tree exec christmas tree exec first widely disruptive computer worm paralyzed several international computer networks december 1987 written student clausthal university technology rexx scripting language drew crude christmas tree text graphics sent entry target email contacts file way spread onto european academic research network earn bitnet ibm worldwide vnet systems caused massive disruption core mechanism iloveyou worm 2000 essentially christmas tree although ran pcs rather mainframes spread different network scripted using vbscript rather rexx name actually christma exec ibm vm systems originally required file names formatted 8+space+8 characters additionally ibm required rexx script files file type exec name sometimes written christmas exec adding 9th character make name readable user prompted ... type christmas ... —and fact launched worm displays message program run forwards mailbox addresses contained user address file
Operating systems
gordon plotkin gordon david plotkin born 9 september 1946 theoretical computer scientist school informatics university edinburgh plotkin probably best known introduction structural operational semantics sos work denotational semantics particular notes structural approach operational semantics influential contributed many areas computer science plotkin educated university glasgow university edinburgh gaining bachelor science degree 1967 phd 1972 supervised rod burstall plotkin remained edinburgh burstall robin milner co-founder laboratory foundations computer science lfcs former doctoral students include luca cardelli philippa gardner doug gurr eugenio moggi lǐ wèi plotkin elected fellow royal society frs 1992 fellow royal society edinburgh frse member academia europæa also winner royal society wolfson research merit award plotkin received milner award 2012 fundamental research programming semantics lasting impact principles design programming languages nomination royal society reads
Programming language topics
gogrid gogrid cloud infrastructure service hosting linux windows virtual machines managed multi-server control panel restful api july 2008 gogrid selected finalist linuxworld 2008 product excellence award idg world expo linuxworld.com may 2010 gogrid named lead411 list “ 2010 hottest san francisco companies ” june 2010 gogrid “ best channel incentives ” award 2010 ascii reseller success summit march 2012 gogrid selected winner cloud-infrastructure category ondemand 2012 alwayson 2011-2014 gogrid appeared gartner cloud infrastructure-as-a-service iaas magic quadrant
Distributed computing architecture
james ryan cyber security james ryan born 1974 anchorage alaska american entrepreneur cyber security co-founder managing partner litmus logic security firm ryan contributions cyber security industry known economist history channel ryan born anchorage alaska 1974 holds bachelor master science electrical engineering virginia tech ryan currently resides northern virginia wife kidist three children motivational trainer ryan included book “ lifting curtain disgrace call urban high school education ” ryan founder managing partner since 2002 litmus logic llc boutique firm provides expertise security privacy cyber defense trust strategies internet technologies serves chief strategy officer cyber security summit minnesota innovation lab state-level economic development organization ryan one experts contributed economics digital identity 2015 technical report published economist intelligence unit 1993 1997 software engineer trw 1997 1998 system engineer lockheed martin 1998 1999 security network expert lucent technologies alcatel-lucent 1999 2002 principal consultant security network expert predictive systems ryan knowledge cyber security trust framework consults governments defense financial institutions software cloud providers united states department defense dod civil agencies spoke united states department defense cyber crime conference robotics alley cyber security summit security360 topics speeches included success cyber security public key infrastructure pki internet things cyber security robotics artificial intelligence national strategy trusted identities cyberspace ryan collaborated nasa electronic data systems eds creating identity credential access management icam segment architecture personal identity verification – interoperable piv-i trust framework new approach access control uses public key infrastructure pki featured together oliver north history channel program “ america ’ book secrets pentagon ” march 2012
Computer security
filesystem-level encryption filesystem-level encryption often called file-based encryption fbe file/folder encryption form disk encryption individual files directories encrypted file system contrast full disk encryption entire partition disk file system resides encrypted types filesystem-level encryption include advantages filesystem-level encryption include unlike cryptographic file systems full disk encryption general-purpose file systems include filesystem-level encryption typically encrypt file system metadata directory structure file names sizes modification timestamps problematic metadata needs kept confidential words files stored identifying file names anyone access physical disk know documents stored disk although contents documents one exception encryption support added zfs filesystem filesystem metadata filenames ownership acls extended attributes stored encrypted disk zfs metadata relating storage pool stored plaintext possible determine many filesystems datasets available pool including ones encrypted content stored files directories remain encrypted another exception cryfs replacement encfs cryptographic file systems specialized general-purpose file systems specifically designed encryption security mind usually encrypt data contain – including metadata instead implementing on-disk format block allocation file systems often layered top existing file systems e.g residing directory host file system many file systems also offer advanced features deniable encryption cryptographically secure read-only file system permissions different views directory structure depending key user ... one use cryptographic file system part existing file system synchronized 'cloud storage cases cryptographic file system could 'stacked top help protect data confidentiality
Computer file systems
nokia e73 mode nokia e73 mode feature phone nokia e series range manufactured nokia company successor nokia e73 nokia e73 mode enterprise-based feature phone nokia eseries devices standard features including mobile email calendar instant messaging among many others like nokia e72
Operating systems
cell microprocessor cell multi-core microprocessor microarchitecture combines general-purpose powerpc core modest performance streamlined coprocessing elements greatly accelerate multimedia vector processing applications well many forms dedicated computation developed sony toshiba ibm alliance known sti architectural design first implementation carried sti design center austin texas four-year period beginning march 2001 budget reported sony approaching us 400 million cell shorthand cell broadband engine architecture commonly abbreviated cbea full cell part first major commercial application cell sony playstation 3 game console mercury computer systems dual cell server dual cell blade configuration rugged computer pci express accelerator board available different stages production toshiba announced plans incorporate cell high definition television sets seems abandoned idea exotic features xdr memory subsystem coherent element interconnect bus eib interconnect appear position cell future applications supercomputing space exploit cell processor prowess floating point kernels cell architecture includes memory coherence architecture emphasizes power efficiency prioritizes bandwidth low latency favors peak computational throughput simplicity program code reasons cell widely regarded challenging environment software development ibm provides linux-based development platform help developers program cell chips architecture widely used unless adopted software development community however cell strengths may make useful scientific computing regardless mainstream success mid-2000 sony computer entertainment toshiba corporation ibm formed alliance known sti design manufacture processor sti design center opened march 2001 cell designed period four years using enhanced versions design tools power4 processor 400 engineers three companies worked together austin critical support eleven ibm design centers period ibm filed many patents pertaining cell architecture manufacturing process software environment early patent version broadband engine shown chip package comprising four processing elements patent description known power processing element ppe processing element contained 8 apus referred spes current broadband engine chip chip package widely regarded run clock speed 4 ghz 32 apus providing 32 gigaflops fp8 quarter precision broadband engine shown 1 teraflops raw computing power design fabricated using 90 nm soi process march 2007 ibm announced 65 nm version cell production plant time globalfoundries east fishkill new york bandai namco entertainment used cell processor 357 arcade board well subsequent 369 february 2008 ibm announced begin fabricate cell processors 45 nm process may 2008 ibm introduced high-performance double-precision floating-point version cell processor powerxcell 8i 65 nm feature size may 2008 opteron- powerxcell 8i-based supercomputer ibm roadrunner system became world first system achieve one petaflops fastest computer world third quarter 2009 world three energy efficient supercomputers represented green500 list similarly based powerxcell 8i 45 nm cell processor introduced concert sony playstation 3 slim august 2009 november 2009 ibm discontinued development cell processor 32 apus still developing cell products may 17 2005 sony computer entertainment confirmed specifications cell processor would shipping then-forthcoming playstation 3 console cell configuration one ppe core eight physical spes silicon playstation 3 one spe locked-out test process practice helps improve manufacturing yields another one reserved os leaving 6 free spes used games code target clock-frequency introduction 3.2 ghz introductory design fabricated using 90 nm soi process initial volume production slated ibm facility east fishkill new york relationship cores threads common source confusion ppe core dual threaded manifests software two independent threads execution active spe manifests single thread playstation 3 configuration described sony cell processor provides nine independent threads execution june 28 2005 ibm mercury computer systems announced partnership agreement build cell-based computer systems embedded applications medical imaging industrial inspection aerospace defense seismic processing telecommunications mercury since released blades conventional rack servers pci express accelerator boards cell processors fall 2006 ibm released qs20 blade module using double cell processors tremendous performance certain applications reaching peak 410 gigaflops fp8 quarter precision per module qs22 based powerxcell 8i processor used ibm roadrunner supercomputer mercury ibm uses fully utilized cell processor eight active spes april 8 2008 fixstars corporation released pci express accelerator board based powerxcell 8i processor sony high performance media computing server zego uses 3.2 ghz cell/b.e processor cell broadband engine cell commonly known microprocessor intended hybrid conventional desktop processors athlon 64 core 2 families specialized high-performance processors nvidia ati graphics-processors gpus longer name indicates intended use namely component current future online distribution systems may utilized high-definition displays recording equipment well hdtv systems additionally processor may suited digital imaging systems medical scientific etc physical simulation e.g scientific structural engineering modeling simple analysis cell processor split four components external input output structures main processor called power processing element ppe two-way simultaneous-multithreaded powerpc 2.02 core eight fully functional co-processors called synergistic processing elements spes specialized high-bandwidth circular data bus connecting ppe input/output elements spes called element interconnect bus eib achieve high performance needed mathematically intensive tasks decoding/encoding mpeg streams generating transforming three-dimensional data undertaking fourier analysis data cell processor marries spes ppe via eib give access via fully cache coherent dma direct memory access main memory external data storage make best eib overlap computation data transfer nine processing elements ppe spes equipped dma engine since spe load/store instructions access local scratchpad memory spe entirely depends dmas transfer data main memory spes local memories dma operation transfer either single block area size 16kb list 2 2048 blocks one major design decisions architecture cell use dmas central means intra-chip data transfer view enabling maximal asynchrony concurrency data processing inside chip ppe capable running conventional operating system control spes start stop interrupt schedule processes running spes end ppe additional instructions relating control spes unlike spes ppe read write main memory local memories spes standard load/store instructions despite turing complete architectures spes fully autonomous require ppe prime useful work horsepower system comes synergistic processing elements use dma method data transfer limited local memory footprint spe pose major challenge software developers wish make horsepower demanding careful hand-tuning programs extract maximal performance cpu ppe bus architecture includes various modes operation giving different levels memory protection allowing areas memory protected access specific processes running spes ppe ppe spe risc architectures fixed-width 32-bit instruction format ppe contains 64-bit general purpose register set gpr 64-bit floating point register set fpr 128-bit altivec register set spe contains 128-bit registers used scalar data types ranging 8-bits 64-bits size simd computations variety integer floating point formats system memory addresses ppe spe expressed 64-bit values theoretic address range 2 bytes 16 exabytes 16,777,216 terabytes practice bits implemented hardware local store addresses internal spu synergistic processor unit processor expressed 32-bit word documentation relating cell word always taken mean 32 bits doubleword means 64 bits quadword means 128 bits 2008 ibm announced revised variant cell called powerxcell 8i available qs22 blade servers ibm powerxcell manufactured 65 nm process adds support 32 gb slotted ddr2 memory well dramatically improving double-precision floating-point performance spes peak 12.8 gflops 102.4 gflops total eight spes coincidentally peak performance nec sx-9 vector processor released around time ibm roadrunner supercomputer world fastest 2008-2009 consisted 12,240 powerxcell 8i processors along 6,562 amd opteron processors powerxcell 8i powered super computers also dominated top 6 greenest systems green500 list highest mflops/watt ratio supercomputers world beside qs22 supercomputers powerxcell processor also available accelerator pci express card used core processor qpace project since powerxcell 8i removed rambus memory interface added significantly larger ddr2 interfaces enhanced spes chip layout reworked resulted larger chip die packaging cell chip number different configurations basic configuration multi-core chip composed one power processor element ppe sometimes called processing element pe multiple synergistic processing elements spe ppe spes linked together internal high speed bus dubbed element interconnect bus eib ppe powerpc based dual-issue in-order two-way simultaneous-multithreaded core 23-stage pipeline acting controller eight spes handle computational workload ppe limited order execution capabilities perform loads order delayed execution pipelines ppe work conventional operating systems due similarity 64-bit powerpc processors spes designed vectorized floating point code execution ppe contains 64 kib level 1 cache 32 kib instruction 32 kib data 512 kib level 2 cache size cache line 128 bytes additionally ibm included altivec vmx unit fully pipelined single precision floating point altivec 1 support double precision floating-point vectors 32-bit fixed point unit fxu 64-bit register file per thread load store unit lsu 64-bit floating-point unit fpu branch unit bru branch execution unit bxu ppe consists three main units instruction unit iu execution unit xu vector/scalar execution unit vsu iu contains l1 instruction cache branch prediction hardware instruction buffers dependency checking login xu contains integer execution units fxu load-store unit lsu vsu contains execution resources fpu vmx ppe complete two double precision operations per clock cycle using scalar fused-multiply-add instruction translates 6.4 gflops 3.2 ghz eight single precision operations per clock cycle vector fused-multiply-add instruction translates 25.6 gflops 3.2 ghz ppe designed specifically cell processor development microsoft approached ibm wanting high performance processor core xbox 360 ibm complied made tri-core xenon processor based slightly modified version ppe added vmx128 extensions spe dual issue order processor composed synergistic processing unit spu memory flow controller mfc dma mmu bus interface spes n't branch prediction hardware hence heavy burden compiler spe 6 execution units divided among odd even pipelines spe spu runs specially developed instruction set isa 128-bit simd organization single double precision instructions current generation cell spe contains 256 kib embedded sram instruction data called local storage mistaken local memory sony documents refer vram visible ppe addressed directly software spe support 4 gib local store memory local store operate like conventional cpu cache since neither transparent software contain hardware structures predict data load spes contain 128-bit 128-entry register file measures 14.5 mm 90 nm process spe operate sixteen 8-bit integers eight 16-bit integers four 32-bit integers four single-precision floating-point numbers single clock cycle well memory operation note spu directly access system memory 64-bit virtual memory addresses formed spu must passed spu spe memory flow controller mfc set dma operation within system address space one typical usage scenario system load spes small programs similar threads chaining spes together handle step complex operation instance set-top box might load programs reading dvd video audio decoding display data would passed spe spe finally ending tv another possibility partition input data set several spes performing kind operation parallel 3.2 ghz spe gives theoretical 25.6 gflops single precision performance compared personal computer contemporaries relatively high overall floating point performance cell processor seemingly dwarfs abilities simd unit cpus like pentium 4 athlon 64 however comparing floating point abilities system one-dimensional application-specific metric unlike cell processor desktop cpus suited general purpose software usually run personal computers addition executing multiple instructions per clock processors intel amd feature branch predictors cell designed compensate compiler assistance prepare-to-branch instructions created double-precision floating point operations sometimes used personal computers often used scientific computing cell performance drops order magnitude still reaches 20.8 gflops 1.8 gflops per spe 6.4 gflops per ppe powerxcell 8i variant specifically designed double-precision reaches 102.4 gflops double-precision calculations tests ibm show spes reach 98 theoretical peak performance running optimized parallel matrix multiplication toshiba developed co-processor powered four spes ppe called spursengine designed accelerate 3d movie effects consumer electronics spe local memory 256 kb total spes 2 mb local memory eib communication bus internal cell processor connects various on-chip system elements ppe processor memory controller mic eight spe coprocessors two off-chip i/o interfaces total 12 participants ps3 number spu vary industrial applications eib also includes arbitration unit functions set traffic lights documents ibm refers eib participants 'units eib presently implemented circular ring consisting four 16 bytes wide unidirectional channels counter-rotate pairs traffic patterns permit channel convey three transactions concurrently eib runs half system clock rate effective channel rate 16 bytes every two system clocks maximum concurrency three active transactions four rings peak instantaneous eib bandwidth 96 bytes per clock 12 concurrent transactions 16 bytes wide 2 system clocks per transfer figure often quoted ibm literature unrealistic simply scale number processor clock speed arbitration unit imposes additional constraints discussed bandwidth assessment section ibm senior engineer david krolak eib lead designer explains concurrency model participant eib one 16 byte read port one 16 byte write port limit single participant read write rate 16 byte per eib clock simplicity often regarded 8 byte per system clock note spu processor contains dedicated dma management queue capable scheduling long sequences transactions various endpoints without interfering spu ongoing computations dma queues managed locally remotely well providing additional flexibility control model data flows eib channel stepwise around ring since twelve participants total number steps around channel back point origin twelve six steps longest distance pair participants eib channel permitted convey data requiring six steps data must take shorter route around circle direction number steps involved sending packet little impact transfer latency clock speed driving steps fast relative considerations however longer communication distances detrimental overall performance eib reduce available concurrency despite ibm original desire implement eib powerful cross-bar circular configuration adopted spare resources rarely represents limiting factor performance cell chip whole worst case programmer must take extra care schedule communication patterns eib able function high concurrency levels david krolak explained 3.2 ghz channel flows rate 25.6 gb/s viewing eib isolation system elements connects achieving twelve concurrent transactions flow rate works abstract eib bandwidth 307.2 gb/s based view many ibm publications depict available eib bandwidth greater 300 gb/s number reflects peak instantaneous eib bandwidth scaled processor frequency however technical restrictions involved arbitration mechanism packets accepted onto bus ibm systems performance group explained quote apparently represents full extent ibm public disclosure mechanism impact eib arbitration unit snooping mechanism interrupt generation segment page translation faults well described documentation set yet made public ibm practice effective eib bandwidth also limited ring participants involved nine processing cores sustain 25.6 gb/s read write concurrently memory interface controller mic tied pair xdr memory channels permitting maximum flow 25.6 gb/s reads writes combined two io controllers documented supporting peak combined input speed 25.6 gb/s peak combined output speed 35 gb/s add confusion older publications cite eib bandwidth assuming 4 ghz system clock reference frame results instantaneous eib bandwidth figure 384 gb/s arbitration-limited bandwidth figure 256 gb/s things considered theoretic 204.8 gb/s number often cited best one bear mind ibm systems performance group demonstrated spu-centric data flows achieving 197 gb/s cell processor running 3.2 ghz number fair reflection practice well cell contains dual channel rambus xio macro interfaces rambus xdr memory memory interface controller mic separate xio macro designed ibm xio-xdr link runs 3.2 gbit/s per pin two 32-bit channels provide theoretical maximum 25.6 gb/s i/o interface also rambus design known flexio flexio interface organized 12 lanes lane unidirectional 8-bit wide point-to-point path five 8-bit wide point-to-point paths inbound lanes cell remaining seven outbound provides theoretical peak bandwidth 62.4 gb/s 36.4 gb/s outbound 26 gb/s inbound 2.6 ghz flexio interface clocked independently typ 3.2 ghz 4 inbound 4 outbound lanes supporting memory coherency companies leadtek released pci-e cards based upon cell allow faster real time transcoding h.264 mpeg-2 mpeg-4 video august 29 2007 ibm announced bladecenter qs21 generating measured 1.05 giga–floating point operations per second gigaflops per watt peak performance approximately 460 gflops one power efficient computing platforms date single bladecenter chassis achieve 6.4 tera–floating point operations per second teraflops 25.8 teraflops standard 42u rack may 13 2008 ibm announced bladecenter qs22 qs22 introduces powerxcell 8i processor five times double-precision floating point performance qs21 capacity 32 gb ddr2 memory on-blade ibm discontinued blade server line based cell processors january 12 2012 several companies provide pci-e boards utilising ibm powerxcell 8i performance reported 179.2 gflops sp 89.6 gflops dp 2.8 ghz sony playstation 3 video game console first production application cell processor clocked 3.2 ghz containing seven eight operational spes allow sony increase yield processor manufacture six seven spes accessible developers one reserved os toshiba produced hdtvs using cell presented system decode 48 standard definition mpeg-2 streams simultaneously 1920×1080 screen enable viewer choose channel based dozens thumbnail videos displayed simultaneously screen ibm supercomputer ibm roadrunner hybrid general purpose x86-64 opteron well cell processors system assumed 1 spot june 2008 top 500 list first supercomputer run petaflops speeds gained sustained 1.026 petaflops speed using standard linpack benchmark ibm roadrunner used powerxcell 8i version cell processor manufactured using 65 nm technology enhanced spus handle double precision calculations 128-bit registers reaching double precision 102 gflops per chip clusters playstation 3 consoles attractive alternative high-end systems based cell blades innovative computing laboratory group led jack dongarra computer science department university tennessee investigated application depth terrasoft solutions selling 8-node 32-node ps3 clusters yellow dog linux pre-installed implementation dongarra research first reported wired october 17 2007 interesting application using playstation 3 cluster configuration implemented astrophysicist gaurav khanna physics department university massachusetts dartmouth replaced time used supercomputers cluster eight playstation 3s subsequently next generation machine called playstation 3 gravity grid uses network 16 machines exploits cell processor intended application binary black hole coalescence using perturbation theory particular cluster performs astrophysical simulations large supermassive black holes capturing smaller compact objects generated numerical data published multiple times relevant scientific research literature cell processor version used playstation 3 main cpu 6 spes available user giving gravity grid machine net 16 general-purpose processors 96 vector processors machine one-time cost 9,000 build adequate black-hole simulations would otherwise cost 6,000 per run conventional supercomputer black hole calculations memory-intensive highly localizable well-suited architecture khanna claims cluster performance exceeds 100+ intel xeon core based traditional linux cluster simulations ps3 gravity grid gathered significant media attention 2007 2008 2009 2010 computational biochemistry biophysics lab universitat pompeu fabra barcelona deployed 2007 boinc system called ps3grid collaborative computing based cellmd software first one designed specifically cell processor united states air force research laboratory deployed playstation 3 cluster 1700 units nicknamed condor cluster analyzing high-resolution satellite imagery air force claims condor cluster would 33rd largest supercomputer world terms capacity lab opened supercomputer use universities research help computing power half million playstation 3 consoles distributed computing project folding home recognized guinness world records powerful distributed network world first record achieved september 16 2007 project surpassed one petaflops never previously attained distributed computing network additionally collective efforts enabled ps3 alone reach petaflops mark september 23 2007 comparison world second-most powerful supercomputer time ibm bluegene/l performed around 478.2 teraflops means folding home computing power approximately twice bluegene/l although cpu interconnect bluegene/l one million times faster mean network speed folding home may 7 2011 folding home runs 9.3 x86 petaflops 1.6 petaflops generated 26,000 active ps3s alone late 2008 cluster 200 playstation 3 consoles used generate rogue ssl certificate effectively cracking encryption ibm announced april 25 2007 would begin integrating cell broadband engine architecture microprocessors company line mainframes led gameframe architecture processor makes better suited hardware-assisted cryptographic brute force attack applications conventional processors due flexible nature cell several possibilities utilization resources limited different computing paradigms ppe maintains job queue schedules jobs spes monitors progress spe runs mini kernel whose role fetch job execute synchronize ppe kernel scheduling distributed across spes tasks synchronized using mutexes semaphores conventional operating system ready-to-run tasks wait queue spe execute spes use shared memory tasks configuration spe runs distinct program data comes input stream sent spes spe terminated processing output data sent output stream provides flexible powerful architecture stream processing allows explicit scheduling spe separately processors also able perform streaming tasks limited kernel loaded 2005 patches enabling cell support linux kernel submitted inclusion ibm developers arnd bergmann one developers aforementioned patches also described linux-based cell architecture linuxtag 2005 release 2.6.16 march 20 2006 linux kernel officially supports cell processor ppe spes programmable c/c++ using common api provided libraries fixstars solutions provides yellow dog linux ibm mercury cell-based systems well playstation 3 terra soft strategically partnered mercury provide linux board support package cell support development software applications various cell platforms including ibm bladecenter js21 cell qs20 mercury cell-based solutions terra soft also maintains y-hpc high performance computing cluster construction management suite y-bio gene sequencing tools y-bio built upon rpm linux standard package management offers tools help bioinformatics researchers conduct work greater efficiency ibm developed pseudo-filesystem linux coined spufs simplifies access use spe resources ibm currently maintaining linux kernel gdb ports sony maintains gnu toolchain gcc binutils november 2005 ibm released cell broadband engine cbe software development kit version 1.0 consisting simulator assorted tools web site development versions latest kernel tools fedora core 4 maintained barcelona supercomputing center website august 2007 mercury computer systems released software development kit playstation r 3 high-performance computing november 2007 fixstars corporation released new cvcell module aiming accelerate several important opencv apis cell series software calculation tests recorded execution times 3.2 ghz cell processor 6x 27x faster compared software 2.4 ghz intel core 2 duo illustrations different generations cell/b.e processors powerxcell 8i images scale cell/b.e packages measures 42.5×42.5 mm powerxcell 8i measures 47.5×47.5 mm
Computer architecture
national cyber security policy 2013 national cyber security policy policy framework department electronics information technology deity ref name= http //meity.gov.in/content/national-cyber-security-policy-2013-1 /ref aims protecting public private infrastructure cyber attacks policy also intends safeguard information personal information web users financial banking information sovereign data particularly relevant wake us national security agency nsa leaks suggested us government agencies spying indian users legal technical safeguards ministry communications information technology india defines cyberspace complex environment consisting interactions people software services supported worldwide distribution information communication technology india cyber security policy 2013 2013 hindu newspaper citing documents leaked nsa whistleblower edward snowden alleged much nsa surveillance focused india domestic politics strategic commercial interests sparked furor among people pressure government unveiled national cyber security policy 2013 2 july 2013 build secure resilient cyberspace citizens business government also protect anyone intervening privacy protect information information infrastructure cyberspace build capabilities prevent respond cyber threat reduce vulnerabilities minimize damage cyber incidents combination institutional structures people processes technology cooperation ministry communications information technology india define objectives follows -to improve visibility integrity ict products services establishing infrastructure testing validation security product
Computer security
larry wall larry wall born september 27 1954 american computer programmer author created perl programming language wall grew los angeles bremerton washington starting higher education seattle pacific university 1976 majoring chemistry music later pre-medicine hiatus several years working university computing center graduating bachelor degree natural artificial languages graduate school university california berkeley wall wife studying linguistics intention finding unwritten language perhaps africa creating writing system would use new writing system translate various texts language among bible due health reasons plans cancelled remained united states wall instead joined nasa jet propulsion laboratory finished graduate school wall active member church nazarene wall author codice_1 usenet client widely used codice_2 program international obfuscated c code contest twice recipient first free software foundation award advancement free software 1998 beyond technical skills wall reputation wit often sarcastic sense humour ref name='www.perl.com/pub/a/1999/03/pm.ht /ref displays comments source code usenet example agree necessity compromise ca n't agree necessary compromise wall developed perl interpreter language working system development corporation later became part unisys co-author programming perl often referred camel book published o'reilly definitive resource perl programmers edited perl cookbook became employed full-time o'reilly media develop perl write books subject wall training linguist apparent books interviews lectures often compares perl natural language explains decisions perl design linguistic rationale also often uses linguistic terms perl language constructs instead traditional terms variable function accessor sometimes says noun verb topicalizer wall christian faith influenced terminology perl name biblical reference pearl great price matthew 13:46 similar references function name bless organization perl 6 design documents categories apocalypse exegesis wall also alluded faith spoken conferences including rather straightforward statement beliefs august 1997 perl conference discussion pilgrim progress yapc yet another perl conference june 2000 wall continues oversee development perl serves benevolent dictator life perl project official perl documentation states
Programming language topics
interleaved memory computing interleaved memory design made compensate relatively slow speed dynamic random-access memory dram core memory spreading memory addresses evenly across memory banks way contiguous memory reads writes using memory bank turn resulting higher memory throughputs due reduced waiting memory banks become ready desired operations different multi-channel memory architectures primarily interleaved memory adding channels main memory memory controller however channel interleaving also possible example freescale i.mx6 processors allow interleaving done two channels interleaved memory memory addresses allocated memory bank turn example interleaved system two memory banks assuming word-addressable memory logical address 32 belongs bank 0 logical address 33 would belong bank 1 logical address 34 would belong bank 0 interleaved memory said n-way interleaved banks memory location resides bank interleaved memory results contiguous reads common multimedia execution programs contiguous writes used frequently filling storage communication buffers actually using memory bank turn instead using one repeatedly results significantly higher memory throughput bank minimum waiting time reads writes main memory random-access memory ram usually composed collection dram memory chips number chips grouped together form memory bank possible memory controller supports interleaving lay memory banks memory banks interleaved traditional flat layouts memory banks allocated continuous block memory addresses simple memory controller gives equal performance completely random access scenarios compared performance levels achieved interleaving however reality memory reads rarely random due locality reference optimizing close together access gives far better performance interleaved layouts note way memory addressed effect access time memory locations already cached impact memory locations need retrieved dram early research interleaved memory performed ibm 60s 70s relation ibm 7030 stretch computer development went decades improving design flexibility performance produce modern implementations
Operating systems
netgear wgr614l wgr614l also known wgr614v8 802.11b/g wireless network router created netgear officially launched june 30 2008 wgr614l runs open source linux firmware supports installation third party packages dd-wrt tomato openwrt wgr614l designed used home business environments often used connection third-party firmware solutions sputniknet titan hotspots router also used wireless client bridge utilizing openwrt firmware wireless repeater bridge using dd-wrt firmware
Operating systems
client authenticator protocol client authenticator protocol ctap enables roaming user-controlled cryptographic authenticator smartphone hardware security key interoperate client platform laptop computer ctap complementary web authentication webauthn standard published world wide web consortium w3c webauthn ctap primary outputs fido2 project joint effort fido alliance w3c ctap based upon previous work done fido alliance particular universal 2nd factor u2f authentication standard specifically fido u2f 1.2 proposed standard july 11 2017 became starting point ctap proposed standard latest version published january 30 2019 ctap specification refers two protocol versions ctap1/u2f protocol ctap2 protocol authenticator implements ctap2 called fido2 authenticator also called webauthn authenticator authenticator implements ctap1/u2f well backward compatible u2f protocol uses cbor binary data serialization format
Computer security
north amp south video game north south combined strategy action game released 1989 commodore amiga atari st ported later nes amstrad cpc msx dos zx spectrum developed published infogrames north south offshoot belgian comic series les tuniques bleues raoul cauvin louis salverius/willy lambillotte dupuis based american civil war player basically acts civil war choosing play either north south player may choose start game year 1861 year civil war erupted 1864 year different array armies states side starts north south contains lot humorous elements example features parodies national anthems accessible player selects one different languages supported game english french spanish german italian addition game filled numerous comical situations gags taking simplified board interface game features strategic map united states separated states territories army units moved around state owns railway station fort capture leads player overtaking whole state otherwise capturing state involves simple movement unless another army state armies reinforced two ways turning option main menu player controlling state north carolina get periodic reinforcements ship also railways generate money turn generates soldiers moving army units player may expand westwards unoccupied territory two antagonistic armies clash result battle option main menu player turn in-game missions battles make purely like board game whenever opposing armies meet board-game mode results battles left chance outcome weighted towards larger army either army may retreat battles whenever side attempts capture enemy fort rob train result also randomised battle screen one action elements game different strategic map player starts opposite sides screen controls army consisting infantry cavalry artillery standard army consists six infantry three cavalry one cannon armies increased three times standard size merging together team six infantry three cavalry three cannons battlefield one time human player control one class units one time although cavalry starts charge left moving automatically forward straight line player focuses either cannon infantry computer-controlled opponent move three classes units infantry cavalry aggressive units class move fire simultaneously infantry move direction including backwards short-range weapon cavalry melee units much faster infantry move backwards cavalry instead return battle field every time reach end seconds cavalry returns way stop moving returning start position left-right axis unhindered movement up-down axis note cavalry movement started stop moving forwards unless player actively pulls horse reigns pushing backwards control method choice cannons move vertically sideways cannon fired nine times battle automatically withdraw battle army wins cannons withdrawn battle cannons available next battle however rest army killed cannons withdrawn cannons also lost middle battle map may river chasm case bridge serves choke point fighters likely meet bridge destroyed cannons one hit leave hole bridge units fall die instantly two hits bridge destroy every battlefield either river canyon narrow indestructible passage across cannons long-range weapons aiming – rather determining exact range – always easy care taken firing cannons avoid friendly fire battle usually deathmatch although player may retreat attacking army retreats return state beginning turn defending army decides retreat move adjacent state still control surrendering state battle enemy defenders retreat adjacent states retreating result loss cannons army army computer-controlled opponent retreat cannons destroyed enemy three times units states train station player must short side-scrolling mission fort capture state player controls single soldier runs towards goal clock reaches end meeting obstacles enemy soldiers dynamite crates dogs help knives punches send enemies towards sky asterix style occasions player also gets opportunity capture enemy train similar manner attacker running along train long see leave successfully capturing enemy train gets gold option turned storm cloud sit one state turn cloud move adjacent state twice month player turn army state cloud able move turn option main menu turned two non-player sides pose threat player armies native american lives west territory might hurl giant tomahawk randomly one westernmost states destroying army unfortunate enough garrisoned similarly sombrero-clad mexican living southwest might suddenly wake siesta toss bomb texas result option turned side controls north carolina chance turn free reinforcements arrive state via ship computer gaming world gave north south one-plus stars five wargamers three five arcade gamers 2011 wirtualna polska ranked tenth best amiga game june 2012 microïds anuman interactive ’ adventure game label released bluecoats north vs south remake ios android compatible devices windows ios version received metascore 60 metacritic another remake titled north south game released ios november 6 2012 bitcomposer entertainment ag
Computer architecture
multipath tcp multipath tcp mptcp ongoing effort internet engineering task force ietf multipath tcp working group aims allowing transmission control protocol tcp connection use multiple paths maximize resource usage increase redundancy january 2013 ietf published multipath specification experimental standard rfc 6824 currently ietf works update version 1 mptcp protocol obsolete rfc 6824 approved 2019 redundancy offered multipath tcp enables inverse multiplexing resources thus increases tcp throughput sum available link-level channels instead using single one required plain tcp multipath tcp backward compatible plain tcp multipath tcp particularly useful context wireless networks using wi-fi mobile network typical use case addition gains throughput inverse multiplexing links may added dropped user moves coverage without disrupting end-to-end tcp connection problem link handover thus solved abstraction transport layer without special mechanisms network link level handover functionality implemented endpoints without requiring special functionality subnetworks accordance internet end-to-end principle multipath tcp also brings performance benefits datacenter environments contrast ethernet channel bonding using 802.3ad link aggregation multipath tcp balance single tcp connection across multiple interfaces reach high throughput order facilitate deployment multipath tcp presents socket interface tcp implies standard tcp application used multipath tcp fact spreading data across several subflows applications could benefit enhanced api control underlying multipath tcp stack two different apis proposed expose features multipath tcp stack applications api extends netlink linux enhanced socket api july 2013 mptcp working group reported five independent implementations multipath tcp including reference implementation linux kernel currently available implementations july 2014 oracle reported implementation solaris developed june 2015 work progress mptcp wg meeting ietf 93 sunghoon seo announced kt deployed since mid june commercial service allows smartphone users reach 1 gbit/s using mptcp proxy service multipath tcp designed backward compatible regular tcp support application however specific deployments leverage ability simultaneously using different paths apple uses multipath tcp support siri application iphone siri sends voice samples https session apple servers servers reply information requested users according apple engineers main benefits multipath tcp application deployment use multipath tcp aggregate bandwidth different networks example several types smartphones notably korea use multipath tcp bond wifi 4g socks proxies another example hybrid access networks deployed network operators willing combine xdsl lte networks deployment multipath tcp used efficiently balance traffic xdsl lte network multipath tcp uses options described detail rfc 6824 multipath tcp options encoded tcp options option kind 30 reserved iana multipath tcp option kind 30 length variable remainder content begins 4-bit subtype field iana created maintain sub-registry entitled mptcp option subtypes transmission control protocol tcp parameters registry subtype fields defined follows values 0x8 0xe currently unassigned core idea multipath tcp define way build connection two hosts two interfaces standard tcp instance alice smartphone 3g wifi interfaces ip addresses 10.11.12.13 10.11.12.14 bob computer ethernet interface ip address 20.21.22.23 standard tcp connection established two ip addresses tcp connection identified four-tuple source destination addresses ports given restriction application create one tcp connection single link multipath tcp allows connection use several paths simultaneously multipath tcp creates one tcp connection called subflow path needs used purpose different protocol operations defined rfc 6824 multipath tcp adds new mechanisms tcp transmissions detailed specification detailed protocol specification provided rfc 6824 several survey articles provide introduction protocol several congestion control mechanisms defined multipath tcp main difference classical tcp congestion control schemes need react congestion different paths without unfair single path tcp sources could compete one paths four multipath tcp congestion control schemes currently supported multipath tcp implementation linux kernel stream control transmission protocol sctp reliable in-order datagram stream transport protocol originally intended telecommunication signaling supports concurrent use multiple access links allows application influence access interface selections datagram stream basis also supports mobility via access renegotiation hence sctp also transport layer solution offers type 3 flow granularity concurrency flow scheduling control multipath tcp also fully supports mobility fashion similar multipath tcp within ip multimedia subsystem ims architecture session initiation protocol sip support concurrent use multiple contact ip addresses registration one ims user agents allows creation multiple ims signaling paths signaling paths signaling messages carry session description protocol sdp messaging negotiate media streams sdp allows re- negotiation streams one media session multiple paths turn enables application layer multipath transport point view ims therefore offer application layer multipath support flow granularity concurrent access multipath extension real-time transport protocol rtp currently discussion within ietf multipath rtp offer flow granularity concurrent access mobility via ims sdp signaling rtp control protocol ietf currently developing quic protocol integrates features traditionally found tcp tls http protocols thanks flexibility extensibility quic possible extend support multiple paths address use cases multipath tcp first design multipath quic proposed implemented evaluated session layer mobile access router project experimented 2003 aggregation multiple wireless accesses heterogeneous technologies transparently balancing traffic response perceived performance parallel access schemes used accelerate transfers taking advantage http range requests initiate connections multiple servers replicated content equivalent multipath tcp involve application layer limited content known size
Internet protocols
hyper text coffee pot control protocol hyper text coffee pot control protocol htcpcp facetious communication protocol controlling monitoring diagnosing coffee pots specified rfc 2324 published 1 april 1998 april fools day rfc part april fools prank extension htcpcp-tea published rfc 7168 1 april 2014 support brewing teas also april fools day rfc rfc 2324 written larry masinter describes satire saying serious purpose – identifies many ways http extended inappropriately wording protocol made clear entirely serious example notes strong dark rich requirement protocol designed espressoly sic brewing coffee despite joking nature origins perhaps protocol remained minor presence online editor emacs includes fully functional client side implementation number bug reports exist complaining mozilla lack support protocol ten years publication htcpcp web-controlled coffee consortium wc3 published first draft htcpcp vocabulary rdf parody world wide web consortium w3c http vocabulary rdf april 1 2014 rfc 7168 extended htcpcp fully handle teapots htcpcp extension http htcpcp requests identified uniform resource identifier uri scheme codice_1 corresponding word 29 listed languages contain several additions http methods also defines two error responses 5 august 2017 mark nottingham chairman ietf httpbis working group called removal status code 418 'm teapot node.js platform code implemented reference original 418 'm teapot established hyper text coffee pot control protocol 6 august 2017 nottingham requested references 418 'm teapot removed programming language go subsequently python requests asp.net httpabstractions library well response 15 year old developer shane brunswick created website save418.com established save 418 movement asserting references 418 'm teapot different projects serve reminder underlying processes computers still made humans brunswick site went viral hours following publishing garnering thousands upvotes social platform reddit causing mass adoption save418 twitter hashtag introduced site heeding public outcry node.js go python requests asp.net httpabstractions library decided removing 418 'm teapot respective projects unanimous support aforementioned projects general public prompted mark nottingham begin process 418 marked reserved http status code ensuring 418 replaced official status code foreseeable future
Internet protocols
gul agha computer scientist gul agha گُل آغا professor computer science university illinois urbana-champaign director open systems laboratory known work actor model concurrent computation also editor-in-chief acm computing surveys 1999 2007 agha completed b.s honors california institute technology year 1977 received ph.d. computer communication science university michigan 1986 supervision john holland however much doctoral research carried carl hewitt message-passing semantics group massachusetts institute technology mit agha dissertation published mit press actors model concurrent computation distributed systems book according acm guide computing literature cited 3000 times agha born completed early schooling sindh pakistan received b.s honors california institute technology 1977 agha enjoys blues music vegan pacifist three daughters lives wife jennifer s. cole illinois agha became fellow institute electrical electronics engineers ieee 2002 also golden core member ieee computer society recipient ieee computer society meritorious service award international lecturer acm 1992 1997 agha elected acm fellow 2018 research concurrent programming formal methods specifically actor model
Programming language topics
helix netroom netroom dos memory manager produced helix software company 1990s introduced august 1990 netroom originally titled lan memory manager version 1.0 netroom re-packaged version helix headroom headroom network extensions bundled together targeted network users netroom loaded network drivers virtual machine created using expanded memory page frame netroom allowed virtual machine run multitasked background process netroom included support novell netware banyan vines lan manager networks netroom originally available multi-user packs starting four user license helix introduced version 1.10 netroom january 1991 single-user license version included support microsoft windows 3.0 added integrated 286 386 expanded memory manager netroom 286/386 memory manager provided access expanded memory extended memory intel 80386 newer systems well intel 80286 systems based chips technologies neat chipset june 1991 netroom v2.0 added ms-dos 5 compatibility automatic setup configuration tool named customize netroom 2.0 continued focus virtual machine task-switching primary memory management technology january 1992 netroom v2.1 added quantum memory management feature could relocate system video bios high memory area 1992 helix licensed technology netroom 2.1 microsoft technology incorporated emm386 memmaker programs ms-dos 6 released march 1993 concurrently release ms-dos 6 helix released netroom v3.0 included helix cloaking technology netroom 3 contained variety cloaked utilities including system video bios licensed award software animated screen saver disk cache ram drive final version netroom v3.04 released late 1994 included compatibility windows 95 cloaking driver continued basis multimedia cloaking multimedia stacker products released 1994 1995
Operating systems
javastation javastation network computer nc developed sun microsystems 1996 2000 intended run java applications hardware based design sun sparcstation series successful line unix workstations javastation nc lacks hard drive floppy cd-rom drive also differs sun systems ps/2 keyboard mouse interfaces vga monitor connector several models javastation produced pre-production variants produced small numbers production models comprised models produced prototypes limited numbers included addition sun envisioned third-generation super javastation krups javachip co-processor native java bytecode execution n't appear produced javastation concept superseded sun ray series thin client terminals javastation comes javaos flash memory also possible install linux netbsd javastation
Computer architecture
canadian cyber incident response centre canadian cyber incident response centre ccirc ccric government canada program responsible monitoring threats coordinating national response cyber security incident focus protection national critical infrastructure cyber incidents housed within ministry public safety ccirc works within public safety canada partnership municipalities territories provinces private sector organizations international counterparts also coordinates national response serious cyber security incident
Computer security
copy-evident document copy-evident documents features make detectable copy original security printing various methods void pantograph used create patterns hard copy exactly copied inexactly produces easily detectable image include halftone screens affected copying process fine line patterns different directions differently affected copying hence produce mark metallic inks causing diffraction reflection copy-evident computer image files also possible example embedding high-frequency pattern jpeg image imperceptible produces obvious message re-compressed different quality factor forms paper watermarking digital watermarking regarded copy-evidence although detecting document file copied typically requires special inspection tools software example 3d printed objects equipped marks genuinity identified using measurement device hard deduce sample objects copies lack marks
Computer security
system generation os system generation sysgen two-stage process installing updating os/360 os/vs1 os/vs2 svs os/vs2 mvs chargeable systems derived similar processes e.g. dos/360 article cover also details changed releases os/360 many details carry later systems several reasons ibm provided system generation process rather simply providing mechanism restore system tape disk system/360 self-identifying i/o devices customer could request installation i/o devices arbitrary addresses result ibm provide mechanism customer define i/o configuration os/360 also os/360 supported several different options ibm needed way customer select code appropriate options needed particular installation sysgen process runs series jobs control operating system new installations ibm provides complete pre-configured driver system intended preparing running sysgen production use prior running sysgen customer must initialize set distribution volumes restore set distribution libraries tape volumes libraries include data sysgen process copy target libraries input utilities used sysgen process macro definitions used sysgen process load modules sysgen process include linking load modules target libraries stage 1 compilation sequence assembler macro instructions describing configuration installed updated assembler actually compile object code instead compiles series punch pseudo-ops order generate job stream stage 2 ibm changed nomenclature os/360 options also changed sysgen macro definitions use newer names options type keyword ctrlprog macro stage 1 input specifies type control program release 13 old terms sss mss mps replaced pcp mft mvt later m65mp type variation mvt scheduler macro stage 1 input specifies type scheduler release 13 still used values sequential priority subsequently replaced values used type keyword ctrlprog macro types generate macro sysgen input several types mvt either type=mvt type=m65mp tso tsogen macro plays role generate either macros analyzes options specified previous macro calls punches stage 2 job stream stage 2 jobstream uses variety utilities including assembler linkage editor process obsolete initially replaced use smp/e iocp mvscp later smp/e hardware configuration definition hcd
Operating systems
vupen vupen security french information security company founded 2004 based montpellier u.s. branch based annapolis maryland specialty discovering zero-day vulnerabilities software major vendors order sell law enforcement intelligence agencies use achieve defensive offensive cyber-operations vupen ceased trading 2015 founders created new company zerodium 2011 2012 2013 2014 vupen first prize hacking contest pwn2own notably 2012 exploiting bug google chrome decision reveal details vulnerability google rather sell controversial unlike 2012 pwn2own 2014 vupen decided reveal affected vendors including google exploits technical details regarding discovered vulnerabilities led release various security updates adobe microsoft apple mozilla google address reported flaws according french registrar companies vupen earned net profit €1,283,000 2014 years ago vupen still providing information vulnerabilities software free decided earn money services software companies chance said vupen-founder chaouki bekrar according article late 15 september 2013 revealed nsa client vupen subscription exploit service 9 november 2014 german magazine der spiegel reported german information security agency bsi tasked protection federal government networks also client vupen 22 july 2015 revealed vupen provided exploits hacking team 2010 2011 5 may 2015 vupen headquarters filed documents ceasing operations 23 july 2015 vupen founders launched new us cybersecurity company named zerodium different business model acquires exclusive zero-day discoveries independent researchers reports along protective measures security recommendations corporate government clients
Computer security
green house data green house data data center managed services provider headquartered cheyenne wyoming united states cheyenne home campus 45,000 square feet data center space well administrative technical support offices company additional data center locations washington colorado oregon georgia texas new jersey new york sales marketing offices laramie denver colorado 2019 company also operates consulting focused office toronto ontario 2007 three friends hatched idea data center powered exclusively renewable energy coffee soon began process retrofitting former office building provision 3000 square feet colocation space march 2012 green house data doubled footprint cheyenne location added cloud hosting products expanded footprint west coast december 2013 east coast expansion announced august 2013 company broken ground new facility cheyenne second cheyenne location officially opened july 30 2014 september 2014 1547 critical systems realty green house data announced company would anchor tenant redevelopment 1 ramland road orangeburg new york april 2015 company acquired fibercloud seattle washington based provider colocation cloud hosting data center services acquisition green house data added three data centers washington state well nearly 20 employees several hundred customers april 2017 company acquired cirracore cloud-focused infrastructure provider based atlanta georgia november 2017 company acquired ajubeo cloud hosting service provider based denver green house data announced merger via acquisition infront consulting group may 2018 expanding operations toronto las vegas well satellite sites adding 30 consulting staff focusing microsoft azure cloud automation consulting company part new surge data center construction cheyenne region across rocky mountains cheyenne ranked top 5 location data centers microsoft echostar national center atmospheric research operating facilities city addition green house data facility orangeburg represents entry rockland county market beginning emerge new data center cluster home facilities operated bloomberg l.p. verizon everett bellingham washington represent markets i-5 corridor historically underserved whole data center industry highly criticized heavy electrical use recent years actively tried reduce power consumption improving facility design increasing server virtualization key element business model green house data purchases renewable energy credits recs wind power documents purchases epa green power partnership 2013 green house data part epa leadership club sustainable power purchases common measure data center power consumption power usage effectiveness often abbreviated pue beginning 2014 green house data first company participate wyorecs first renewable energy credit program based wyoming april 2015 green house data joined epa top 30 tech telecom list largest green power users retiring 8 million kilowatt-hours kwh green power annually 2017 company moved 5 places list retiring 20,270,000 kwhs npr things considered called green house data energy efficiency obsession july 2011 company cloud colocation facilities achieved ssae 16 type ii compliance additionally 2012 green house data achieved hipaa compliance green house data operates total seven data center facilities five geographic regions cloud colocation data centers atlanta ga cheyenne wy seattle wa bellingham wa cloud data centers dallas tx denver co orangeburg ny location carrier neutral fully compliant hipaa ssae 16 type ii standards comes guaranteed uptime service level agreements march 2016 company announced hear human technical support service guarantee fortune called characteristic boutique cloud seattle facility located within westin building 3rd largest carrier hotel united states westin building data center consists 18th 19th 32nd floors participation seattle internet exchange green house data became one select group azure expert msps independently certified audit demonstrates exceptional proficiency abilities within microsoft azure ecosystem april 2019 late 2017 green house data acquired assuritive disaster recovery service provider november 2017 green house data acquired ajubeo denver-based cloud hosting service provider bringing company total cloud node locations ten earlier year green house data acquired cirracore atlanta-based provider enterprise cloud services expanding company reach southeast united states green house data acquired fibercloud west coast data center company april 2015 gaining three washington facilities seattle everett bellingham february 2015 green house data recognized top 500 msp crn magazine second consecutive year october 2014 green house data recognized top 100 cloud services provider talkin cloud making list second consecutive time february 2014 green house data recognized top 500 managed service provider crn magazine 2014 green house data became first b corp wyoming green house data cto cortney thompson interviewed part marketplace radio piece wyoming public media covering government departments moving cloud services data centers august 2014 state wyoming announced first anchor tenant green house data second cheyenne facility
Distributed computing architecture
java web services development pack java web services development pack jwsdp free software development kit sdk developing web services web applications java applications newest technologies java oracle replaced jwsdp glassfish components jwsdp part glassfish wsit several java se 6 mustang source available open source initiative-approved cddl license components apis available jwsdp 1.6 starting jwsdp 1.6 jax-rpc jax-ws implementations support fast infoset standard binary encoding xml infoset earlier versions jwsdp also included many java implementations web services xml processors support java standards support standards non-standard features related technologies include
Web technology
versados versados operating system dating back early 1980s use motorola 68000 development system called exormacs featured versabus array option cards typically connected cdc phoenix disk drives running one four 14-inch platters exormacs used emulate 680xx processor in-circuit speeding development 680xx based systems also hosted several compilers assemblers versados exormacs produced motorola microsystems division versados real-time multi-user operating system follow product single user mdos ran 6800 development system called exorciser systems features harness cpu socket compatible connector modula 2 compiler ported versados following list commands utilities supported versados
Operating systems
acct protocol acct uri scheme proposed internet standard published internet engineering task force defined purpose scheme identify rather interact user accounts hosted service provider scheme differs dns name specifies service provider acct uri intended single uri scheme would return information person possibly thing holds account given domain
Internet protocols
lockss lockss lots copies keep stuff safe project auspices stanford university peer-to-peer network develops supports open source system allowing libraries collect preserve provide readers access material published web main goal digital preservation system attempts replicate way libraries material published paper originally designed scholarly journals also used range materials examples include solinet project preserve theses dissertations eight universities us government documents metaarchive cooperative program preserving at-risk digital archival collections including electronic theses dissertations etds newspapers photograph collections audio-visual collections similar project called clockss controlled lockss tax-exempt 501 c 3 not-for-profit organization governed board directors made librarians publishers clockss runs lockss technology rutgers university libraries webpage comparing lockss clockss portico traditionally academic libraries retained issues scholarly journals either individually collaboratively providing readers access content received even publisher ceased subscription canceled digital age libraries often subscribe journals available digitally internet although convenient patron access model digital subscriptions allow libraries retain copy journal publisher ceases publish library cancels subscription publisher website day content paid longer available lockss system allows library permission publisher collect preserve disseminate patrons copy materials subscribed well open access material perhaps published creative commons license library system collects copy using specialized web crawler verifies publisher granted suitable permission system format-agnostic collecting whatever formats publisher delivers via http libraries collected material cooperate peer-to-peer network ensure preservation peers network vote cryptographic hash functions preserved content nonce peer outvoted regards copy damaged repairs publisher peers lockss license used publishers allows library readers access copy allow similar access libraries unaffiliated readers system support file sharing request library may supply another library content effect repair requesting library proved past good copy voting majority reader browser longer supports format copy collected format migration process convert current format limits use may made preserved copies copyright material effective persuading copyright owners grant necessary permission lockss approach selective collection permission publisher distributed storage restricted dissemination contrasts example internet archive approach omnivorous collection without permission publisher centralized storage unrestricted dissemination lockss system far smaller preserve subscription materials internet archive access since library administers lockss peer maintains copy preserved material since libraries worldwide see list participating libraries system provides much higher degree replication usual fault-tolerant system voting process makes use high degree replication eliminate need backups off-line media provide robust defenses attacks aimed corrupting preserved content addition preserving access libraries traditionally made difficult rewrite suppress printed material existence indeterminate large number identical copies somewhat tamper-resistant medium many independent administrations meant attempts alter remove copies published work would likely fail detected web publishing based single copy single administration provides none safeguards subversion web publishing therefore amenable tool rewriting history preserving many copies diverse administration automatically auditing copies intervals future publisher copy alerting libraries changes detected lockss system attempts restore many safeguards digital world publication prior implementing lockss system questions need considered carefully order make sure content verified evaluated auditable users user must ask questions procedures methods system evaluated disaster preparedness program questions enable user evaluate system create successful maintenance plan materials enable system reinforced carefully evaluated support structure source code entire lockss system carries bsd-style open-source licenses available github lockss trademark stanford university
Distributed computing architecture
type variable type theory programming languages type variable mathematical variable ranging types even programming languages allow mutable variables type variable remains abstraction sense correspond memory locations programming languages support parametric polymorphism make use universally quantified type variables languages support existential types make use existentially quantified type variables example following ocaml code defines polymorphic identity function universally quantified type printed interpreter second line mathematical notation type function codice_1 formula_1 formula_2 type variable
Programming language topics
miros bsd miros bsd originally called mirbsd discontinued free open source operating system started fork openbsd 3.1 august 2002 intended maintain security openbsd better support european localisation since also incorporated code free bsd descendants including netbsd microbsd freebsd code miros bsd also incorporated ekkobsd ekkobsd ceased exist artwork code developers ended working miros bsd unlike three major bsd distributions miros bsd supports x86 sparc architectures one project goals able port miros userland run linux kernel hence deprecation mirbsd name favour miros web page os project active 2019 last update os years ago e.g font released miros bsd originated openbsd-current-mirabilos openbsd patchkit soon grew differences opinion openbsd project leader theo de raadt thorsten glaser despite forking miros bsd synchronised ongoing development openbsd thus inheriting good security history well netbsd bsd flavours one goal provide faster integration cycle new features software openbsd according developers controversial decisions often made differently openbsd instance wo n't support smp miros also tolerant software inclusion policy end result hopefully refined bsd experience another goal miros bsd create modular base bsd system similar debian miros linux linux kernel bsd userland discussed developers sometime 2004 materialised important differences openbsd aside cooperating bsds submitting patches upstream software authors synergy effects freewrt active cooperation grml inclusion technical areas projects debian also fed mirsoftware mirports derivative openbsd ports tree developed benny siegert mirports use package tools openbsd written perl continues maintain previous c-based tools new features in-place package upgrades installing mirports instance non-root user unlike openbsd ports mirports tied specific os versions even stable releases using newest version recommended mirlibtool modified version gnu libtool 1.5 installed mirports build shared libraries portable way multiple platforms supported box following miros bsd policy faster software availability user many ports removed political reasons openbsd e.g djb software flash plugin kept mirports continue used mirports intended place unofficial rejected openbsd ports
Operating systems
java architecture xml binding java architecture xml binding jaxb software framework allows java developers map java classes xml representations jaxb provides two main features ability marshal java objects xml inverse i.e unmarshal xml back java objects words jaxb allows storing retrieving data memory xml format without need implement specific set xml loading saving routines program class structure similar codice_1 codice_2 .net framework jaxb particularly useful specification complex changing case regularly changing xml schema definitions keep synchronised java definitions time consuming error-prone jaxb part java se platform one apis java ee platform part java web services development pack jwsdp also one foundations wsit java 11 jaxb removed java se platform moved jakarta ee project details see jep 320 jaxb 1.0 developed java community process jsr 31 2006 jaxb 2.0 released jsr 222 maintenance release 2 released december 2009 reference implementations specifications available cddl open source license java.net tool xjc used convert xml schema schema file types java 1.6 relax ng xml dtd wsdl supported experimentally class representations classes marked using annotations javax.xml.bind.annotation namespace example xmlrootelement xmlelement xml list sequences represented attributes type java.util.list marshallers unmarshallers created instance jaxbcontext addition jaxb includes schemagen tool essentially perform inverse xjc creating xml schema set annotated classes table lists mappings xml schema xsd data types java data types jaxb
Programming language topics
sigil computer programming computer programming sigil symbol affixed variable name showing variable datatype scope usually prefix codice_1 codice_2 sigil sigil latin sigillum meaning little sign means sign image supposedly magical power 1999 philip gwyn adopted term mean funny character front perl variable use sigils popularized basic programming language best known example sigil basic dollar sign codice_2 appended names strings many basic dialects use sigils like codice_4 denote integers floating point numbers precision sometimes types well larry wall adopted shell scripting use sigils perl programming language perl sigils specify fine-grained data-types like strings integers general categories scalars using prefixed codice_2 arrays using codice_6 hashes using codice_4 subroutines using codice_8 perl 6 introduces secondary sigils twigils indicate scope variables prominent examples twigils perl 6 include codice_9 used self-declared formal parameters placeholder variables codice_10 used object attribute accessors i.e. instance variables clips scalar variables prefixed codice_11 sigil multifield i.e 1-level list variables prefixed codice_12 common lisp special variables dynamic scope typically surrounded codice_13 dubbed “ earmuff convention ” convention enforced language adopts practice e.g. *standard-output* similarly programmers surround constants codice_14 cycl variables prefixed codice_11 sigil similarly constant names prefixed codice_16 pronounced hash-dollar elixir string sigils provided via codice_17 symbol mapper aka bis named variables prefixed suffixed strings character values require quotes mirc script identifiers codice_2 sigil variables codice_4 prefixed regardless local global variables data type binary variables prefixed codice_8 mumps programming language codice_2 precedes intrinsic function names 'special variable names built-in variables accessing execution state codice_22 precedes non-standard intrinsic function names codice_23 precedes extrinsic function names routines used procedures subroutines functions global variables database storage prefixed caret last global variable subtree may referenced indirectly caret last subscript referred naked reference system-wide routines global variables stored certain shared database prefixed referred percent routines percent globals objective-c string literals preceded codice_6 instances object type codice_25 since clang v3.1 llvm v4.0 codice_26 codice_27 codice_28 prefix-codice_6 also used keywords codice_30 codice_31 codice_32 express structure class definitions within class declarations definitions well prefix codice_33 used indicate member methods variables prefix codice_14 indicates class elements php language largely inspired perl codice_2 precedes variable name names prefixed considered constants functions class names interface trait names share namespace classes pilot uses codice_2 buffers string variables codice_37 integer variables codice_13 program labels python uses codice_6 prefix denote decorator ruby ordinary variables lack sigils codice_2 prefixed global variables codice_6 prefixed instance variables codice_42 prefixed class variables ruby also uses strictly conventional suffix sigils codice_11 indicates predicate method returning usually boolean value codice_44 indicates method may potentially unexpected effect needs handled care scheme convention names procedures always return boolean value usually end codice_11 likewise names procedures store values parts previously allocated scheme objects pairs vectors strings usually end codice_44 standard ml uses prefix sigil codice_47 variable refers type sigil doubled refers type equality defined codice_47 character may also appear within end variable case special meaning transact-sql codice_6 precedes local variable parameter name system variables known global variables distinguished codice_42 prefix windows powershell partly inspired unix shells perl variable names prefixed codice_2 sigil xslt variables parameters leading codice_2 sigil use although defined codice_53 codice_54 codice_55 attribute sigil included related xslt xquery uses codice_2 sigil form definition use mel variable names prefixed codice_2 distinguish functions commands identifiers unix shell scripting utilities makefiles codice_2 unary operator translates name variable contents may seem similar sigil properly unary operator lexical indirection similar codice_13 dereference operator pointers c noticeable fact dollar sign omitted assigning variable fortran sigils used variables starting letters j k l n integers default fortran documentation refers implicit typing though explicit typing always available allow variable declared type choice range i–n conforms traditional mathematical naming conventions various programming languages including prolog haskell ruby go treat identifiers beginning capital letter differently identifiers beginning small letter practice related use sigils actually form stropping use many languages microsoft ’ .net common language infrastructure cli requires way use variables different language may keywords calling language sometimes done prefixes c variable names may prefixed codice_6 mainly used allow use variable names would otherwise conflict keywords achieved vb.net enclosing name square brackets codice_61 codice_6 prefix also applied string literals see literal affixes related sigils hungarian notation convention variable-naming specifies variable type attaching certain alphabetic prefixes variable name unlike sigils however hungarian notation provides information compiler explicit types must redundantly specified variables unless using language type inference standard compilers enforce use prefixes permits omission also makes code prone confusion due accidental erroneous use sigils applied names identifiers similar prefixes suffixes applied literals notably integer literals string literals specifying either literal evaluated data type example codice_63 evaluates value 16 unsigned long long integer c++ codice_64 prefix indicates hexadecimal suffix codice_65 indicates unsigned long long similarly prefixes often used indicate raw string codice_66 python represents string value codice_67 escaped string would written codice_68 affects semantics value literal rather syntax semantics identifier name neither stropping identifier syntax sigil identifier semantics syntactically similar compare java annotations override deprecated cases syntax used distinct purposes cause confusion example c codice_6 prefix used either stropping allow reserved words used identifiers prefix literal indicate raw string case neither use sigil affects syntax identifiers semantics literals semantics identifiers
Programming language topics
katz back-off model katz back-off generative n -gram language model estimates conditional probability word given history n -gram accomplishes estimation backing progressively shorter history models certain conditions model reliable information given history used provide better results model introduced 1987 slava m. katz prior n-gram language models constructed training individual models different n-gram orders using maximum likelihood estimation interpolating together equation katz back-off model essentially means n -gram seen k times training conditional probability word given history proportional maximum likelihood estimate n -gram otherwise conditional probability equal back-off conditional probability n − 1 -gram difficult part determining values k α formula_2 least important parameters usually chosen 0 however empirical testing may find better values k. formula_3 typically amount discounting found good–turing estimation words good–turing estimates formula_4 formula_5 formula_6 compute formula_7 useful first define quantity β left-over probability mass n − 1 -gram back-off weight α computed follows formula applies data n − 1 -gram algorithm skips n-1 entirely uses katz estimate n-2 n-gram data found model generally works well practice fails circumstances example suppose bigram b unigram c common trigram b c never seen since b c common may significant due chance b c never seen perhaps allowed rules grammar instead assigning appropriate value 0 method back bigram estimate p c b may high
Computational linguistics
high assurance guard high assurance guard hag multilevel security computer device used communicate different security domains niprnet siprnet hag one example controlled interface security levels hags approved common criteria process hag runs multiple virtual machines physical machines one subsystems lower classification one subsystems higher classification hardware runs type knowledge management software examines data coming higher classification subsystem rejects data classified higher lower classification general hag allows lower classified data resides higher classified system moved another lower classified system example us would allow unclassified information residing secret classified system moved another unclassified system various rules filters hag ensures data lower classification allows transfer application layer hag runs evaluated mandatory integrity policy provides sensitive files data applications protection inadvertent disclosure operating system level hag must multi-level kernel ensures sensitive information processes devices stored running system different sensitivity levels intermingle violation system mandatory security model systems certified via common criteria depending classification system may require common criteria evaluated assurance level eal 3 higher examples us evaluation eal 5 eal 5+ eal 5 augmented higher required export secret domain unclassified domain manufacturers may use trusted computer system trusted applications high assurance equivalent term hag hag mostly used email dms environments certain organizations may unclassified network access need send message organization secret network access hag provides ability
Computer security
netbeans netbeans integrated development environment ide java netbeans allows applications developed set modular software components called modules netbeans runs windows macos linux solaris addition java development extensions languages like php c c++ html5 javascript applications based netbeans including netbeans ide extended third party developers netbeans began 1996 xelfi word play delphi java ide student project guidance faculty mathematics physics charles university prague 1997 roman staněk formed company around project produced commercial versions netbeans ide bought sun microsystems 1999 sun open-sourced netbeans ide june following year since netbeans community continued grow 2010 sun thus netbeans acquired oracle corporation oracle netbeans competed jdeveloper freeware ide historically product company september 2016 oracle submitted proposal donate netbeans project apache software foundation stating opening netbeans governance model give netbeans constituents greater voice project direction future success upcoming release java 9 netbeans 9 beyond move endorsed java creator james gosling project entered apache incubator october 2016 netbeans ide releases netbeans ide 6.0 introduced support developing ide modules rich client applications based netbeans platform java swing gui builder formerly known project matisse improved cvs support weblogic 9 jboss 4 support many editor enhancements netbeans 6 available official repositories major linux distributions netbeans ide 6.5 released november 2008 extended existing java ee features including java persistence support ejb 3 jax-ws additionally netbeans enterprise pack supports development java ee 5 enterprise applications including soa visual design tools xml schema tools web services orchestration bpel uml modeling netbeans ide bundle c/c++ supports c/c++ fortran development netbeans ide 6.8 first ide provide complete support java ee 6 glassfish enterprise server v3 developers hosting open-source projects kenai.com additionally benefit instant messaging issue tracking integration navigation right ide support web application development php 5.3 symfony framework improved code completion layouts hints navigation javafx projects netbeans ide 6.9 released june 2010 added support osgi spring framework 3.0 java ee dependency injection jsr-299 zend framework php easier code navigation overridden/implemented annotations formatting hints refactoring across several languages netbeans ide 7.0 released april 2011 august 1 2011 netbeans team released netbeans ide 7.0.1 full support official release java se 7 platform netbeans ide 7.3 released february 2013 added support html5 web technologies netbeans ide 7.4 released 15 october 2013 netbeans ide 8.0 released 18 march 2014 netbeans ide 8.1 released 4 november 2015 netbeans ide 8.2 released 3 october 2016 netbeans 9.0 adds support java 9 10 released 29 july 2018 apache incubator project netbeans 10.0 released 27 december 2018 brings support java 11 improved support php 7.0–7.3 netbeans 11.0 released 4 april 2019 netbeans 11.1 released 22 july 2019 netbeans platform framework simplifying development java swing desktop applications netbeans ide bundle java se contains needed start developing netbeans plugins netbeans platform based applications additional sdk required applications install modules dynamically application include update center module allow users application download digitally signed upgrades new features directly running application reinstalling upgrade new release force users download entire application platform offers reusable services common desktop applications allowing developers focus logic specific application among features platform showcase applications developed top netbeans platform available https //netbeans.org/features/platform/showcase.html netbeans ide open-source integrated development environment netbeans ide supports development java application types java se including javafx java web ejb mobile applications box among features ant-based project system maven support refactorings version control supporting cvs subversion git mercurial clearcase modularity functions ide provided modules module provides well-defined function support java language editing support cvs versioning system svn netbeans contains modules needed java development single download allowing user start working immediately modules also allow netbeans extended new features support programming languages added installing additional modules instance sun studio sun java studio enterprise sun java studio creator sun microsystems based netbeans ide license ide licensed apache license 2.0 previously july 2006 2007 netbeans ide licensed sun common development distribution license cddl license based mozilla public license mpl october 2007 sun announced netbeans would henceforth offered dual license cddl gpl version 2 licenses gpl linking exception gnu classpath oracle donated netbeans platform ide apache foundation underwent incubation graduated top level project april 2019 october 2016 interview gabriela motroc oracle vice president bill pataky stated oracle number products depend netbeans 2018 netbeans still apache incubator alternative netbeans distribution called coolbeans independently launched coolbeans offered installer windows native application macos included java development kit native modules system notifications well java enterprise modules modules part netbeans ide netbeans profiler tool monitoring java applications helps developers find memory leaks optimize speed formerly downloaded separately integrated core ide since version 6.0 profiler based sun laboratories research project named jfluid research uncovered specific techniques used lower overhead profiling java application one techniques dynamic bytecode instrumentation particularly useful profiling large java applications using dynamic bytecode instrumentation additional algorithms netbeans profiler able obtain runtime information applications large complex profilers netbeans also support profiling points let profile precise points execution measure execution time formerly known project matisse gui design-tool enables developers prototype design swing guis dragging positioning gui components gui builder built-in support jsr 295 beans binding technology support jsr 296 swing application framework removed 7.1 netbeans javascript editor provides extended support javascript ajax css javascript editor features comprise syntax highlighting refactoring code completion native objects functions generation javascript class skeletons generation ajax callbacks template automatic browser compatibility checks css editor features comprise code completion styles names quick navigation navigator panel displaying css rule declaration list view file structure tree view sorting outline view name type declaration order list tree creating rule declarations tree refactoring part rule name tree netbeans 7.4 later uses new nashorn javascript engine developed oracle users choose download netbeans ide bundles tailored specific development needs users also download install features later date directly netbeans ide netbeans ide bundle web java ee provides complete tools latest java ee 6 standards including new java ee 6 web profile enterprise java beans ejbs servlets java persistence api web services annotations netbeans also supports jsf 2.0 facelets javaserver pages jsp hibernate spring struts frameworks java ee 5 j2ee 1.4 platforms includes glassfish apache tomcat features javaee includes netbeans supports php since version 6.5 bundle php includes oracle also releases version netbeans includes features bundles bundle includes official ruby support removed release 7.0 netbeans ide translated following languages community translations ide also available following languages
Web technology
nehalem microarchitecture nehalem codename intel processor microarchitecture released november 2008 nehalem used first generation intel core processors core i7 i5 core i3 based subsequent westmere sandy bridge designs nehalem successor older core microarchitecture intel core 2 processors intel codename nehalem taken nehalem river architecture differs radically netburst retaining latter minor features nehalem-based microprocessors use 45 nm process run higher clock speeds energy-efficient penryn microprocessors hyper-threading reintroduced along reduction l2 cache size well enlarged l3 cache shared among cores nehalem replaced sandy bridge microarchitecture released january 2011 reported nehalem focus performance thus increased core size compared penryn nehalem overclocking possible bloomfield processors x58 chipset lynnfield processors use pch removing need northbridge nehalem processors incorporate sse 4.2 simd instructions adding seven new instructions sse 4.1 set core 2 series nehalem architecture reduces atomic operation latency 50 attempt eliminate overhead atomic operations codice_1 compare-and-swap instruction successor nehalem westmere sandy bridge
Computer architecture
mbrwizard mbrwizard master boot record mbr management application x86 x86-64 based computers use disk imaging applications backup operating system deployment began increase well many users beginning experiment dual-booting linux existing windows machines key entries mbr often changed corrupted rendering machine unbootable mbrwizard designed allow user reverse repair unwanted destructive changes mbr effectively enabling computer boot properly originally developed 1999 internal use continually updated eventually released freeware public march 2003 initial functionality designed sort partition table entries caused effects disk imaging quickly evolved include backup recovery entire mbr repair corrupt windows mbr record well direct modification disk signature additional functionality added allow partitions activated hidden deleted later options added include disk wipe functionality shutdown/reboot machine mount/dismount windows volumes staging byte utilized maintain status reboots designed cross-platform application beginning mbrwizard noted flexible implemented natively pc operating systems addition freeware mbrwizard cli version mbrwizard suite 3.0 released 2010 commercial product featuring new graphical interface ability create custom winpe boot environments offline repair recovery
Operating systems
rightnow technologies oracle rightnow customer relationship management crm software service enterprise organizations originally developed rightnow technologies inc. acquired oracle corporation 2011 company founded 1997 greg gianforte bozeman montana additional offices opened california new york new jersey massachusetts texas illinois washington dc colorado canada europe australia asia company employed 1000 people 2011 rightnow business model software service using cloud computing gianforte started company 1997 without external capital created software product initially focused customer service integrated knowledge base company grew added marketing sales functionality voice automation customer feedback management analytics social platform product creating full customer experience suite 2004 rightnow technologies raised 44.1m million successful ipo nasdaq exchange 2006 rightnow technologies acquired sfa company salesnet 2009 rightnow technologies acquired social networking company hivelive 2011 company acquired q-go 34 million q-go founded 1999 specialized semantic search service based natural language processing technology providing relevant answers queries company ’ internet website corporate intranet formulated natural sentences keyword input alike integrated automatic statistical reporting user query behavior businesses want monitor kinds questions customers asking adjust content provide appropriate information customers reduce load traditional customer service ports call call centers answers email technology implemented deployed range industries including banking insurance pension telecommunications logistics well several government agencies october 2011 oracle corporation announced intention acquire rightnow 1.5 billion deal completed january 2012 main product offered rightnow technologies rightnow cx customer experience suite rightnow cx divided rightnow web experience rightnow social experience rightnow contact center experience rightnow engage
Distributed computing architecture
os/vs1 operating system/virtual storage 1 os/vs1 discontinued ibm mainframe computer operating system designed run ibm system/370 hardware successor multiprogramming fixed number tasks mft option system/360 operating system os/360 os/vs1 comparison predecessor supported virtual memory called virtual storage os/vs1 generally available 1970s 1980s longer supported ibm os/vs1 os/360 mft ii single virtual address space comparison os/vs2 svs os/360 mvt single virtual address space os/vs1 often installed mid-range ibm mainframe systems system/370 model 145 later system/370 model 148 os/vs1 intended manage medium-sized work load 1970s consisting batch processing applications running within fixed number operating system partitions via batch job management system job entry subsystem 1 jes1 contrast os/vs2 intended handle larger work loads consisting batch applications online interactive users using time sharing option tso combination however os/vs1 could often support interactive applications users running ibm cics transaction processing monitor job within one partitions installation modification os/vs1 accomplished via ibm cumbersome system generation sysgen process os/vs1 included replacement os/360 rje allowed submission retrieval jobs 2770 2780 3780 terminals workstation programs included os/vs1 e.g. 1130 res included remote terminal access method closer integration job management rje os/vs1 went seven product releases os/vs1 release 7 enhanced fourth release ibm os/vs1 basic programming extensions bpe product bpe provided support new 1980s hardware 3380 dasd disk last os/vs1 product release os/vs1 basic programming extensions bpe release 4 announced ibm 1983 general availability march 1984 product 5662-257 announcement letter 283-266 15 september 1983 ibm announced end functional enhancements os/vs1 1984 ibm recommended os/vs1 installations migrate mvs/370 mvs/xa assist migration mvs/xa ibm made vm/xa migration aid allowed installations run os/vs1 mvs/xa simultaneously machine guests third systemvm/xa way new mvs/xa system could tested old production os/vs1 system still use although ibm time sharing option tso required vs2 customers 370/145 370/148 time-sharing options. br one combination vm/cms time sharing guest machine running os/360 mft ii batch optional component os/360 mft ii os/360 mvt os/vs1 crje allowed user line-mode terminal edit text datasets submit jobs access job output non-ibm time-sharing product named tone tso-like vs1 vs one marketed tone software co
Operating systems
bobby ray inman bobby ray inman born april 4 1931 retired united states navy admiral held several influential positions united states intelligence community inman born raised community rhonesboro upshur county texas eastern portion state father owner operator gas station inman attended graduated mineola high school inman recalled 1986 5 4 tall weighed upon graduation tutored athletes admired high school keep bullied inman graduated mineola high school mineola texas age 15 1946 rode bus mineola tyler junior college member phi theta kappa national honor society graduated university texas degree history age 19 according budiansky joining naval reserve korean war inman rocketed ranks naval intelligence inman served director naval intelligence september 1974 july 1976 moved defense intelligence agency served vice director 1977 next became director national security agency inman held post 1981 last major position deputy director central intelligence post held february 12 1981 june 10 1982 simultaneously acting nsa director cia deputy director early 1981 modernized collection process setting joint facility college park maryland according budiansky inman sending memos back forth approving solutions 1976 martin hellman whitfield diffie published paper new directions cryptography introducing radically new method distributing cryptographic keys went far toward solving one fundamental problems cryptography key distribution become known diffie–hellman key exchange however hellman two graduate students attempted present work october 10 1977 international symposium information theory national security agency warned would legally equivalent exporting nuclear weapons hostile foreign power inman led nsa time feared encryption – far used military purposes – would used hostile foreign powers reducing ability nsa collect signals intelligence however hellman – anticipated increasing use electronic communications private sector transactions would require encryption – proceeded give talk defied nsa threat prosecution inman eventually realised hellman point prosecution hellman inman even became friends public key cryptography forms essential component internet security inman chaired commission improving security u.s. foreign installations marine barracks bombing april 1983 us embassy bombing beirut lebanon commission report influential setting security design standards u.s. embassies retirement navy chairman chief executive officer microelectronics computer technology corporation mcc austin texas four years chairman president chief executive officer westmark systems inc. privately owned electronics industry holding company three years admiral inman also served chairman federal reserve bank dallas 1987 1990 admiral inman ’ primary activity since 1990 investing start-up technology companies managing director limestone ventures member board directors several privately held companies serves trustee american assembly california institute technology elected fellow national academy public administration president clinton nominated secretary defense withdrew nomination see inman also board saic since 2001 inman held lbj centennial chair national policy university texas austin lyndon b. johnson school public affairs 2005 2009 school interim dean inman graduated texas bachelor history 1950 inman also served board directors council foreign relations dell computer sbc corporation massey energy 2011 became head board directors xe services formerly erik prince blackwater known academi 2013 sits board directors academi inman announced president bill clinton choice succeed les aspin secretary defense december 16 1993 initially receiving broad bipartisan support accepted post first withdrew nomination press conference january 18 1994 press conference inman made angry remarks comments new york times columnist william safire safire wrote paragraphs inman anti-israel bias shown ended four-point list negative qualifications reply inman suggested safire recruited senator bob dole kansas engage vitriolic attack inman also claimed dole senator trent lott planning turn heat nomination dole reaction state idea gotten bobby inman ... admiral inman letter n't make sense lott appeared even surprised saying floored inman bizarre press conference unnamed white house aide added us glued tube mouths open shock 1994 bobby ray inman requested withdrawn consideration defense secretary critics speculated decision motivated desire conceal links international signal control isc inman member board directors company allegedly either negligent approved illegal exports originally called esi electronic systems international company manufactured sub-assemblies agm-45 shrike rim-7 sea sparrow missiles 1974 vietnam war part standard arms contract us defense administration dcas company also commercial repair facility two meter portable amateur ham radios company new jersey called clegg manufactured communications helmet radios firemen electronic outdoor bug zappers isc involved two major indiscretions ceo james guerin received 15-year prison sentence 1984 1988 isc sent south africa 30 million military-related equipment including telemetry tracking antennae collect data missiles flight gyroscopes guidance systems photo-imaging film readers would form backbone medium-range missile system technology reportedly transferred iraq another link iraq supply specifications mk 20 rockeye ii cluster bomb chilean defense company cardoen industries able build almost identical weapon subsequently used coalition forces persian gulf war january–february 1991 2006 inman criticized bush administration use warrantless domestic wiretaps making one highest-ranking former intelligence officials criticize program public
Computer security
prism surveillance program prism code name program united states national security agency nsa collects internet communications various u.s. internet companies program also known sigad prism collects stored internet communications based demands made internet companies google llc section 702 fisa amendments act 2008 turn data match court-approved search terms nsa use prism requests target communications encrypted traveled across internet backbone focus stored data telecommunication filtering systems discarded earlier get data easier handle among things prism began 2007 wake passage protect america act bush administration program operated supervision u.s. foreign intelligence surveillance court fisa court fisc pursuant foreign intelligence surveillance act fisa existence leaked six years later nsa contractor edward snowden warned extent mass data collection far greater public knew included characterized dangerous criminal activities disclosures published guardian washington post june 6 2013 subsequent documents demonstrated financial arrangement nsa special source operations division sso prism partners millions dollars documents indicate prism number one source raw intelligence used nsa analytic reports accounts 91 nsa internet traffic acquired fisa section 702 authority leaked information came light one day revelation fisa court ordering subsidiary telecommunications company verizon communications turn nsa logs tracking customers telephone calls u.s. government officials disputed aspects guardian washington post stories defended program asserting used domestic targets without warrant helped prevent acts terrorism receives independent oversight federal government executive judicial legislative branches june 19 2013 u.s. president barack obama visit germany stated nsa data gathering practices constitute circumscribed narrow system directed us able protect people prism publicly revealed classified documents program leaked journalists washington post guardian edward snowden time nsa contractor visit hong kong leaked documents included 41 powerpoint slides four published news articles documents identified several technology companies participants prism program including microsoft 2007 yahoo 2008 google 2009 facebook 2009 paltalk 2009 youtube 2010 aol 2011 skype 2011 apple 2012 speaker notes briefing document reviewed washington post indicated 98 percent prism production based yahoo google microsoft slide presentation stated much world electronic communications pass u.s. electronic communications data tend follow least expensive route rather physically direct route bulk world internet infrastructure based united states presentation noted facts provide united states intelligence analysts opportunities intercepting communications foreign targets electronic data pass united states snowden subsequent disclosures included statements government agencies united kingdom gchq also undertook mass interception tracking internet communications data described germany nightmarish true allegations nsa engaged dangerous criminal activity hacking civilian infrastructure networks countries universities hospitals private businesses alleged compliance offered limited restrictive effect mass data collection practices including americans since restrictions policy-based technically based change time adding additionally audits cursory incomplete easily fooled fake justifications numerous self-granted exceptions nsa policies encourage staff assume benefit doubt cases uncertainty number slides released edward snowden showing operation processes behind prism program faa referred section 702 fisa amendments act faa federal aviation administration widely known faa initialism french newspaper le monde disclosed new prism slides see page 4 7 8 coming prism/us-984xn overview presentation october 21 2013 british newspaper guardian disclosed new prism slides see pages 3 6 november 2013 one hand compares prism upstream program hand deals collaboration nsa threat operations center fbi wikimedia commons keeps copies leaked powerpoint slides along associated documents prism program special source operations sso division nsa tradition nsa intelligence alliances cooperates many 100 trusted u.s. companies since 1970s prior program terrorist surveillance program implemented wake september 11 attacks george w. bush administration widely criticized challenged illegal include warrants obtained foreign intelligence surveillance court prism authorized foreign intelligence surveillance court prism enabled president bush protect america act 2007 fisa amendments act 2008 immunizes private companies legal action cooperate u.s. government agencies intelligence collection 2012 act renewed congress president obama additional five years december 2017 according register fisa amendments act 2008 specifically authorizes intelligence agencies monitor phone email communications u.s. citizens week without obtaining warrant one parties outside u.s detailed description prism program found report nsa collection efforts section 702 faa released privacy civil liberties oversight board pclob july 2 2014 according report prism used collect internet communications telephone conversations internet communications collected bulk targeted way communications specific selectors like e-mail addresses gathered prism collection based upon keywords names actual collection process done data intercept technology unit ditu fbi behalf nsa sends selectors u.s. internet service providers previously served section 702 directive directive provider legally obliged hand ditu communications selectors provided government ditu sends communications nsa stored various databases depending type data content metadata already collected prism program may searched us non-us person identifiers kinds queries became known back-door searches conducted nsa fbi cia agencies slightly different protocols safeguards protect searches us person identifier internal nsa presentation slides included various media disclosures show nsa could unilaterally access data perform extensive in-depth surveillance live communications stored information examples including email video voice chat videos photos voice-over-ip chats skype file transfers social networking details snowden summarized general reality nsa fbi cia dia etc analyst access query raw sigint signals intelligence databases enter get results anything want according washington post intelligence analysts search prism data using terms intended identify suspicious communications targets analysts suspect least 51 percent confidence u.s. citizens process communication data u.s. citizens also collected unintentionally training materials analysts tell periodically report accidental collection non-foreign u.s. data nothing worry according guardian nsa access chats emails hotmail.com skype microsoft developed surveillance capability deal interception chats prism collection microsoft email services unaffected prism collects data prior encryption also according guardian glenn greenwald even low-level nsa analysts allowed search listen communications americans people without court approval supervision greenwald said low level analysts via systems like prism listen whatever emails want whatever telephone calls browsing histories microsoft word documents done need go court need even get supervisor approval part analyst added nsa databank years collected communications allows analysts search database listen calls read emails everything nsa stored look browsing histories google search terms 've entered also alerts activity people connected email address ip address future greenwald referring context foregoing quotes nsa program x-keyscore shortly publication reports guardian washington post united states director national intelligence james clapper june 7 2013 released statement confirming nearly six years government united states using large internet services companies facebook collect information foreigners outside united states defense national security threats statement read part guardian washington post articles refer collection communications pursuant section 702 foreign intelligence surveillance act contain numerous inaccuracies went say section 702 provision fisa designed facilitate acquisition foreign intelligence information concerning non-u.s. persons located outside united states used intentionally target u.s. citizen u.s. person anyone located within united states clapper concluded statement stating unauthorized disclosure information important entirely legal program reprehensible risks important protections security americans march 12 2013 clapper told united states senate select committee intelligence nsa wittingly collect type data millions hundreds millions americans clapper later admitted statement made march 12 2013 lie words responded thought truthful least untruthful manner saying june 7 2013 u.s. president barack obama referring prism program nsa telephone calls logging program said 've got two programs originally authorized congress repeatedly authorized congress bipartisan majorities approved congress continually briefed conducted whole range safeguards involved federal judges overseeing entire program throughout also said ca n't 100 percent security also 100 percent privacy zero inconvenience know 're going make choices society separate statements senior obama administration officials mentioned name source said congress briefed 13 times programs since 2009 june 8 2013 director national intelligence clapper made additional public statement prism released fact sheet providing information program described internal government computer system used facilitate government statutorily authorized collection foreign intelligence information electronic communication service providers court supervision authorized section 702 foreign intelligence surveillance act fisa 50 u.s.c § 1881a fact sheet stated surveillance activities published guardian washington post lawful conducted authorities widely known discussed fully debated authorized congress fact sheet also stated united states government unilaterally obtain information servers u.s. electronic communication service providers information obtained fisa court approval knowledge provider based upon written directive attorney general director national intelligence said attorney general provides fisa court rulings semi-annual reports prism activities congress provid ing unprecedented degree accountability transparency democratic senators udall wyden serve u.s. senate select committee intelligence subsequently criticized fact sheet inaccurate nsa director general keith alexander acknowledged errors stating fact sheet could precisely described requirements governing collection e-mail internet content us companies fact sheet withdrawn nsa website around june 26 closed-doors senate hearing around june 11 fbi director robert mueller said snowden leaks caused significant harm nation safety senate nsa director alexander defended program alexander defense immediately criticized senators udall wyden said saw evidence nsa programs produced uniquely valuable intelligence joint statement wrote gen alexander testimony yesterday suggested nsa bulk phone records collection program helped thwart 'dozens terrorist attacks plots mentioned appear identified using collection methods june 18 nsa director alexander said open hearing house intelligence committee congress communications surveillance helped prevent 50 potential terrorist attacks worldwide least 10 involving terrorism suspects targets united states 2001 2013 prism web traffic surveillance program contributed 90 percent cases according court records one example alexander gave regarding thwarted attack al qaeda new york stock exchange fact foiled surveillance several senators wrote director national intelligence clapper asking provide examples u.s. intelligence officials speaking condition anonymity told various news outlets june 24 already seeing said evidence suspected terrorists begun changing communication practices order evade detection surveillance tools disclosed snowden contrast swift forceful reactions previous day allegations government conducting surveillance united states citizens telephone records congressional leaders initially little say prism program day leaked information program published several lawmakers declined discuss prism citing top-secret classification others said aware program statements released president director national intelligence lawmakers began comment senator john mccain r-az senator dianne feinstein d-ca chair senate intelligence committee senator rand paul r-ky senator susan collins r-me member senate intelligence committee past member homeland security committee representative jim sensenbrenner r-wi principal sponsor patriot act representative mike rogers r-mi chairman permanent select committee intelligence senator mark udall d-co representative todd rokita r-in representative luis gutierrez d-il senator ron wyden d-or following statements lawmakers parties warned national security officials hearing house judiciary committee must change use sweeping national security agency surveillance programs face losing provisions foreign intelligence surveillance act allowed agency mass collection telephone metadata section 215 expires end 2015 unless realize 've got problem going renewed rep. jim sensenbrenner r-wis. author usa patriot act threatened hearing got changed 've got change operate section 215 otherwise two half years 're going anymore leaks classified documents pointed role special court enabling government secret surveillance programs members court maintained collaborating executive branch new york times however reported july 2013 dozen classified rulings nation surveillance court created secret body law giving national security agency power amass vast collections data americans pursuing terrorism suspects also people possibly involved nuclear proliferation espionage cyberattacks members u.s. congress pressed foreign intelligence surveillance court release declassified versions secret ruling court dismissed requests arguing decisions ca n't declassified contain classified information reggie walton current fisa presiding judge said statement perception court rubber stamp absolutely false rigorous review process applications submitted executive branch spearheaded initially five judicial branch lawyers national security experts judges ensure court authorizations comport applicable statutes authorize accusation rubber stamp rejected walton wrote letter senator patrick j. leahy annual statistics provided congress attorney general ... —frequently cited press reports suggestion court approval rate application 99 —reflect number final applications submitted acted court statistics reflect fact many applications altered prior final submission even withheld final submission entirely often indication judge would approve u.s. military acknowledged blocking access parts guardian website thousands defense personnel across country blocking entire guardian website personnel stationed throughout afghanistan middle east south asia spokesman said military filtering reports content relating government surveillance programs preserve network hygiene prevent classified material appearing unclassified parts computer systems access washington post also published information classified nsa surveillance programs disclosed edward snowden blocked time blocking access guardian reported former head austrian federal office protection constitution counterterrorism gert-rené polli stated knew prism program different name stated surveillance activities occurred austria well polli publicly stated 2009 received requests us intelligence agencies things would violation austrian law polli refused allow australian government said investigate impact prism program use pine gap surveillance facility privacy australian citizens australia former foreign minister bob carr said australians n't concerned prism cybersecurity high government list concerns australian foreign minister julie bishop stated acts edward snowden treachery offered staunch defence nation intelligence co-operation united states brazil president time dilma rousseff responded snowden reports nsa spied phone calls emails cancelling planned october 2013 state visit united states demanding official apology october 20 2013 n't come also rousseff classified spying unacceptable harsh words speech un general assembly september 24 2013 result boeing lost us 4.5 billion contract fighter jets sweden saab group canada national cryptologic agency communications security establishment cse said commenting prism would undermine cse ability carry mandate privacy commissioner jennifer stoddart lamented canada standards comes protecting personal online privacy stating fallen far behind report nations data protection authorities legal power make binding orders levy hefty fines take meaningful action event serious data breaches restricted 'soft approach persuasion encouragement potential publish names transgressors public interest push comes shove stoddart wrote short costly time-consuming court battle power enforce recommendations 20 october 2013 committee european parliament backed measure enacted would require american companies seek clearance european officials complying united states warrants seeking private data legislation consideration two years vote part efforts europe shield citizens online surveillance wake revelations far-reaching spying program u.s. national security agency germany france also ongoing mutual talks keep european email traffic going across american servers october 21 2013 french foreign minister laurent fabius summoned u.s ambassador charles rivkin quai d'orsay paris protest large-scale spying french citizens u.s. national security agency nsa paris prosecutors opened preliminary inquiries nsa program july fabius said ... obviously need go must quickly assure practices n't repeated germany receive raw prism data according reuters report german chancellor angela merkel said internet new us explain nature program matthew schofield mcclatchy washington bureau said roundly mocked statement gert-rené polli former austrian counter-terrorism official said 2013 absurd unnatural german authorities pretend known anything german army using prism support operations afghanistan early 2011 october 2013 reported nsa monitored merkel cell phone united states denied report following allegations merkel called president obama told spying friends never acceptable matter situation israeli newspaper calcalist discussed business insider article possible involvement technologies two secretive israeli companies prism program—verint systems narus finding prism program mexican government started constructing spying program spy citizens according jenaro villamil writer proceso cisen mexico intelligence agency started work ibm hewlett packard develop data gathering software facebook twitter emails social network sites going priority new zealand university otago information science associate professor hank wolfe said unofficially known five eyes alliance new zealand governments including united states australia canada britain dealt internal spying saying n't partners share information edward snowden live streamed google hangout kim dotcom julian assange alleged received intelligence new zealand nsa listening posts new zealand meeting european union leaders held week 21 october 2013 mariano rajoy spain prime minister said spying activities n't proper among partner countries allies 28 october 2013 spanish government summoned american ambassador james costos address allegations u.s. collected data 60 million telephone calls spain separately íñigo méndez de vigo spanish secretary state referred need maintain necessary balance security privacy concerns said recent allegations spying proven true improper unacceptable partners friendly countries united kingdom government communications headquarters gchq also surveillance program tempora access prism program june 2010 wrote 197 reports 2012 alone intelligence security committee uk parliament reviewed reports gchq produced basis intelligence sought us found case warrant interception place accordance legal safeguards contained uk law august 2013 guardian newspaper offices visited agents gchq ordered supervised destruction hard drives containing information acquired snowden original washington post guardian articles reporting prism noted one leaked briefing documents said prism involves collection data directly servers several major internet services providers corporate executives several companies identified leaked documents told guardian knowledge prism program particular also denied making information available government scale alleged news reports statements several companies named leaked documents reported techcrunch washington post follows response technology companies confirmation nsa able directly access companies servers new york times reported sources stated nsa gathering surveillance data companies using technical means response court orders specific sets data washington post suggested possible conflict prism slides company spokesmen result imprecision part nsa author another classified report obtained post arrangement described allowing 'collection managers send content tasking instructions directly equipment installed company-controlled locations rather directly company servers n context 'direct likely mean nsa receiving data sent deliberately tech companies opposed intercepting communications 're transmitted destination companies received order fisa amendments act forbidden law disclosing received order disclosing information order mark rumold staff attorney electronic frontier foundation told abc news may 28 2013 google ordered united states district court judge susan illston comply national security letter issued fbi provide user data without warrant kurt opsahl senior staff attorney electronic frontier foundation interview venturebeat said certainly appreciate google put transparency report appears transparency n't include would n't surprised subject gag order new york times reported june 7 2013 twitter declined make easier government companies compliant according people briefed negotiations companies held discussions national security personnel make data available efficiently securely cases companies made modifications systems support intelligence collection effort dialogues continued recent months general martin dempsey chairman joint chiefs staff met executives including facebook microsoft google intel details discussions provide insight disparity initial descriptions government program including training slide states collection directly servers companies denials providing data response legitimate fisa request approved fisa court legal requirement modifying systems make easier government collect data twitter could legally decline provide enhanced mechanism data transmission twitter companies effectively asked construct locked mailbox provide key government people briefed negotiations said facebook instance built system requesting sharing information google provide lockbox system instead transmits required data hand delivery ssh response publicity surrounding media reports data-sharing several companies requested permission reveal public information nature scope information provided response national security requests june 14 2013 facebook reported u.s. government authorized communication numbers aggregate range press release posted web site company reported six months ending december 31 2012 total number user-data requests facebook received government entities u.s. including local state federal including criminal national security-related requests – 9,000 10,000 company reported requests impacted 18,000 19,000 user accounts tiny fraction one percent 1.1 billion active user accounts day microsoft reported period received 6,000 7,000 criminal national security warrants subpoenas orders affecting 31,000 32,000 consumer accounts u.s. governmental entities including local state federal impacted tiny fraction microsoft global customer base google issued statement criticizing requirement data reported aggregated form stating lumping national security requests criminal request data would step backwards previous detailed practices website transparency report company said would continue seek government permission publish number extent fisa requests cisco systems saw huge drop export sales fears national security agency could using backdoors products september 12 2014 yahoo reported u.s. government threatened imposition 250,000 fines per day yahoo n't hand user data part nsa prism program known companies threatened fined providing data response legitimate fisa requests new york times editorial board charged obama administration lost credibility issue lamented years members congress ignored evidence domestic intelligence-gathering grown beyond control even seem disturbed learn every detail public calling texting habits reside n.s.a database wrote respect fisa-court context prism perversion american justice system judicial secrecy coupled one-sided presentation issues according new york times result court whose reach expanding far beyond original mandate without substantive check james robertson former federal district judge based washington served secret foreign intelligence surveillance act court three years 2002 2005 ruled bush administration landmark hamdan v. rumsfeld case said fisa court independent flawed government side represented effectively deliberations anyone judge tell judge needs hear sides case said james robertson without judges benefit adversarial debate suggested creating advocate security clearance would argue government filings robertson questioned whether secret fisa court provide overall legal approval surveillance programs saying court turned something like administrative agency changes brought foreign intelligence surveillance act 1978 amendments act 2008 expanded us government authority forcing court approve entire surveillance systems surveillance warrants previously handled court approving programmatic surveillance n't think judicial function robertson also said frankly stunned new york times report fisa court rulings created new body law broadening ability nsa use surveillance programs target terrorists suspects cases involving espionage cyberattacks weapons mass destruction former cia analyst valerie plame wilson former u.s. diplomat joseph wilson writing op-ed article published guardian said prism nsa data-mining programs might indeed effective hunting capturing actual terrorists n't enough information society make decision electronic frontier foundation eff international non-profit digital-rights group based u.s. hosting tool american resident write government representatives regarding opposition mass spying obama administration argument nsa surveillance programs prism boundless informant necessary prevent acts terrorism challenged several parties ed pilkington nicholas watt guardian said case najibullah zazi planned bomb new york city subway interviews involved parties u.s. british court documents indicated investigation case actually initiated response conventional surveillance methods old-fashioned tip-offs british intelligence services rather leads produced nsa surveillance michael daly daily beast stated even though tamerlan tsarnaev conducted boston marathon bombing brother dzhokhar tsarnaev visited al qaeda-affiliated inspire magazine website even though russian intelligence officials raised concerns u.s. intelligence officials tamerlan tsarnaev prism prevent carrying boston attacks daly observed problem national security agency gathering risk privacy apparently unable monitor risk safety ron paul former republican member congress prominent libertarian thanked snowden greenwald denounced mass surveillance unhelpful damaging urging instead transparency u.s. government actions called congress derelict giving much power government said elected president would ordered searches probable cause crime committed said prism program operated new york times columnist thomas l. friedman defended limited government surveillance programs intended protect american people terrorist acts yes worry potential government abuse privacy program designed prevent another 9/11—abuse far appear happened worry even another 9/11 ... another 9/11 fear 99 percent americans would tell members congress whatever need privacy damned make sure happen fear 'll reluctantly reluctantly trade government using data mining look suspicious patterns phone numbers called e-mail addresses—and go judge get warrant actually look content guidelines set congress—to prevent day fear give government license look anyone e-mail phone call anywhere anytime political commentator david brooks similarly cautioned government data surveillance programs necessary evil n't mass data sweeps well agencies going want go back old-fashioned eavesdropping lot intrusive conservative commentator charles krauthammer worried less legality prism nsa surveillance tools potential abuse without stringent oversight problem constitutionality ... need toughening congressional oversight judicial review perhaps even independent outside scrutiny plus periodic legislative revision—say reauthorization every couple years—in light efficacy safeguards nature external threat object abolish vital programs fix blog post david simon creator wire compared nsa programs including prism 1980s effort city baltimore add dialed number recorders pay phones know individuals called callers city believed drug traffickers using pay phones pagers municipal judge allowed city place recorders placement dialers formed basis show first season simon argued media attention regarding nsa programs faux scandal simon stated many classes people american society already faced constant government surveillance political activist frequent critic u.s. government policies noam chomsky argued governments capacity governments use whatever technology available combat primary enemy – population cnn/opinion research corporation poll conducted june 11 13 found 66 americans generally supported program however quinnipiac university poll conducted june 28 july 8 found 45 registered voters think surveillance programs gone far 40 saying go far enough compared 25 saying gone far 63 saying far enough 2010 polls shown similar shifts public opinion revelations programs leaked terms economic impact study released august information technology innovation foundation found disclosure prism could cost u.s. economy 21.5 35 billion lost cloud computing business three years sentiment around world general displeasure upon learning extent world communication data mining national leaders spoke nsa spoke national surveillance one national minister scathing comments national security agency data-mining program citing benjamin franklin society monitors controls observes citizens less free question costs hunting terrorists overshadows loss citizen privacy nick xenophon australian independent senator asked bob carr australian minister foreign affairs e-mail addresses australian parliamentarians exempt prism mainway marina and/or nucleon carr replied legal framework protect australians government would comment intelligence matters xenophon argued specific answer question taliban spokesperson zabiullah mujahid said knew past efforts trace system used technical resources foil efforts able stop succeeding far however cnn reported terrorist groups changed communications behaviors response leaks 2013 cloud security alliance surveyed cloud computing stakeholders reactions us prism spying scandal 10 non-us residents indicated cancelled project us-based cloud computing provider wake prism 56 said would less likely use us-based cloud computing service alliance predicted us cloud computing providers might lose much €26 billion 20 share cloud services foreign markets prism spying scandal reactions internet users china mixed viewing loss freedom worldwide seeing state surveillance coming secrecy story broke u.s. president barack obama chinese president xi jinping met california asked nsa hacking china spokeswoman ministry foreign affairs people republic china said china strongly advocates cybersecurity party-owned newspaper liberation daily described surveillance like nineteen eighty-four -style hong kong legislators gary fan claudia mo wrote letter obama stating revelations blanket surveillance global communications world leading democracy damaged image u.s. among freedom-loving peoples around world ai weiwei chinese dissident said even though know governments kinds things shocked information us surveillance operation prism abusively using government powers interfere individuals privacy important moment international society reconsider protect individual rights sophie 't veld dutch member european parliament called prism violation eu laws german federal commissioner data protection freedom information peter schaar condemned program monstrous added white house claims reassure given large number german users google facebook apple microsoft services expect german government ... committed clarification limitation surveillance steffen seibert press secretary chancellor office announced angela merkel put issues agenda talks barack obama pending visit berlin wolfgang schmidt former lieutenant colonel stasi said stasi would seen program dream come true since stasi lacked technology made prism possible schmidt expressed opposition saying height naivete think collected information wo n't used nature secret government organizations way protect people privacy allow government collect information first place many germans organized protests including one checkpoint charlie obama went berlin speak matthew schofield mcclatchy washington bureau said germans dismayed obama role allowing collection much information italian president guarantor protection personal data antonello soro said surveillance dragnet would legal italy would contrary principles legislation would represent serious violation cnil french data protection watchdog intimates google change privacy policies within three months 'll risk fines 150,000 euros spanish agency data protection aepd planning fine google 40k 300k euros fails clear past usage massive data spanish users william hague foreign secretary united kingdom dismissed accusations british security agencies circumventing british law using information gathered british citizens prism saying data obtained us united states involving uk nationals subject proper uk statutory controls safeguards david cameron said britain spy agencies received data collected prism acted within law 'm satisfied intelligence agencies fantastically important job country keep us safe operate within law malcolm rifkind chairman parliament intelligence security committee said british intelligence agencies seeking know content emails people living uk actually get lawful authority uk information commissioner office cautious saying would investigate prism alongside european data agencies real issues extent u.s. law agencies access personal data uk european citizens aspects u.s. law companies compelled provide information u.s. agencies potentially conflict european data protection law including uk data protection act ico raised european counterparts issue considered european commission discussions u.s government tim berners-lee inventor world wide web accused western governments practicing hypocrisy conducted spying internet criticized countries spying internet berners-lee stated internet spying make people feel reluctant access intimate details use internet certain way paraphrased steve robson daily mail said internet protected controlled governments large corporations minister external affairs salman khurshid defended prism program saying scrutiny access actual messages computer analysis patterns calls emails sent actually snooping specifically content anybody message conversation information got scrutiny able use prevent serious terrorist attacks several countries comments contradicted foreign ministry characterization violations privacy unacceptable minister communications information technology kapil sibal asked khurshid comments refused comment directly said know nature data information sought part prism even external ministry idea media felt khurshid defence prism india government rolling central monitoring system cms similar prism program khurshid comments criticized indian media well opposition party cpi stated upa government strongly protested surveillance bugging instead shocking khurshid sought justify shameful remark come time even close allies us like germany france protested snooping countries rajya sabha mp p. rajeev told times india act usa clear violation vienna convention diplomatic relations khurshid trying justify speed government india reject asylum application edward snowden shameful june 8 2013 director national intelligence issued fact sheet stating prism undisclosed collection data mining program rather internal government computer system used facilitate collection foreign intelligence information court supervision authorized section 702 foreign intelligence surveillance act fisa 50 u.s.c § 1881a section 702 provides attorney general director national intelligence may authorize jointly period 1 year effective date authorization targeting persons reasonably believed located outside united states acquire foreign intelligence information order authorize targeting attorney general director national intelligence need obtain order foreign intelligence surveillance court fisa court pursuant section 702 certify intelligence important national security united states may lost timely acquired time permit issuance order requesting order attorney general director national intelligence must certify fisa court significant purpose acquisition obtain foreign intelligence information need specify facilities property targeted receiving fisa court order determining emergency circumstances attorney general director national intelligence direct electronic communication service provider give access information facilities carry targeting keep targeting secret provider option 1 comply directive 2 reject 3 challenge fisa court provider complies directive released liability users providing information reimbursed cost providing provider rejects directive attorney general may request order fisa court enforce provider fails comply fisa court order punished contempt court finally provider petition fisa court reject directive case fisa court denies petition orders provider comply directive provider risks contempt court refuses comply fisa court order provider appeal fisa court denial foreign intelligence surveillance court review appeal court review decision supreme court writ certiorari review seal senate select committee intelligence fisa courts put place oversee intelligence operations period death j. edgar hoover beverly gage slate said created new mechanisms supposed stop kinds abuses men like hoover engineered instead looks come function rubber stamps expansive ambitions intelligence community j. edgar hoover longer rules washington turns n't need anyway laura donohue law professor georgetown university law center center national security law called prism nsa mass surveillance programs unconstitutional woodrow hartzog affiliate stanford law school center internet society commented aclu likely demonstrate legitimate first amendment harms chilling effects fourth amendment harms perhaps violation reasonable expectation privacy ... harm merely know certainty monitored government certainly argument people surveillance act differently experience loss autonomy less likely engage self exploration reflection less willing engage core expressive political activities dissenting speech government criticism interests first fourth amendment seek protect fisa amendments act faa section 702 referenced prism documents detailing electronic interception capture analysis metadata many reports letters concern written members congress suggest section faa particular legally constitutionally problematic targeting u.s. persons insofar collections occur u.s. published documents indicate aclu asserted following regarding faa regardless abuses problem faa fundamental statute unconstitutional senator rand paul introducing new legislation called fourth amendment restoration act 2013 stop nsa agencies united states government violating fourth amendment u.s. constitution using technology big data information systems like prism boundless informant besides information collection program started 2007 two programs sharing name prism parallel programs known collectively sigads gather data metadata sources sigad set defined sources targets types data collected legal authorities software associated sigads name umbrella sit blarney sigad summary set slides alongside cartoon insignia shamrock leprechaun hat describes ongoing collection program leverages ic intelligence community commercial partnerships gain access exploit foreign intelligence obtained global networks sigads like prism collect data isp level others take top-level infrastructure type collection known upstream upstream collection includes programs known blanket terms blarney fairview oakstar stormbrew individual sigads data integrated sigad gathered ways besides upstream service providers instance collected passive sensors around embassies even stolen individual computer network hacking attack sigads involve upstream collection instance data could taken directly service provider either agreement case prism means hacking ways according washington post much less known muscular program directly taps unencrypted data inside google yahoo private clouds collects twice many data points compared prism google yahoo clouds span globe tap done outside united states unlike prism muscular program requires fisa type warrants
Computer security
pcap field computer network administration pcap application programming interface api capturing network traffic name abbreviation technical term art jargon packet capture api proper name unix-like systems implement pcap libpcap library windows port libpcap named winpcap longer supported developed port named npcap windows 7 later still supported monitoring software may use libpcap winpcap npcap capture network packets travelling computer network newer versions transmit packets network link layer get list network interfaces possible use libpcap winpcap npcap pcap api written c languages java .net languages scripting languages generally use wrapper wrappers provided libpcap winpcap c++ programs may link directly c api use object-oriented wrapper libpcap winpcap npcap provide packet-capture filtering engines many open-source commercial network tools including protocol analyzers packet sniffers network monitors network intrusion detection systems traffic-generators network-testers libpcap winpcap npcap also support saving captured packets file reading files containing saved packets applications written using libpcap winpcap npcap able capture network traffic analyze read saved capture analyze using analysis code capture file saved format libpcap winpcap npcap use read applications understand format tcpdump wireshark ca netmaster microsoft network monitor 3.x mime type file format created read libpcap winpcap npcap application/vnd.tcpdump.pcap typical file extension .pcap although .cap .dmp also common use libpcap originally developed tcpdump developers network research group lawrence berkeley laboratory low-level packet capture capture file reading capture file writing code tcpdump extracted made library tcpdump linked developed tcpdump.org group develops tcpdump libpcap originally developed unix-like operating systems successful port windows made called winpcap unmaintained since 2013 several competing forks released new features support newer versions windows winpcap consists programmers politecnico di torino wrote original code 2008 cace technologies company set winpcap developers developed maintained product cace acquired riverbed technology october 21 2010 winpcap uses older ndis 5.x apis work builds windows 10 deprecated removed apis favor newer ndis 6.x apis also forces limitations unable capture 802.1q vlan tags ethernet headers npcap nmap project packet sniffing library windows based winpcap libpcap libraries improved speed portability security efficiency npcap offers win10pcap implementation also based ndis 6 driver model works stably windows 10
Computer security
tokumx tokumx open-source distribution mongodb among things replaces default b-tree data structure found basic mongodb distribution fractal tree index drop-in replacement mongodb applications run offers scalability performance improvements associated fractal tree indexing also adds support document-level locking transaction support acid mvcc replication optimization support full-text search tokumx specifically designed high performance write-intensive workloads achieves using fractal tree index replaces 40-year-old b-tree indexing based cache-oblivious algorithms approach building memory-efficient systems originally jointly developed researchers massachusetts institute technology rutgers university state university new york stony brook suny tokumx scalable acid mvcc compliant distribution mongodb provides indexing-based query improvements offers online schema modifications reduces slave lag hard disk drives flash memory also adds transactions mvcc acid reliability mongodb application making mongodb suitable much wider range solutions tokumx source files made available terms gnu affero general public license agpl tokukv fractal tree indexing library made available terms gnu general public license gpl version 2 additional grant patent license relational databases use indexes increase query performance databases leverage indexes significantly reduce amount data examine responding queries indexes commonly implemented b-trees data structure first described 1970 b-tree data structure allows operations like inserting data sorted order iteration primary operation used index depending workload implementation b-tree performance limited random i/o characteristics disks addition freshly loaded databases tend good sequential behavior behavior becomes increasingly difficult maintain database grows resulting random i/o performance challenges advent big data ever-increasing database needs 21st century many niche databases created get around limitations 50-year-old b-tree indexing include optimized reads optimized writes series special-purpose databases designed narrow problem set fractal tree indexing technology new approach indexing replaces b-trees fractal tree indexes implement operations b-tree thus drop-in replacement b-trees fractal tree indexes effectively replaces small frequent writes larger less frequent ones enables better compression insertion performance fractal trees also allow messages injected tree fashion schema changes adding dropping column adding index done online background result indexes maintained without drop performance adding data indexes tends stress performance b-trees performs well fractal tree indexes fractal tree index modifications cause database files fragment periodic maintenance compactify files needed fractal tree indexes applied number applications characterized near-real time analysis streaming data used storage layer database storage layer file system used database used setting b-tree used improved performance examples include network event management online advertising networks web 2.0 clickstream analytics air traffic control management uses include accelerated crawler performance search engines social media sites also used create indexes columns online enabling query flexibility ecommerce personalization also suited improving performance reducing existing loads transactional websites general performs well applications must simultaneously store log file data execute ad hoc queries
Databases
high orbit ion cannon high orbit ion cannon hoic open-source network stress testing denial-of-service attack application designed attack many 256 urls time designed replace low orbit ion cannon developed praetox technologies later released public domain security advisory hoic released prolexic technologies february 2012 hoic developed conclusion operation payback hacktivist collective anonymous operation payback concluded massive pressure group law enforcement agencies captured prosecuted 13 individuals connected group forced many members group rethink strategies subsequently part group launched operation leakspin however large part anonymous remained focused launching opt-in ddos attacks however low orbit ion cannon powerful enough launch attacks limited number users therefore hoic designed remedy ability cause http flood low number user agents 50 users required successfully launch attack co-ordination multiple users leading exponential increase damage hoic first tool kind support so-called booster files configurable vbscript modules randomize http headers attacking computers allowing thousands upon thousands highly randomized combinations user agents apart allowing user agents implement form randomization countermeasures booster files used increase magnitude attack hoic predecessor loic named ion cannon fictional directed-energy weapon described firing beams ions space-based platform onto earth-based targets although ion cannons appear many movies television shows video games science fiction-based setting ones depicted command conquer series video games considered inspiration graphics software gui website simply described hoic program sending http post get requests computer attack uses lulz-inspired graphical interface hoic primarily performs denial-of-service dos attack ddos attack co-ordinated multiple individuals denial-of-service dos attack target url accomplished sending excessive traffic attempt overload site bring basic version attack customized using booster files follow vb 6 mixed vb .net syntax addition hoic simultaneously attack 256 domains making one versatile tools hackers attempting co-ordinate ddos attacks group minimalist gui tool makes user friendly easy control basic routine attack input url website attacked set power option low medium high power option sets request velocity low two requests per second medium four high eight requests per second booster file added uses .hoic extension define dynamic request attributes launch attacks multiple pages within website help evade defense filters attack launched pressing red button gui labelled fire teh lazer basic limitation hoic requires coordinated group users ensure attacks successful even though allowed attacks launched far fewer users older low orbit ion cannon hoic still requires minimum 50 users launch effective attack required sustain target website protection another limiting factor lack anonymizing randomizing capability even though hoic theory offer anonymizing use booster files actual protection provided enough furthermore anonymizing networks tor capable handling bandwidth attacks generated hoic attempt launch attack using tor network actually harm network however anonymous members routinely use proxy servers based sweden launch attacks speculated due notion sweden may stricter internet privacy laws rest world primarily hoic designed stress testing tool lawfully used stress test local networks servers provided person initiating test authorization test long networks servers clients networking equipment urls disrupted hoic also used perform distributed denial-of-service attacks illegal various statutes police justice act 2006 united kingdom amended computer misuse act 1990 specifically outlawed denial-of-service attacks set maximum penalty 10 years prison united states denial-of-service attacks may considered federal crime computer fraud abuse act penalties include ten years imprisonment 2013 criminal charges brought 13 members anonymous participating ddos attack various websites organizations including recording industry association america motion picture association america united states copyright office library congress visa mastercard bank america charged one count conspiracy intentionally cause damage protected computer events occurred september 16 2010 january 2 2011 ddos attacks federal offenses united states prosecuted department justice usc title 18 section 1030 2013 anonymous petitioned united states government via people demanding ddos attacks recognized form virtual protest similar occupy protests ddos mitigation usually works principle distribution basically intelligent routing traffic avoid congestion prevent overload single url methods counter ddos include installation intrusion prevention system ips intrusion detection system ids anonymous first group utilize high orbit ion cannon publicly megaupload file-sharing website shut federal agents raided premises anonymous launched attack website us department justice doj website went offline anonymous claimed success via twitter saying one thing certain expect us megaupload course next hours several websites knocked offline kept offline included websites belonging recording industry association america riaa motion picture association america mpaa bmi finally day drew close website belonging fbi hit repeatedly ultimately succumbed attacks acquired “ tango ” status anonymous claimed single largest internet attack history reported many 27,000 user agents taking part attack
Computer security
tableau software tableau software american interactive data visualization software company founded january 2003 christian chabot pat hanrahan chris stolte mountain view california company currently headquartered seattle washington united states focused business intelligence august 1 2019 salesforce.com acquired tableau chabot hanrahan stolte researchers department computer science stanford university specialized visualization techniques exploring analyzing relational databases data cubes company started commercial outlet research produced stanford 1999-2002 tableau products query relational databases online analytical processing cubes cloud databases spreadsheets generate graph-type data visualizations products also extract store retrieve data in-memory data engine tableau products include tableau mapping functionality able plot latitude longitude coordinates connect spatial files like esri shapefiles kml geojson display custom geography built-in geo-coding allows administrative places country state/province county/district postal codes us congressional districts us cbsa/msa area codes airports european union statistical areas nuts codes mapped automatically group geographies create custom territories use custom geocoding extend existing geographic roles product tableau founded 2003 pat hanrahan christian chabot chris stolte moved headquarters fremont neighborhood seattle washington following year company since expanded fremont headquarters announced plans 2016 auxiliary campus suburban kirkland washington new headquarters building opened near gas works park wallingford march 2017 followed new building fremont opened 2018 august 2016 tableau announced appointment adam selipsky president ceo effective september 16 2016 replacing co-founder christian chabot ceo june 2018 tableau acquired empirical systems cambridge massachusetts based artificial intelligence startup plans integrate company technology tableau platform tableau also announced plans establish office cambridge result deal june 10 2019 tableau acquired salesforce stock deal worth 15 billion may 17 2013 tableau launched initial public offering new york stock exchange raising 250 million prior ipo tableau raised 45 million venture capital investment investors nea meritech company 2013 revenue reached 232.44 million 82 growth 2012 128 million 2010 tableau reported revenue 34.2 million figure grew 62.4 million 2011 127.7 million 2012 profit periods came 2.7 million 3.4 million 1.6 million respectively june 10 2019 salesforce.com announced would acquiring tableau 15.7 billion dollar deal december 2 2010 tableau deleted wikileaks visualizations united states diplomatic cables leak stating due directly political pressure us senator joe lieberman february 21 2011 tableau posted updated data policy accompanying blog post cited two main changes 1 creating formal complaint process 2 using freedom speech guiding principle addition post announced creation advisory board help company navigate future situations push boundaries policy tableau likened new policy model set forth digital millennium copyright act opined new policy wikileaks visuals would removed underlying data statistics cables cables 2008 tableau named codie award winner best business intelligence solution software information industry association company recognized leader gartner magic quadrant seven consecutive years 2012 2019
Distributed computing architecture
external variable c programming language external variable variable defined outside function block hand local automatic variable variable defined inside function block understand external variables relate codice_1 keyword necessary know difference defining declaring variable variable defined compiler allocates memory variable possibly also initializes contents value variable declared compiler requires variable defined elsewhere declaration informs compiler variable name type exists compiler need allocate memory since allocated elsewhere codice_1 keyword means declare without defining words way explicitly declare variable force declaration without definition also possible explicitly define variable i.e force definition done assigning initialization value variable neither codice_1 keyword initialization value present statement either declaration definition compiler analyse modules program decide variable must defined exactly one modules program definition one error produced possibly linking stage variable may declared many times long declarations consistent definition something header files facilitate greatly may declared many modules including module defined even many times module usually pointless declare module external variable may also declared inside function case codice_1 keyword must used otherwise compiler consider definition local automatic variable different scope lifetime initial value declaration visible inside function instead throughout function module codice_1 keyword applied function prototype absolutely nothing codice_1 keyword applied function definition course non-sensical function prototype always declaration never definition also standard c function always external compiler extensions allow function defined inside function external variable accessed functions modules program global variable function able use variable declaration definition external variable must lie function definition source code must declaration variable keyword codice_1 inside function codice_8 keyword codice_8 codice_1 mutually exclusive applied definition external variable changes bit variable accessed functions module defined possible function module pass reference pointer variable another function another module case even though function another module read modify contents variable—it refer name also possible use codice_8 keyword definition local variable without codice_8 keyword variable automatically allocated function called released function exits thus name automatic variable value retained function calls codice_8 keyword variable allocated program starts released program ends value lost function calls variable still local since accessed name inside function defined reference pointer passed another function allowing read modify contents variable without referring name external variables allocated initialized program starts memory released program ends lifetime program initialization done explicitly external static local static variables initialized zero local automatic variables uninitialized i.e contain trash values codice_8 keyword applied function definition changes linkage function visible translation unit definition located prevents function called name outside module remains possible pass function pointer module use invoke function declaring function using codice_8 keyword also good way keep name short avoiding name clashes file 1 file 2 example variable global_variable defined file 1 order utilize variable file 2 must declared regardless number files global variable defined however must declared file outside one containing definition normal methodology allocation actual definitions go .c files mere declarations prototypes allocate describe types parameters compiler work correctly information belongs .h header file others safely include without possible conflict
Programming language topics
e-commerce identification identification types whole new range techniques developed identify people since 1960s measurement analysis parts bodies dna profiles forms identification used ensure citizens eligible rights benefits vote without fear impersonation private individuals used seals signatures centuries lay claim real personal estate. “ generally amount proof identity required gain access something proportionate value sought estimated 4 online transactions use methods simple passwords security systems resources generally follows three-step process ” identification authentication authorization today high level trust critical ecommerce transactions traditional face-to-face transactions scheme established maintained whereby users properly consistently effectively efficiently identified systems accessed identity verification service often employed ensure users customers provide information associated identity real person authentication verification identity entity requesting access system process determining whether someone something fact declared private public computer networks including internet authentication commonly done use logon passwords knowledge password assumed guarantee user authentic user registers initially registered someone else using assigned self-declared password subsequent use user must know use previously declared password weakness system transactions significant exchange money passwords often stolen accidentally revealed forgotten reason internet business many transactions require stringent authentication process use digital certificates issued verified certificate authority ca part public key infrastructure considered likely become standard way perform authentication internet logically authentication precedes authorization although may often seem combined authorization process giving someone permission something multi-user computer systems system administrator defines system users allowed access system privileges use access file directories hours access amount allocated storage space forth assuming someone logged computer operating system application system application may want identify resources user given session thus authorization sometimes seen preliminary setting permissions system administrator actual checking permission values set user getting access logically authorization preceded authentication
Computer security
marabunta software marabunta fully distributed software application anonymous p2p main goal fight internet censorship assuring freedom speech peer-to-peer platform information exchange among nodes anonymous way based several communication algorithms called order chaos found massive social organizations ant colonies project founded university zaragoza spain developed promoted students computing engineering although development teams users many different places shown interest perhaps attracted ideological aims project software available spanish english website also available english marabunta uses qt graphical widget toolkit allowing used linux microsoft windows released gnu general public license marabunta free software marabunta implementation ideas explained free nets project developed ideas mind many potential services run top marabunta text message interchange first service could taken platform telegram distribution computer net works host server four message distribution lists receivers receive messages sent list interested general technology philosophy politics content filters allowed messages certain patterns displayed specially useful searching specific information marabunta selects potentially interesting messages generated traffic uses udp/ip protocols avoiding setting connections nodes lets traffic flow network operational redundancy every node used moreover udp protocol could seen increasing anonymity net need validate source hosts receive datagram marabunta support udp hole punching users behind nats establish port forwarding route let router know port node internal net forward arriving datagrams
Distributed computing architecture
linus torvalds linus benedict torvalds born december 28 1969 finnish-american software engineer creator historically principal developer linux kernel kernel linux operating systems distributions operating systems android chrome os also created distributed version control system git scuba dive logging planning software subsurface honored along shinya yamanaka 2012 millennium technology prize technology academy finland recognition creation new open source operating system computers leading widely used linux kernel also recipient 2014 ieee computer society computer pioneer award 2018 ieee masaru ibuka consumer electronics award torvalds born helsinki finland 1969 son journalists anna nils torvalds grandson statistician leo törnqvist poet ole torvalds parents campus radicals university helsinki 1960s family belongs swedish-speaking minority torvalds named linus pauling nobel prize-winning american chemist although book rebel code linux open source revolution torvalds quoted saying think named equally linus peanuts cartoon character noting makes half nobel prize-winning chemist half blanket-carrying cartoon character torvalds attended university helsinki 1988 1996 graduating master degree computer science nodes research group academic career interrupted first year study joined finnish army uusimaa brigade summer 1989 selecting 11-month officer training program fulfill mandatory military service finland army held rank second lieutenant role ballistic calculation officer torvalds bought computer science professor andrew tanenbaum book tanenbaum describes minix educational stripped-down version unix 1990 resumed university studies exposed unix first time form dec microvax running ultrix m.sc thesis titled linux portable operating system interest computers began commodore vic-20 age 11 1981 initially programming basic later directly accessing 6502 cpu machine code make use assembly language vic-20 purchased sinclair ql modified extensively especially operating system hard get software finland linus wrote assembler editor addition pac-man graphics libraries ql well games wrote pac-man clone named cool man january 5 1991 purchased intel 80386-based clone ibm pc receiving minix copy turn enabled begin work linux first prototypes linux publicly released later year 1991 version 1.0 released march 14 1994 torvalds first encountered gnu project 1991 another swedish-speaking computer science student lars wirzenius took university technology listen free software guru richard stallman speech torvalds used stallman gnu general public license version 2 gplv2 linux kernel visit transmeta late 1996 torvalds accepted position company california would work february 1997 june 2003 moved open source development labs since merged free standards group become linux foundation whose auspices continues work june 2004 torvalds family moved dunthorpe oregon closer osdl beaverton oregon-based headquarters 1997 1999 involved 86open helping choose standard binary format linux unix 1999 named mit technology review tr100 one world top 100 innovators age 35 1999 red hat va linux leading developers linux-based software presented torvalds stock options gratitude creation year companies went public torvalds share value temporarily shot roughly us 20 million personal mascot penguin nicknamed tux widely adopted linux community mascot linux kernel although torvalds believes open source right way software also said uses best tool job even includes proprietary software criticized use alleged advocacy proprietary bitkeeper software version control linux kernel torvalds subsequently wrote free-software replacement bitkeeper called git 2008 torvalds stated used fedora distribution linux fairly good support powerpc processor architecture favored time usage fedora confirmed later 2012 interview also posted updates choice desktop environment often response perceived feature regressions currently linux foundation sponsors torvalds work full-time improving linux linus torvalds known disagreeing developers linux kernel mailing list calling really unpleasant person later explained 'd like nice person curse less encourage people grow rather telling idiots 'm sorry – tried attitude torvalds considers necessary making point clear drawn criticism intel programmer sage sharp systemd developer lennart poettering among others sunday september 16 2018 linux kernel code conflict suddenly replaced new code conduct based contributor covenant shortly thereafter release notes linux 4.19-rc4 linus apologized behavior calling personal attacks past unprofessional uncalled announced period time get assistance understand people ’ emotions respond appropriately soon transpired events followed new yorker approaching linus series questions critical conduct following release linux 4.19 october 22 linus went back maintaining kernel initially torvalds wanted call kernel developed freax combination free freak letter x indicate unix-like system friend ari lemmke administered ftp server kernel first hosted download named torvalds directory linux 2006 approximately two percent linux kernel written torvalds thousands contributed linux kernel percentage one largest contributions however stated 2012 personal contribution mostly merging code written others little programming torvalds retains highest authority decide new code incorporated standard linux kernel torvalds holds linux trademark monitors use chiefly linux mark institute linus torvalds married tove torvalds née monni —a six-time finnish national karate champion—whom first met late 1993 linus running introductory computer laboratory exercises students instructed course attendees send e-mail test tove responded e-mail asking date tove linus later married three daughters patricia miranda born 1996 daniela yolanda born 1998 celeste amanda born 2000 two born united states linux kernel reboot system call accepts dates birth written hexadecimal magic values torvalds described completely a-religious—atheist adding find people seem think religion brings morals appreciation nature actually think detracts gives people excuse say 'oh nature created act creation seen something miraculous appreciate fact 'wow incredible something like could happened first place later added europe religion mostly personal issue united states become politicized discussing issue church state separation torvalds also said yeah kind ironic many european countries actually kind legal binding state state religion however story march linuxworld conference titled linus liberator torvalds quoted saying like two golden rules life one 'do unto others would want unto reason people associate christianity 'm christian 'm agnostic rule 'be proud 2010 torvalds became united states citizen registered vote united states unaffiliated u.s. political party saying way much personal pride want associated quite frankly linus developed interest scuba diving early 2000s went achieve numerous certifications later led creating subsurface project time magazine recognized torvalds multiple times infoworld presented 2000 award industry achievement 2005 torvalds appeared one best managers survey businessweek 2006 business 2.0 magazine named one 10 people n't matter growth linux shrunk torvalds individual impact summer 2004 viewers yle finnish broadcasting company placed torvalds 16th network 100 greatest finns 2010 part series called britannica guide world influential people torvalds listed among 100 influential inventors time october 11 2017 linux company suse made song titled linus said
Operating systems