text
stringlengths
6
1.88M
source
stringclasses
13 values
ws-reliablemessaging ws-reliablemessaging describes protocol allows soap messages reliably delivered distributed applications presence software component system network failures original specification written bea systems microsoft ibm tibco march 2003 subsequently refined next two years february 2005 version submitted oasis web services reliable exchange ws-rx technical committee june year resulting ws-reliablemessaging 1.1 approved oasis standard june 14 2007 v1.2 approved february 2 2009 prior ws-reliablemessaging oasis produced competing standard ws-reliability supported coalition vendors namely fujitsu hitachi nec oracle corporation progress software sun microsystems vendors also support ws-reliablemessaging specification application source wishes reliably send messages application destination ad unreliable infrastructure accomplish make use reliable messaging source rms reliable messaging destination rmd sends message rms rms uses ws-reliablemessaging ws-rm protocol transmit message rmd rmd delivers message ad rms transmit message rmd reason must raise exception otherwise indicate message transmitted rms may implemented within process space may separate components similarly ad rmd may exist within process space may separate components important thing keep mind ws-rm specification deals contents behavior messages appear wire messages sent rms delivered rmd ad whether messages persisted on-disk held memory etc none considerations part ws-rm specification ws-rm protocol defines supports number delivery assurances ws-reliablemessaging uses extensibility model soap wsdl ws-reliablemessaging define features required complete messaging solution ws-reliablemessaging building block used conjunction web services specifications application-specific protocols build complete messaging solution article attempts make case reliability needed message level required business level
Web technology
international middleware conference international middleware conference brings together academic industrial delegates interest development optimisation evaluation evolution middleware first instance middleware conference held 1998 since 2003 conference run annually many recent conference events acm/ifip/usenix supported events middleware uses single-track conference program although includes growing number submission categories 2013 include conference also includes number six 2012 workshops typically co-located main conference
Distributed computing architecture
utility typed prompt small information utility available incompatible timesharing system could provide information incoming email bus schedule mit campus executable source files answer user humorous manner written midas assembly language still used instances maintained across web last traceable edit source code ken l. harrenstien 16 may 1988 without arguments would print information inbox status argument bus would print information next buses leaving mit campus asked source name responded paths source files corresponding name knowing answer would often resort humor finally displayed amount introspection
Operating systems
unixodbc unixodbc open-source project implements odbc api code provided gnu gpl/lgpl built used many different operating systems including versions unix linux mac os x ibm os/2 microsoft interix goals project include unixodbc project first started early months 1999 peter harvey created time developers iodbc another open source odbc implementation willing lgpl code expand api include current odbc 3 api specification consider addition gui based configuration tools worthwhile iodbc parts added applications use odbc interface may use iodbc unixodbc without change cases result projects adhering single odbc specification original driver manager basic driver manager rewritten easysoft nick gorham soon project started nick assumed leadership project july 1999 peter harvey continuing work supporting code development unixodbc progressed since origin contributions many developers open source community also commercial database companies including ibm oracle corporation sap included part standard installation many linux distributions unixodbc project split several projects hosted sourceforge split done allow faster releases supporting work maintaining focus stability consistency core code
Databases
ws-policy ws-policy specification allows web services use xml advertise policies security quality service etc web service consumers specify policy requirements ws-policy w3c recommendation september 2007 ws-policy represents set specifications describe capabilities constraints security business policies intermediaries end points example required security tokens supported encryption algorithms privacy rules associate policies services end points assertions either requirements put upon web service advertisement policies web service two operators xml tags used make statements policy combinations logically empty wsp tag makes assertions provider consumer specify policy effective policy computed usually consists intersection policies new policy contains assertions made sides contradict however synonymous assertions considered incompatible policy intersection easily explained fact policy intersection syntactic approach incorporate semantics assertions furthermore ignores assertion parameters opposed name might suggest policy intersection although quite similar set-intersection
Web technology
directory structure computing directory structure way operating system file system files displayed user files typically displayed hierarchical tree structure filename string used uniquely identify file stored file system computer advent 32-bit operating systems file names typically limited short names 6 14 characters size modern operating systems typically allow much longer filenames 250 characters per pathname element dos windows os/2 root directory drive example root directory usually c directory separator usually operating system also internally recognizes physical virtual drives named drive letter opposed combined one means formal root directory rather independent root directories drive however possible combine two drives one virtual drive letter setting hard drive raid setting 0 following folders may appear root boot partition unix unix-like operating systems use filesystem hierarchy standard common form directory structures files directories appear root directory even stored different physical devices
Computer file systems
db-engines ranking db-engines ranking ranks database management systems popularity covering 340 systems ranking criteria include number search engine results searching system names google trends stack overflow discussions job offers mentions systems number profiles professional networks linkedin mentions social networks twitter ranking updated monthly described cited various database-related articles grouping specific database features like database model type license regularly published statistics reveal historical trends used strategic statements db-engines dbms portal created 2012 maintained austrian consulting company solid based ranking db-engines grants yearly award system gained popularity within year award winners ranking might measure actual usage number installations systems may may correspond number users furthermore quality features systems direct impact ranking
Databases
cyber security standards information storage transit applications services systems connected directly indirectly networks principal objective reduce risks including prevention mitigation cyber-attacks published materials consist collections tools policies security concepts security safeguards guidelines risk management approaches actions training best practices assurance technologies cybersecurity standards existed several decades users providers collaborated many domestic international forums effect necessary capabilities policies practices generally emerging work stanford consortium research information security policy 1990s 2016 us security framework adoption study reported 70 surveyed organizations nist cybersecurity framework popular best practice information technology computer security many note requires significant investment iso/iec 27001 part growing iso/iec 27000 family standards information security management system isms standard last revision published october 2013 international organization standardization iso international electrotechnical commission iec full name iso/iec 27001:2013 – information technology – security techniques – information security management systems – requirements iso/iec 27001 formally specifies management system intended bring information security explicit management control iso/iec 27002 incorporates mainly part 1 bs 7799 good security management practice standard latest versions bs 7799 bs 7799-3 sometimes iso/iec 27002 therefore referred iso 17799 bs 7799 part 1 sometimes refers part 1 part 7 bs 7799 part 1 provides outline good practice guide cybersecurity management whereas bs 7799 part 2 iso/iec 27001 normative therefore provide framework certification iso/iec 27002 high level guide cybersecurity beneficial explanatory guidance management organisation obtain certification iso/iec 27001 standard certification obtained lasts three years depending auditing organisation intermediate audits may carried three years iso/iec 27001 isms replaces bs 7799 part 2 since backward compatible organization working toward bs 7799 part 2 easily transition iso/iec 27001 certification process also transitional audit available make easier organization bs 7799 part 2-certified organization become iso/iec 27001-certified iso/iec 27002 provides best practice recommendations information security management use responsible initiating implementing maintaining information security management systems isms states information security systems required implement iso/iec 27002 control objectives without iso/iec 27001 iso/iec 27002 control objectives ineffective iso/iec 27002 controls objectives incorporated iso 27001 annex a. iso/iec 21827 sse-cmm – iso/iec 21827 international standard based systems security engineering capability maturity model sse-cmm measure maturity iso controls objectives north american electric reliability corporation nerc addresses patching nerc cip 007-6 requirement 2 summarily requires bulk power system bps operators/owners identify source sources utilized provide entiter security related patches cyber assets utilized operation registered entities required check new patches every thirty five calendar days upon identification new patch entities required evaluate applicability patch complete mitigation installation activities within 35 calendar days completion assessment applicability.e bps.y initial attempt create information security standards electrical power industry created nerc 2003 known nerc css cyber security standards subsequent css guidelines nerc evolved enhanced requirements widely recognized modern nerc security standard nerc 1300 modification/update nerc 1200 newest version nerc 1300 called cip-002-3 cip-009-3 cip=critical infrastructure protection standards used secure bulk electric systems although nerc created standards within areas bulk electric system standards also provide network security administration still supporting best-practice industry processes standard develops called “ common criteria ” allows many different software hardware products integrated tested secure way iasme governance uk-based standard information assurance small-to-medium enterprises smes provides criteria certification small-to-medium business cybersecurity readiness also allows small medium business provide potential existing customers clients accredited measurement cybersecurity posture enterprise protection personal/business data iasme governance standard developed enable businesses achieve accreditation similar iso 27001 reduced complexity cost administrative overhead specifically focused sme recognition difficult small cap businesses achieve maintain iso 27001 certifications iasme governance standard include free basic cyber security insurance uk-based sme applicants cost certification progressively graduated based upon employee population sme e.g. 10 fewer 11 25 26 100 101 250 employees certification based upon self-assessment iasme questionnaire third-party professional assessor insurance companies reduce premiums cybersecurity related coverage based upon iasme certification october 2016 federal reserve board office comptroller currency federal deposit insurance corporation jointly issued advance notice proposed rulemaking anpr regarding cyber risk management standards regulated entities anpr aims enhance ability large interconnected financial services entities prevent recover cyber attacks goes beyond existing requirements proposal requires entities total assets 50 billion third party service providers take steps strengthen incident response programs enhance cyber risk governance management practices may 2017 us based federal financial institutions examination council issued cyber security assessment tool tool includes completing inherent risk profile organization covers five areas european telecommunications standards institute etsi established new cyber security committee tc cyber 2014 meet growing demand ev guidance protect internet communications business carries tc cyber working closely relevant stakeholders develop appropriate standards increase privacy security organisations citizens across europe committee looking particular security infrastructures devices services protocols well security tools techniques ensure security offers security advice guidance users manufacturers network infrastructure operators standards freely available on-line principal work item effort production cyber security ecosystem standardization activities 1990s information security forum isf published comprehensive list best practices information security published standard good practice sogp isf continues update sogp every two years latest version published 2018 among programs isf offers member organizations comprehensive benchmarking program based sogp furthermore important charge security management understand adhere nerc cip compliance requirements ansi/isa 62443 series standards technical reports related information define procedures implementing secure industrial automation control systems iacs guidance applies stakeholders implementing managing iacs documents originally referred ansi/isa-99 isa99 standards created international society automation isa publicly released american national standards institute ansi documents 2010 renumbered ansi/isa-62443 series change intended align isa ansi document numbering corresponding international electrotechnical commission iec standards isa99 remains name industrial automation control system security committee isa since 2002 committee developing multi-part series standards technical reports subject iacs security work products submitted isa approval publishing ansi also submitted iec input iec 62443 series international standards following iec standards development process established 2007 international security compliance institute isci created first conformity assessment scheme commonly known certification scheme ansi/isa 62443 standards program certifies commercial off-the-shelf cots automation control systems iot devices addressing securing control systems supply chain isci development processes include maintenance policies ensure isasecure certifications remain alignment iec 62443 standards evolve ansi/isa 62443 standards designed horizontally address technical cybersecurity requirements cross-section industries isasecure working groups included subject matter experts traditional process industries building management system suppliers asset owners isasecure scheme requires products properly tested supplier development process conformance ansi/isa 62443-4-1. exida united states first certification body accredited isasecure scheme american national standards institute ansi followed control systems security center – certification laboratory cssc-cl accredited japan accreditation board jab tüv rheinland accredited deutsche akkreditierungsstelle dakks five additional certification bodies accredited 2019 including tuv sud two cots product certifications available isasecure® brand isasecure-csa component security assurance certifying automation products iec 62443-4-1 iec 62443-4-2 cybersecurity standards isasecure-ssa system security assurance certifying systems iec 62443-3-3 standard third certification sdla secure development lifecycle assurance available isci certifies automation systems development organizations iec 62443-4-1 cybersecurity standard isasecure 62443 conformity assessment scheme iso 17065 program whose labs certification bodies cb independently accredited ansi/anab jab dakks singapore accreditation council global iso 17011 accreditation bodies ab certification labs must also meet iso 17025 lab accreditation requirements ensure consistent application certification requirements recognized tools mutual recognition arrangements mra iaf ilac others accreditation isasecure labs isa 17011 accreditation bodies ensures certificates issued isasecure labs globally recognized iec-62443 cybersecurity standards multi-industry standards listing cybersecurity protection methods techniques documents result iec standards creation process ansi/isa-62443 proposals inputs submitted country committees review done comments regarding changes submitted comments reviewed various iec 62443 committees comments discussed changes made agreed upon many members iec committees persons isa s99 committees date fundamental concepts original ansi/isa 62443 documents utilized iec 62443 certification schemes also established several global certification bodies defined scheme based upon referenced standards procedures describes test methods surveillance audit policy public documentation policies specific aspects program cybersecurity certification programs iec 62443 standards offered globally several recognized cbs including exida sgs-tüv saar tüv nord tüv rheinland tüv sud ul certx automation system market space cybersecurity certifications done exida global infrastructure established ensure consistent evaluation per standards impartial third party organizations called certification bodies cb accredited operate iso/iec 17065 iso/iec 17025 certification bodies accredited perform auditing assessment testing work accreditation body ab often one national ab country abs operate per requirements iso/iec 17011 standard contains requirements competence consistency impartiality accreditation bodies accrediting conformity assessment bodies abs members international accreditation forum iaf work management systems products services personnel accreditation international laboratory accreditation cooperation ilac laboratory accreditation multilateral recognition arrangement mla abs ensure global recognition accredited cbs ...
Computer security
trueos trueos formerly pc-bsd pcbsd unix-like server-oriented operating system built upon recent releases freebsd-current 2018 aimed easy install using graphical installation program easy ready-to-use immediately providing kde sc lumina lxde mate xfce desktop environment june 2018 developers announced trueos core os provides basis projects thus n't include graphical installer anymore graphical end-user-orientated oses based trueos ghostbsd trident trueos provides official binary nvidia intel drivers hardware acceleration optional 3d desktop interface kwin wine ready-to-use running microsoft windows software trueos able run linux software addition freebsd ports collection .txz package manager trueos supports openzfs installer offers disk encryption geli trueos founded freebsd professional kris moore early 2005 pc-bsd august 2006 voted beginner-friendly operating system osweekly.com first beta pc-bsd consisted gui installer get user running freebsd 6 system kde3 pre-configured major innovation time anyone wishing install freebsd would manually tweak run text installer kris moore goal make freebsd easy everyone use desktop since diverged even direction usability including additional gui administration tools .pbi application installers pc-bsd application installer management involved different approach installing software many unix-like operating systems including version 8.2 means pbidir website instead using freebsd ports tree directly although remained available pc-bsd used files .pbi filename extension push button installer double-clicked brought installation wizard program autobuild system tracked freebsd ports collection generated new .pbi files daily software packages dependencies installed inside .pbi files self-contained directories /programs convention aimed decrease confusion binary programs reside remove possibility package breaking system libraries upgraded changed prevent dependency hell october 10 2006 pc-bsd acquired enterprise-class hardware solution provider ixsystems ixsystems employs kris moore full-time developer leader project november 2007 ixsystems entered distribution agreement fry electronics whereby fry electronics stores nationwide carry boxed copies pc-bsd version 1.4 da vinci edition january 2008 ixsystems entered similar agreement micro center september 1 2016 pc-bsd team announced name operating system change trueos along rebranding project also became rolling release distribution based freebsd-current branch november 15 2016 trueos began transition freebsd rc.d openrc default init system apart gentoo/alt openrc initially developed major bsd based operating system using openrc july 2018 trueos announced would spin desktop edition separate project named project trident since version 7 pc-bsd began following numbering system freebsd since version 9.0 kde sc customized support tighter application integration .txz package management system longer desktop environment supported pc-bsd manual installation desktops xfce gnome technically possible earlier releases none supported earlier versions major functionality lost using pc-bsd special build kde sc starting version 9.0 pc-bsd added desktop environments including gnome xfce lxde mate pc-bsd used support amd64 i686 architectures support i686 dropped version 9.2 starting september 2016 rebranding pc-bsd trueos became rolling release distribution based freebsd current branch trueos package manager takes similar approach installing software many unix-like operating systems instead using freebsd ports tree directly although remains available trueos uses files .txz filename extension packages contain compiled ports autobuild system tracks freebsd ports collection generates new .txz files daily trueos package management system aims visually similar major operating systems microsoft windows apple macos applications installed single download link graphical prompts maintaining internally traditional .txz package management systems many unix-like systems use trueos package manager also takes care creating categorized links kde menu kde sc desktop 2014 pc-bsd project announced development new desktop environment scratch named lumina ken moore main developer lumina based qt toolkit july 2016 lumina web site desktop environment application development toolkit aims graphical interface uses plugins customization trueos originally licensed gnu general public license gpl developers impression applications using qt trueos uses interface development must licensed gpl q public license upon discovering fact restriction trueos developers later relicensed code bsd-like 3-clause license trueos trueos logo registered trademarks ixsystems inc new york city *bsd user group runs service named dmesgd provides user-submitted dmesg information different computer hardware laptops workstations single-board computers embedded systems virtual machines etc capable running trueos according trueos wiki trueos following hardware requirements uefi support amd64 added installer boot manager since version 10.1 default efi boot manager refind includes acpi detection setup root system description pointer rsdp extended system descriptor table xsdt root system description table rsdt pass-through values kernel new installation needed order install uefi support requires creation small fat partition current uefi support secure boot
Operating systems
acoustic model acoustic model used automatic speech recognition represent relationship audio signal phonemes linguistic units make speech model learned set audio recordings corresponding transcripts created taking audio recordings speech text transcriptions using software create statistical representations sounds make word modern speech recognition systems use acoustic model language model represent statistical properties speech acoustic model models relationship audio signal phonetic units language language model responsible modeling word sequences language two models combined get top-ranked word sequences corresponding given audio segment modern speech recognition systems operate audio small chunks known frames approximate duration 10ms per frame raw audio signal frame transformed applying mel-frequency cepstrum coefficients transformation commonly known mel frequency cepstral coefficients mfcc used input acoustic model along features recently use convolutional neural networks led big improvements acoustic modeling audio encoded different sampling rates i.e samples per second – common 8 16 32 44.1 48 96 khz different bits per sample common 8-bits 16-bits 24-bits 32-bits speech recognition engines work best acoustic model use trained speech audio recorded sampling rate/bits per sample speech recognized limiting factor telephony based speech recognition bandwidth speech transmitted example standard land-line telephone bandwidth 64 kbit/s sampling rate 8 khz 8-bits per sample 8000 samples per second 8-bits per sample 64000 bit/s therefore telephony based speech recognition acoustic models trained 8 khz/8-bit speech audio files case voice ip codec determines sampling rate/bits per sample speech transmission codecs higher sampling rate/bits per sample speech transmission improve sound quality necessitate acoustic models trained audio data matches sampling rate/bits per sample speech recognition standard desktop pc limiting factor sound card sound cards today record sampling rates 16 khz-48 khz audio bit rates 8 16-bits per sample playback 96 khz general rule speech recognition engine works better acoustic models trained speech audio data recorded higher sampling rates/bits per sample using audio high sampling rate/bits per sample slow recognition engine compromise needed thus desktop speech recognition current standard acoustic models trained speech audio data recorded sampling rates 16 khz/16bits per sample
Computational linguistics
stockade software stockade tcp-layer blocking tool written c++ denies tcp/ip access registered ip addresses using ipfw packet filter targets spam prevention may also used attackers e.g brute force password crackers approach leverages superior determination exhibited legitimate senders respect may considered similar greylisting originally authors conceived mt proxy rate-limit smtp connections messages believed spam worked adding dummynet rule frequent senders sending messages triggered unreliable statistical analysis key limitation original scheme consumption local resources smtp proxy stockade approach introduces notion inbound tcp connection may rejected random probability proportional level spam already seen connection ’ originator configurable period time probability subject decay configured halving time period ip address eventually rehabilitated way stockade provides fully automatic spam mitigation
Computer security
stateful firewall computing stateful firewall network firewall tracks operating state characteristics network connections traversing firewall configured distinguish legitimate packets different types connections packets matching known active connection allowed pass firewall stateful packet inspection spi also referred dynamic packet filtering security feature often included business networks stateful firewall technology introduced check point software firewall-1 product 1994 development stateful firewalls firewalls stateless stateless firewall treats network frame packet individually packet filters operate osi network layer layer 3 function efficiently look header part packet keep track packet context nature traffic firewall way knowing given packet part existing connection trying establish new connection rogue packet modern firewalls connection-aware state-aware offering network administrators finer-grained control network traffic classic example network operation may fail stateless firewall file transfer protocol ftp design protocols need able open connections arbitrary high ports function properly since stateless firewall way knowing packet destined protected network host destination port 4970 example part legitimate ftp session drop packet stateful firewalls application inspection solve problem maintaining table open connections inspecting payload packets intelligently associating new connection requests existing legitimate connections early attempts producing firewalls operated application layer top seven-layer osi model method required exorbitant amounts computing power commonly used modern implementations stateful firewall keeps track state network connections tcp streams udp communication able hold significant attributes connection memory attributes collectively known state connection may include details ip addresses ports involved connection sequence numbers packets traversing connection stateful inspection monitors incoming outgoing packets time well state connection stores data dynamic state tables cumulative data evaluated filtering decisions would based administrator-defined rules also context built previous connections well previous packets belonging connection cpu intensive checking performed time setup connection entries created tcp connections udp streams satisfy defined security policy packets session processed rapidly simple fast determine whether belongs existing pre-screened session packets associated sessions permitted pass firewall sessions match policy denied packets match existing table entry order prevent state table filling sessions time traffic passed certain period stale connections removed state table many applications therefore send keepalive messages periodically order stop firewall dropping connection periods user-activity though firewalls instructed send messages applications depending connection protocol maintaining connection state less complex firewall example tcp inherently stateful protocol connections established three-way handshake syn syn-ack ack ended fin fin-ack ack exchange means packets syn header received firewall interpreted open new connections service requested client available server respond syn-ack packet firewall also track firewall receives client ack response transfers connection established state connection authenticated bidirectionally allows tracking future packets established connection simultaneously firewall drops packets associated existing connection recorded state table syn packets preventing unsolicited connections protected machine black hat hacking connection protocols namely udp icmp based bidirectional connections like tcp making stateful firewall somewhat less secure order track connection state cases firewall must transfer sessions established state seeing first valid packet track connection addresses ports following packets source destination unlike tcp connections closed fin ack exchange connectionless protocols allow session end time-out example enables udp hole punching keeping track connection state stateful firewalls provide added efficiency terms packet inspection existing connections firewall need check state table instead checking packet firewall rule set extensive additionally case match state table firewall need perform deep packet inspection packet filtering alone regarded providing enough protection order effectively block peer-to-peer-related network traffic needed firewall application filtering regarded extension stateful packet inspection stateful packet inspection determine type protocol sent port application-level filters look protocol used example application-level filter might able tell difference http traffic used access web page http traffic used file sharing whereas firewall performing packet filtering would treat http traffic equally application layer firewalls generally slower stateful inspection application-layer firewalls sometimes implemented using application proxies two tcp connections established one packet source firewall another firewall packet destination application proxies intercept arriving packets behalf destination examine application payload relay permitted packets destination suspicious data dropped client server never communicate directly proxies necessarily involve protocol stack overhead inspecting packets network layer furthermore unique proxy required application proxy firewalls less flexible slower upgrade stateful inspection firewalls nevertheless application-level proxies application-aware proxies easily handle complex protocols like h.323 sip used videoconferencing voip voice ip risk vulnerabilities individual protocol decoders could allow attacker gain control firewall concern highlights need keep firewall software updated stateful firewalls also raise possibility individual hosts tricked soliciting outside connections possibility completely eliminated auditing host software firewalls defeated way simply viewing web page either javascript enabled clicking button
Computer security
orangefs orangefs open-source parallel file system next generation parallel virtual file system parallel file system type distributed file system distributes file data across multiple servers provides concurrent access multiple tasks parallel application orangefs designed use large-scale cluster computing used companies universities national laboratories similar sites worldwide orangefs emerged development branch pvfs2 much history shared history pvfs spanning twenty years extensive history behind orangefs summarized time line development branch new direction development orangefs branch begun 2007 leaders pvfs2 user community determined orangefs often described next generation pvfs2
Computer file systems
web services remote portlets web services remote portlets wsrp oasis-approved network protocol standard designed communications remote portlets wsrp specification defines web service interface interacting presentation-oriented web services initial work produced joint efforts web services interactive applications wsia web services remote portlets wsrp oasis technical committees approval wsrp v1 oasis standard september 2003 two technical committees merged continued work web services remote portlets wsrp oasis technical committee scenarios motivate wsrp functionality include wsrp specification make statements implementation java portlet specification jsr 168 wsrp competing technologies jsr 168 may used define portlet wsrp may used define portlet operations remote containers jsr 168 portlets wsrp may used together define portlet provide remote operations similarly .net portlets may created use wsrp interoperability jsr 168 .net wsrp implementations demonstrated several wsrp implementations assist developers first release wsrp v1 provided limited interoperability platform versions wsrp v1 abandoned effort could concentrated wsrp v2 wsrp v2 augments initial standard cross-portlet coordination access management features major update standard permits useful integration multiple content sources regardless whether local remote new web application addition wsrp v2 supports web 2.0 technologies ajax rest without requiring wsrp v2 approved oasis april 1 2008
Web technology
g suite g suite formerly google apps work google apps domain brand cloud computing productivity collaboration tools software products developed google first launched august 28 2006 google apps domain g suite comprises gmail hangouts calendar google+ communication drive storage docs sheets slides forms sites collaboration depending plan admin panel vault managing users services also includes digital interactive whiteboard jamboard app development platform app maker services free use consumers g suite adds enterprise features custom email addresses domain yourcompany.com option unlimited cloud storage depending plan number members additional administrative tools advanced settings well 24/7 phone email support based google data centers data information saved instantly synchronized data centers backup purposes unlike free consumer-facing services g suite users see advertisements using services information data g suite accounts get used advertisement purposes furthermore g suite administrators fine-tune security privacy settings g suite 4 million paying businesses 70 million g suite education users february 10 2006 google started testing gmail domain san jose city college hosting gmail accounts sjcc domain addresses admin tools account management august 28 2006 google launched google apps domain set apps organizations available free beta service included gmail google talk google calendar google page creator later replaced google sites dave girouard google vice president general manager enterprise outlined benefits business customers organizations let google experts delivering high quality email messaging web-based services focus needs users day-to-day business google announced edition schools known google apps education october 10 2006 february 22 2007 google introduced google apps premier edition differed free version offering storage 10 gb per user apis business integration 99.9 uptime gmail 24/7 phone support cost 50 per user account per year according google early adopters google apps premier edition included procter gamble san francisco bay pediatrics salesforce.com additionally editions google apps able use google documents spreadsheets users could access gmail blackberry mobile devices administrators gained application control enhancements came june 25 2007 google added number features google apps including mail migration external imap servers shared address books visual overhaul google docs google sheets increased gmail attachment size zdnet article noted google apps offered tool switching popular exchange server lotus notes positioning google alternative microsoft ibm october 3 2007 month acquiring postini google announced startup email security compliance options added google apps premier edition customers ability better configure spam virus filtering implement retention policies restore deleted messages give administrators access emails google introduced google sites february 28 2008 google sites provided simple new google apps tool creating intranets team websites june 9 2009 google launched google apps sync microsoft outlook plugin allows customers synchronize email calendar contacts data outlook google apps less month later july 7 2009 google announced services included google apps—gmail google calendar google docs google talk—were beta google opened google apps marketplace march 9 2010 online store third-party business applications integrate google apps make easier users software business cloud participating vendors included intuit appirio atlassian july 26 2010 google introduced edition governments then-known google apps government designed meet public sector unique policy security needs also announced google apps become first suite cloud applications receive federal information security management act fisma certification accreditation nearly five years launch google apps april 26 2011 google announced organizations 10 users longer eligible free edition google apps would sign paid version known google apps business flexible billing plan also introduced giving customers option paying 5 per user per month contractual commitment march 28 2012 google launched google vault optional electronic discovery archiving service google apps business customers april 24 2012 google introduced google drive platform storing sharing files google apps business user given 5gb drive storage option purchase later year google announced free version google apps would longer available new customers google unified storage drive gmail may 13 2013 giving google apps customers 30gb total shared across apps march 10 2014 google launched google apps referral program offers participating individuals 15 referral bonus new google apps user refer google june 25 2014 announced drive work new google apps offering featuring unlimited file storage advanced audit reporting new security controls 10 per user per month google enterprise company business product division officially renamed google work september 2 2014 eric schmidt google executive chairman said never set create traditional 'enterprise business—we wanted create new way work ... time come name catch ambition google announced google apps would rebranded g suite september 29 2016 october 25 2016 google launched first hardware product g suite jamboard 55-inch digital whiteboard connected cloud g suite comprises gmail hangouts calendar drive storage docs sheets slides forms sites collaboration admin panel vault managing users services basic plan includes email addresses custom domains yourcompany.com video voice calls calendars 30gb storage collaborative documents spreadsheets presentations sites controls security privacy 24/7 phone email support business plan adds vault ediscovery enables many additional custom features including advanced admin controls drive unlimited storage 1tb per user fewer 5 users drive audit reporting insights drive content sharing custom message retention policies us 50 per account per year us 5 per account per month official prices affiliates give discount codes 20 first year gmail web-based email service launched limited beta release april 2004 1 billion active consumer users worldwide february 2016 become popular giving users large amounts storage space threaded conversations robust search capabilities part g suite gmail comes additional features designed business use including google drive file storage synchronization service launched april 24 2012 official announcement described drive place create share collaborate keep stuff google drive users upload type file cloud share others access computer tablet smartphone users sync files device cloud apps microsoft windows apple macos computers android ios smartphones tablets part g suite google drive comes additional features designed business use including google docs google sheets google slides respectively word processor spreadsheet presentation program three programs originate company acquisitions 2006 today integrated google drive serve collaborative software allow users view edit documents spreadsheets presentations together real-time web browser mobile device changes saved automatically revision history keeping track changes also capability set user permission levels designate view comment edit document well permissions download specific document google forms meanwhile tool allows collecting information users via personalized survey quiz information collected automatically connected spreadsheet spreadsheet populated survey quiz responses june 2014 google introduced office support google docs sheets slides without need file conversion writing techcrunch frederic lardinois wrote google clearly positioning apps affordable solutions companies need occasionally edit office files part g suite google docs slides come additional features designed business use including unlimited revision history g suite also garnered strong following education 70 million users 2017 google forms survey application forms features collaboration sharing features found docs sheets slides also used create quizzes including specialized functions use educational settings google sites creation tool allows multiple people create edit websites without requiring coding knowledge web design skills introduced february 2008 effort help customers quickly gather variety information one place – including videos calendars presentations attachments text – easily share viewing editing small group entire organization world google calendar online calendar intended help keep track time schedules launched april 2006 integrates gmail users easily add events email messages directly calendar part g suite google calendar comes additional features designed business use including google apps domain launched 2006 google talk used communication later replaced may 2013 google hangouts messaging service incorporates technology different communication services google developed hangouts supports text voice video conversations video 25 participants cross-platform web android ios july 2014 google announced hangouts would covered 99.9 uptime guarauntee gmail google drive well 24/7 phone email support part g suite google hangouts comes additional features designed business use including invite-only quietly releasing ios app february 2017 google formally launched hangouts meet march 2017 service unveiled video conferencing app 30 participants described enterprise-friendly version hangouts launch featured web app android app ios app features g suite users include google hangouts meet standards-based video conferencing application using proprietary protocols video audio data transcoding google partnered pexip provide interoperability google protocol standards-based sip/h.323 protocols enable communications hangouts meet video conferencing equipment software google+ used let team members engage communicate deeper level stream featuring posts comments communities based common goals makes easy anyone discuss share ideas matter team level location features collections make easy group posts topic order users show know follow matters part g suite google+ comes additional features designed business use including google+ g suite continues available even consumer version google+ shut april 2 2019 google keep note-taking service variety tools notes including text lists voice images google keep became part g suite february 2017 part g suite google keep comes additional features designed business use including google vault archiving electronic discovery service exclusively available g suite customers announced march 28 2012 vault gives users easy-to-use cost-effective solution managing information critical business preserving important data google stating reduce costs litigation regulatory investigation compliance actions saving managing gmail messages chat logs ability search manage data based filters terms dates senders recipients labels update june 2014 let vault customers search preview copy export files google drive october 2016 google announced jamboard first hardware product designed g suite jamboard digital interactive whiteboard enables collaborative meetings brainstorming jamboard connected cloud enables people different locations work together real-time multiple jamboards connected remotely smartphone companion app jamboard recognizes different touch inputs using stylus sketch eraser start require batteries pairing jamboard 55-inch 4k display built-in hd camera speakers wi-fi g suite marketplace formerly google apps marketplace launched 2010 online store business-oriented cloud applications augment g suite functionality marketplace lets administrators browse purchase deploy integrated cloud applications comprises business tools productivity education communication utilities categories september 2014 google released blog post saying employees would able install third-party apps marketplace without involving administrators introduced february 2017 google cloud search enables unified search experience g suite cloud search lets users search information across entire g suite product lineup users also search contacts results including person contact details well events files common cloud search mobile app features assist cards described google new way help find right information right time using google machine intelligence technology cards help prepare upcoming meeting even suggest files need attention google states cloud search respects file-sharing permissions meaning users see results files access initial global roll-out cloud search introduced functionality g suite business enterprise customers google stating functionality added time including support third-party applications introduced july 2017 hire job applications management tool developed google used combination g suite tool lets employers track job candidates contact information well résumés calendar invitations allows business partners share feedback candidates job applicants choose information share potential employers tool designed businesses based united states fewer 1,000 employees integrates google services gmail sending messages google calendar tracking schedules google sheets overview candidates google hangouts initial conversations google introduced work insights september 2018 administrators see departments using google products google states collect scan use g suite data advertising purposes display ads g suite education government core services furthermore states data companies schools government agencies put g suite services belong google whether corporate intellectual property personal information homework assignment google data google sell data third parties data stored google data centers built custom-designed servers run operating system security performance 550 full-time security privacy professionals blog post google stated benefits using g suite included disaster recovery data information simultaneously replicated two data centers one data center fails nearly instantly transfer data one also reflecting actions though acknowledging backup solution us anyone else absolutely perfect google states invested lot effort help make second none encryption specifically aes 128-bit stronger applied data stored data centers transit data centers users data centers introduction june 2014 techcrunch reported google drive part g suite offers enterprise-grade security compliance including ssae 16 isae 3402 type ii soc 2-audit certification adherence safe harbor privacy principles support industry-specific requirements like health insurance portability accountability act hipaa google 3 million businesses paying g suite 70 million g suite education users september 2014 amit singh then-president then-named google work stated 60 percent fortune 500 companies paying service 1,800 customers signing week notable companies using g suite include uber allsaints buzzfeed design within reach pwc march 2014 google announced google apps referral program united states canada program lets users receive money coupons incentives referring customers g suite december 2014 google introduced google work education partner program program combined existing individual programs apps chrome cloud platform maps search one overall program allows partners better sell service innovate across google work education suite products platforms august 2011 review pc world tony bradley wrote value rival platform google apps hinges compatible microsoft office formatting conventions file types praising google gone great lengths improve fidelity microsoft office n't gone far enough criticizing many features reformatted including tables contents footnotes inserted images bradley praised google collaborative apps writing besting microsoft offers office 365 regarding price wrote google package best value annual pricing 50 per user per year makes third less per user per year office 365 yet boasts equivalent functionality sufficient small medium organizations gary marshall techradar commented 2016 office tries everything imaginable google suite much basic said much powerful package debuted 2006 emphasis simplicity speed remains marshall wrote would n't want craft massive complicated manuscript google docs n't docs designed fast user-friendly way create everyday documents share colleagues clients fellow service google sheets covers common excel functions ... n't power microsoft offering marshall praised collaboration effortless praised importing external file formats making editable collaborative big selling point pc magazine eric grevstad wrote online get adding configuring work offline rigmarole stated package illustration software version 80/20 rule ... 80 percent users never need 20 percent features stated comparing g suite office 2016 like bringing handgun cannon fight ... microsoft pc-based suite designed almost every feature anyone might ever need google online suite designed features people use daily tom hardware james gaskin wrote like google products claim cleanest minimal interface market suite except office 365 get close ease collaboration google provides even microsoft product trails wide margin changes appear real-time word 2016 apps conclusively wrote progress made first google app release considerable world moves mobile computing google distinct advantage tradition dies hard build basic documents spreadsheets presentations remain tied desktops laptops time google+ launched many articles published emphasized presence google+ helped business google search result rankings particularly public-facing pages +1 buttons pushed effective marketing strategies however writing new york times quentin hardy said sour grapes version google plus ’ getting anything like buzz traffic facebook google figuring ways make service relevant however hardy note integration google+ popular google services including hangouts meant ’ still early ’ easy see could efficient way bring workers virtual meeting collaborate embed calendar future work commitments follow-up result key competitor google suite microsoft office 365 microsoft cloud-based offering businesses includes similar products key differences pricing plans storage space number features noted techrepublic 2013 pricing plans differ google apps quick easy pricing plan standard google apps business package 5 per user per month 50 per user per year ... contrast office 365 multitude plans six september 2013 good bad since provides flexibility also involves complexity figure best choice storage space varies office 365 gives users 50 gb space outlook 1 tb onedrive google apps provides 30 gb space spread among gmail drive picasa regarding features states office 365 advantage plenty users familiar word excel rest gang years less learning curve google apps latter represents brand new experience ... however also true office notorious loaded complex unused features cause confusion familiarity many embrace also comes something price especially companies paying advanced packages employees use contrast google apps programs fairly easy learn intuitive may feel awkward hard-coded work office stephen shankland cnet wrote 2014 hard compare google apps success microsoft office since google n't release revenue user figures microsoft 60 million commercial customers signed office 365 product offering 50,000 small business customers added office 365 month
Distributed computing architecture
charlie miller security researcher charles alfred miller american computer security researcher cruise automation prior current employment spent five years working national security agency worked uber miller holds bachelors mathematics minor philosophy northeast missouri state truman state university ph.d. mathematics university notre dame 2000 currently lives wildwood missouri miller publicly demonstrated many security exploits apple products 2008 10,000 cash prize hacker conference pwn2own vancouver british columbia canada first find critical bug macbook air following year 5,000 cracking safari 2009 collin mulliner demonstrated sms processing vulnerability allowed complete compromise apple iphone denial-of-service attacks phones 2011 found security hole iphone ipad whereby application contact remote computer download new unapproved software execute command could steal personal data otherwise using ios applications functions malicious purposes proof concept miller created application called instastock approved apple app store informed apple security hole promptly expelled app store miller participated research discovering security vulnerabilities nfc near field communication also published three books miller along chris valasek widely known remotely hacking 2014 jeep cherokee controlling braking steering acceleration vehicle
Computer security
research unix research unix refers early versions unix operating system dec pdp-7 pdp-11 vax interdata 7/32 8/32 computers developed bell labs computing sciences research center term research unix first appeared bell system technical journal vol 57 6 pt 2 jul/aug 1978 distinguish versions internal bell labs pwb/unix mert whose code-base diverged primary csrc version however term little-used version 8 unix retroactively applied earlier versions well prior v8 operating system commonly called simply unix caps unix time-sharing system licensed version 5 educational institutions version 6 also commercial sites schools paid 200 others 20,000 discouraging commercial use version 6 widely used version 1980s research unix versions often referred edition manual describes early versions last never officially released outside bell labs grew organically first research unix would first edition last tenth edition another common way referring version x v x unix x manual edition modern editions unix—excepting unix-like implementations coherent minix linux—derive 7th edition starting 8th edition versions research unix close relationship bsd began using 4.1cbsd basis 8th edition usenet post 2000 dennis ritchie described later versions research unix closer bsd unix system v also included bsd code 2002 caldera international released unix v1 v2 v3 v4 v5 v6 v7 pdp-11 unix 32v vax foss permissive bsd-like software license 2017 unix heritage society alcatel-lucent usa inc. behalf nokia bell laboratories released v8 v9 v10 condition assert copyright rights respect non-commercial copying distribution performance display creation derivative works research unix®1 editions 8 9 10
Operating systems
composite ui application block composite ui application block cab addition microsoft .net framework creating complex user interfaces made loosely coupled components developed microsoft patterns practices team cab used exclusively developing windows forms derivative version cab exists web client mobile client software factories well encourages developer use either model-view-controller model-view-presenter architectural pattern encourage reuse individual user controls referred cab smartparts coupling underlying data elements presentation code part foundation smart client software factory another patterns practices deliverable also part mobile client software factory version smart client software factory use .net compact framework 2.0
Operating systems
list live cds list live cds live cd live dvd cd-rom dvd-rom containing bootable computer operating system live cds unique ability run complete modern operating system computer lacking mutable secondary storage hard disk drive directly based debian large number live cds based knoppix list derivatives section knoppix article based least partially ubuntu based debian microsoft representatives described third-party efforts producing windows-based live cds improperly licensed uses windows unless used solely rescue properly licensed installation however nu2 productions believes use bartpe legal provided one windows license purchased bartpe cd windows license used nothing else systems based former open source os/net nevada onnv open source project sun microsystems illumos fork former opensolaris onnv aiming develop onnv replacing closed source parts remaining binary compatible following products based upon illumos
Operating systems
file integrity monitoring file integrity monitoring fim internal control process performs act validating integrity operating system application software files using verification method current file state known good baseline comparison method often involves calculating known cryptographic checksum file original baseline comparing calculated checksum current state file file attributes also used monitor integrity generally act performing file integrity monitoring automated using internal controls application process monitoring performed randomly defined polling interval real-time changes configurations files file attributes across infrastructure common hidden within large volume daily changes impact file configuration integrity changes also reduce security posture cases may leading indicators breach progress values monitored unexpected changes files configuration items include multiple compliance objectives indicate file integrity monitoring requirement several examples compliance objectives requirement file integrity monitoring include examples include
Computer security
secure coding secure coding practice developing computer software way guards accidental introduction security vulnerabilities defects bugs logic flaws consistently primary cause commonly exploited software vulnerabilities analysis thousands reported vulnerabilities security professionals discovered vulnerabilities stem relatively small number common software programming errors identifying insecure coding practices lead errors educating developers secure alternatives organizations take proactive steps help significantly reduce eliminate vulnerabilities software deployment buffer overflows common software security vulnerability happen process tries store data beyond fixed-length buffer example 8 slots store items problem attempt store 9 items computer memory overflowed data may overwrite data next location result security vulnerability stack smashing program termination segmentation fault example c program prone buffer overflow int vulnerable_function char large_user_input user input larger destination buffer buffer overflow occur fix unsafe program use strncpy prevent possible buffer overflow int secure_function char user_input another secure alternative dynamically allocate memory heap using malloc char secure_copy char src code snippet program attempts copy contents src dst also checking return value malloc ensure enough memory able allocated destination buffer format string attack malicious user supplies specific inputs eventually entered argument function performs formatting printf attack involves adversary reading writing stack c printf function writes output stdout parameter printf function properly formatted several security bugs introduced program vulnerable format string attack int vulnerable_print char malicious_input malicious argument passed program could “ ” crash program improper memory reads integer overflow occurs arithmetic operation results integer large represented within available space program properly check integer overflow introduces potential software bugs exploits function c++ attempts confirm sum x less equal defined value max bool sumisvalid_flawed unsigned int x unsigned int problem code check integer overflow addition operation sum x greater maximum possible value codice_1 addition operation overflow perhaps result value less equal max even though sum x greater max function checks overflow confirming sum greater equal x sum overflow sum would less x less y. bool sumisvalid_secure unsigned int x unsigned int
Computer security
language computer corporation language computer corporation lcc natural language processing research company based richardson texas company develops variety natural language processing products including software question answering information extraction automatic summarization since founding 1995 low-profile company landed significant united states government contracts 8,353,476 contracts 2006-2008 company focused primarily government software market lcc also used technology spin three start-up companies first spin known lymba corporation markets poweranswer question answering product originally developed lcc 2010 lcc ceo andrew hickl co-founded two start-ups made use company technology included swingly automatic question answering start-up extractiv information extraction service founded partnership houston texas-based 80legs
Computational linguistics
inssider inssider wi-fi network scanner application microsoft windows os x developed metageek llc received awards 2008 infoworld bossie award best open source software networking inssider 3 longer open-source inssider began replacement netstumbler popular windows wi-fi scanner actively developed several years reputedly work modern 64-bit operating systems versions windows higher windows xp project inspired charles putney code project
Computer security
baynote baynote san jose california-based software company offering web search recommendation software service products based concept wisdom crowd also known collective intelligence search results ranked based analysis links pages visited users past september 2016 kibo software inc. announced purchased baynote undisclosed amount
Web technology
system 7 system 7 codenamed big bang sometimes retrospectively called mac os 7 graphical user interface-based operating system macintosh computers part classic mac os series operating systems introduced may 13 1991 apple computer inc succeeded system 6 main macintosh operating system succeeded mac os 8 1997 features added system 7 release included virtual memory personal file sharing quicktime quickdraw 3d improved user interface release version 7.6 1997 apple officially renamed operating system mac os name first appeared system 7.5.1 boot screen system 7 developed macs used motorola 680x0 line processors ported powerpc apple adopted new processor 1994 introduction power macintosh development macintosh system software system 6 followed fairly smooth progression addition new features relatively small changes upgrades time major additions fairly limited notably adding color quickdraw system 6 perspective scope changes seen examining official system documentation inside macintosh initially shipped three volumes adding another describe changes introduced mac plus another mac ii mac se limited changes meant original macintosh system remained largely initially introduced machine geared towards single user task running floppy disk based machine extremely limited ram however many assumptions model longer appropriate notable among single-tasking model replacement first examined 1986 switcher replaced outright multifinder system 5 running multifinder normally required larger amount ram hard drive became common late 1980s additions relatively limited fixes underlying oddities system architecture instance support limited form multitasking original mac os supported small co-resident programs known desk accessories installed system using special tools system able support multiple tasks one-off solution would longer needed — desk accessories could simply small programs placed anywhere yet multifinder still optional step taken numerous examples sort problem could found throughout system finally widespread adoption hard drives local area networks led number new features requested users developers late 1980s list new upgrades suggested changes existing model considerable march 1988 shortly release system 6 technical middle managers apple held offsite meeting plan future course mac os development ideas written index cards features seemed simple enough implement short term like adding color user interface written blue cards longer-term goals like true multitasking pink cards far ideas like object-oriented file system red cards development ideas contained blue pink cards proceed parallel first two projects known simply blue pink including taligent apple intended blue team came call blue meanies characters yellow submarine release updated version existing macintosh operating system 1990–1991 time-frame pink team release entirely new os around 1993 blue aimed relatively simple upgrades feature list reads degree sort system 6 corrected underlying os number formerly optional components made mandatory furthermore number oddities original system typically included due limited resources finally changed use basic underlying os features system also offered wide variety new features system 7 first apple operating system available compact disc although shipped set 15 floppy disks initially unlike earlier systems system 7 come bundled major software packages newly purchased macintosh computers system 7 installed often bundled software hypercard ease mouse practice later macintosh performa family added various software bundles including clarisworks new grolier multimedia encyclopedia microsoft bookshelf spectre vr power pete since system 7 introduced internet came popular attention software mactcp freeppp netscape included first later available disk internet service providers bundled books adam c. engst internet starter kit macintosh power macintosh machines also included nucalc graphing calculator system 7 also includes appletalk networking file sharing software form system extensions control panels basic utilities installed default system 7 include teachtext replaced simpletext later versions basic text editing tasks reading readme documents also available additional disk tools floppy disk disk first aid disk repair apple hd sc setup initializing partitioning disks later versions system 7 specifically system 7.5 mac os 7.6 come dedicated utilities folder apple extras folder including applescript disk copy quickdraw gx extras quicktime movie player optional extras utilities could manually installed system cd system 7.1.2 first version macintosh system software support apple new powerpc-based computers 68k applications yet updated run natively systems emulated transparently without user intervene built-in 68k processor emulator fat binaries contained code necessary run natively powerpc 68k systems became common time process similar distribution universal binaries apple transition intel processors 2006 system 7.0 7.1 offered utility called apple file exchange could access contents fat- apple ii — formatted floppy disks system 7 pro system 7.5 shipped pc exchange previously separate product allowed system mount fat-formatted floppy disks desktop manner regular macintosh disks os/2 disks read pc dos disks due fact os/2 used fat file system time macs could also read write unix file systems help extra software system 7 allowed users access pc networks allowed communication via tcp/ip compatible networking stacks actual pc software compatibility however required third party software softpc allowed ms-dos early microsoft windows programs run connectix virtual pc allowed mac run windows via full pc emulation pc compatibility solutions took native approach running windows ms-dos using x86 expansion cards x86 chip card apple offered systems configured way marketed dos compatible —a card dedicated x86 cpu ram used mac hard drive sound subsystem networking input provided services pc pc could run simultaneously mac user could switch two fashion similar kvm switch earliest systems 680x0 based systems running system 7 system 7 provided support accessing pc volume mac pc exchange software actual control pc hardware accomplished way control panels time release many users noticed performance suffered result upgrading system 6 system 7 though newer hardware soon made speed difference another problem system 7 large memory footprint system 6 could boot system single 800k floppy disk took ram whereas system 7 used well megabyte time average mac shipped enough ram built system 7 truly comfortable system 7 first system release could longer usefully run floppy-only systems although macintosh models sold time included hard disk standard equipment owners older models required upgrade buying either new mac external scsi hard disk drive wished run system 7 order take advantage system 7 virtual memory feature macintosh equipped paged memory management unit pmmu required motorola 68030 cpu one built-in one added motherboard motorola 68020-equipped macintosh ii macintosh model using 68020 macintosh lc use virtual memory apple introduced 68030-equipped macintosh lc ii shortly system 7 introduction despite newer processor lcii retained earlier model 16-bit bus perform faster lc replaced despite setbacks system 7.0 adopted quite rapidly mac users quickly became one base requirements new software engineering group within apple responsible system 7 came known blue meanies named blue index cards written features could implemented relatively short time part apple operating system strategy comparison pink index card features handled pink group later becoming ill-fated taligent project system 7.0 last version macintosh operating system available charge could freely redistributed although system 7 could purchased apple cost nominal considered cover duplication media common macintosh dealers allow customers use store demo machines copy system 7 install disks cost box floppies cd-rom magazines nautilus included system 7 disks mac users downloaded thousands copies system 7 online services aol compuserve genie apple surveyed services based popularity started selling mac os retail product system 7.1 apple continued charging major operating system upgrades release os x mavericks 2013 soon initial release system 7 7.0.1 minor update released october 1991 patch called system 7 tune-up also followed fixed disappearing files bug system would lose files added minimum preferred memory allotments application get info box august 1992 7.1 update released first version system software apple charged money change david pogue wrote new 7.1 fonts folder replaced often time-consuming method dragging fonts system file introduced system 7.0 also replaced font/da mover application system 6 could also used 7.0 system 7.1 also included lot internal changes support internationalization dates time numbers also first version support enablers removed requirement release new version system software every time new hardware released set specialized versions 7.1 ranging 7.1p1 7.1p6 excluding 7.1p4 created included various performa models already available released 7.1 specialized versions included ease launcher changes integrated later versions system software first major upgrade system 7.1.1 also known system 7 pro release bundle 7.1 applescript tools quicktime apple open collaboration environment aoce system 7 trouble running slightly older machines due memory footprint system 7 pro barely fit macintosh computers time commonly used minor bug fixes rather new functionality apple joined aim alliance apple ibm motorola shortly release system 7 1991 started work powerpc-based machines later became power macintosh family support machines resulted system 7.1.2 system 7.1.2 never offered retail sale shipped first batches powerpc macs 68k version shipped small number quadra 600 series systems later shipments shipped system 7.5 instead system 7.1.2p 7.1.2 shipped performa 630 lc 630 quadra 630 models released july november 1994 next major release system 7.5 included bug fixes previous updates added several new features including system 7.5 codenamed capone reference al capone chicago code name microsoft windows 95 also name default system font used mac os version 8 system 7.5.1 primarily bug fix 7.5 also introduced new mac os startup screen preparation mac clones system 7.5.2 released first pci-based power macs notable introducing apple new networking architecture open transport system 7.5.3 major bug-fix update also included open transport powerpc-based machines well 68k-based machines 7.5.3 also made several improvements 68k emulator added translucent dragging support drag manager also included first version control strip compatible macs also first version mac os support smp 9500/mp system 7.5.3 revision 2 included performance enhancements better reliability powerbooks using third-party ram doubler program improved reliability powerbook 500 2300 5300 series computers powerpc upgrade card improved reliability using startup disk control panel improved reliability copying files 1 gb hard disks system 7.5.3 revision 2.1 shipped performa 6400/180 6400/200 particular release specific machines stability problems system 7.5.3 release 2 new hardware especially video card transferring files localtalk system 7.5.4 pulled due mistake apple components included installer system 7.5.5 included significant performance improvements virtual memory memory management powerpc-based macs including elimination one type 11 error also included number reliability improvements fixes macs using floppy disks equipped dos compatibility card improved hard disk access powerpc powerbooks performa 5400 9500 computers fixes macs included apple tv tuner macintosh tv remote control improvements localtalk networking especially performa 5400 6400 fixes system startup faster 180 mhz macs included powerpc 604 604e processors improved reliability using sound-intensive applications quadra centris computers contained powerpc upgrade card improved stability using multiple background applications shared printers network system 7.5.5 also last system 7 release run 68000-based macs macintosh plus macs roms lack support 32-bit addressing macintosh iicx 7.6 later required 68030 processor 32-bit-addressing-capable rom automatically turn 32-bit addressing boot mac os 7.6 codenamed harmony last major update released 1997 7.6 operating system officially called mac os instead system new features include revamped extensions manager native powerpc code power macs bundled internet tools utilities stable finder increased memory allocation version powertalk feature added 7.5 removed due poor application support support large number older macintosh models dropped minor update mac os 7.6.1 finally ported 68k exception handling routines powerpc turning type 11 errors less harmful errors type 1 2 3 usually crashing applications would often terminate safely instead crashing operating system period apple attempting release completely new modern operating system named copland copland project abandoned 1996 apple announced plans release os update every six months rhapsody would 2001 evolve released mac os x shipped two releases shipped officially branded mac os — mac os 7.6 minor bug fix 7.6.1 future versions released mac os 8–8.6 mac os 9–9.2
Computer architecture
amp unix pc 3b1 also known pc7300 unix pc unix workstation computer originally developed convergent technologies later acquired unisys marketed mid- late-1980s despite name 3b1 little common 3b-series computers initial pc7300 model offered modest 512 kib memory small low performance 10 mb hard drive model although progressive offering unix system desktop office operation underpowered produced considerable fan drive bearing noise even idling modern-looking wedge design innovative fact machine gained notoriety appearing many movies token computer later enhanced model renamed 3b1 cover redesigned accommodate full-height 67 mb hard drive cover change added 'hump case expanded onboard memory 1 2 mb well added better power supply operating system based unix system v release 2 extensions 4.1 4.2 bsd system v release 3 convergent technologies last release 3.51 store public domain software repository available 3b1 users
Computer architecture
xitami xitami web ftp server originally developed imatix corporation free open-source product 1996 2000 ran single process small footprint fast fastest servers scaled well supported several web application protocols portable also web interface configure web/ftp server 2009 imatix launched new version xitami called x5 xitami/5 imatix started original xitami server 1996 demonstration smt multithreading technology building protocol servers name chosen last minute developers realized original choice cosmos already taken another web server longer exists xitami imatix spelled backwards xitami featured april 1997 article dr. dobb journal web server attracted people looking fast simple web/ftp server mainly microsoft windows xitami designed portable ported windows linux unices openvms beos os/2 non-portable functionality encapsulated library layer called sfl standard function library sfl free open source project used fairly widely projects 1999 apache web server adopted similar approach portability apache2 building apache portable runtime apr xitami team continued add features mid-2000 development server stopped except security updates 2008 multiple codice_1 vulnerabilities reported final release xitami/2.5 january 2009 imatix announced start new xitami project version 5 called x5 uses latest generation imatix multithreading technology base2 making xitami scalable multiple cores remaining small simple imatix stated designed handle thousands connections without difficulty makes ready long polling client connections remain open extended durations windows binaries x5 released february 2009 x5 used first time run imatix live zyre website x5 shares technical framework imatix openamq message service x5 written ansi c99 using meta-programming approach called model oriented programming x5 presented fosdem 2009 consisting 3,457 lines meta-meta code x5 uses apr place sfl run windows linux aix solaris openvms
Web technology
mythdora mythdora specialized operating system based fedora mythtv since 2009 version number comes version fedora used followed version mythtv used example current version 12.23 uses fedora 12 mythtv 0.23 like linhes mythdora designed simplify installation mythtv home theatre pc mythdora since version 10.21 live cd support addition mythtv plugins mythdora includes extra linux packages necessary mythtv run drivers hardware commonly encountered machines intended run mythtv also included mythdora several video game emulators extra tools scripts aid initial configuration system allow user perform tasks rebooting machine backing program data directly mythtv interface development discontinued 2011 august 3 2011 project maintainers indicated longer time keep project going
Operating systems
permis permis privilege role management infrastructure standards sophisticated policy-based authorization system implements enhanced version u.s. national institute standards technology nist standard role-based access control rbac model permis supports distributed assignment roles attributes users multiple distributed attribute authorities unlike nist model assumes centralised assignment roles users permis provides cryptographically secure privilege management infrastructure pmi using public key encryption technologies x.509 attribute certificates maintain users attributes permis provide authentication mechanism leaves application determine use permis strength comes ability integrated virtually application authentication scheme like shibboleth internet2 kerberos username/passwords grid proxy certificates public key infrastructure pki standard rbac system permis main entities permis policy extensible markup language xml -based rules user-role assignments role-privilege assignments latter containing optional obligations returned application user granted access resource permis policy stored either simple text xml file attribute within signed x.509 attribute certificate provide integrity protection tampering detection user roles attributes may held secure signed x.509 attributes certificates stored lightweight directory access protocol ldap directories web-based distributed authoring versioning webdav repositories may created demand security assertion markup language saml attribute assertions permis authorisation engine comprises two components credential validation service validates users roles according user-role assignment rules policy decision point pdp evaluates users access requests according role-permission assignment rules access control rules access resource depends upon roles/attributes assigned user role-permission assignments contain constraints based user access request e.g print less 10 pages environment e.g time day permis work either push mode user attribute assignments sent permis application pull mode permis fetches attribute assignments ldap/webdav repositories saml attribute authorities permis open source project java source code downloaded http //www.openpermis.info alternatively precompiled java libraries downloaded http //sec.cs.kent.ac.uk/permis/ permis unique support cryptographically protecting user attributes/roles policy guarantees integrity protects tampered new features continually added like standard extensible access control markup language xacml interface allows permis xacml pdps seamlessly interchanged ability accept saml attribute assertions support dynamic delegation authority separation duty policies recent addition controlled natural language interface english writing simple permis policies
Computer security
lavasoft adaware formerly known lavasoft software development company produces spyware malware detection software including adaware operates subsidiary avanquest division company offers adaware three editions one free two pro total commercial adaware products include adaware ad block adaware web companion lavasoft digital lock lavasoft file shredder lavasoft privacy toolbox lavasoft registry tuner adaware headquarters montreal canada previously located gothenburg sweden since 2002 nicolas stark ann-christine åkerlund established company germany 1999 flagship adaware antivirus product 2011 lavasoft acquired solaria fund private equity fund front entrepreneurs daniel assouline michael dadoun accused selling software available free including adaware antivirus prior acquiring company anti-spyware anti-virus software program adaware antivirus according developer detects removes malware spyware adware computer viruses dialers trojans bots rootkits data miners parasites browser hijackers tracking components adaware antivirus originally developed ad-aware 1999 highlight web beacons inside internet explorer many websites users would see tiny pixelated square next web beacon warning user computer ip address non-essential information tracked website time ad-aware added ability block beacons ads 2008 edition lavasoft bundled ad-aware pro plus first time antivirus scanner used avira engine arrangement continued years starting ad-aware version 10 bitdefender antivirus engine used instead according pc world magazine older version ad-aware anniversary edition could locate 83.6 malware comparative test carried security firm av-test however stated tests run newest version neil j. rubenking pcmag performed lab test version 8.3 ad-aware scored 9.2 points beating previous top score 9.1 july 2013 adaware antivirus free listed downloaded total 450 million times lavasoft site including 387 million times download.com according opswat january 2015 ad-aware less 1 market share globally paid versions product competed low-cost free products microsoft security essentials company acquired january 2011 lavasoft solaria fund private equity fund front daniel assouline michael dadoun key people upclick interactive brands sc magazine reported lavasoft acquired entrepreneurs accused selling software available free unwitting users guise premium support including free version lavasoft security program prior acquiring company security consultant dancho danchev documented controversy additionally danchev reported 2013 lavasoft used hide hard-to-uninstall programs third-party software trick users installing like k-lite codec pack lavasoft web companion changed browser without given permission although company shields behind complete legality bundled software claims software used fight malware users branded products malware february 2015 reported cert coordination center new security feature ad-aware web companion implemented komodia ssl digestor one komodia public sdks company behind superfish security incident lenovo machines
Computer security
database administration database administration function managing maintaining database management systems dbms software mainstream dbms software oracle ibm db2 microsoft sql server need ongoing management corporations use dbms software often hire specialized information technology personnel called database administrators dbas three types dbas individuals usually specialize one type database administration smaller organizations uncommon find single individual group performing one type database administration degree administration database automated dictates skills personnel required manage databases one end spectrum system minimal automation require significant experienced resources manage perhaps 5-10 databases per dba alternatively organization might choose automate significant amount work could done manually therefore reducing skills required perform tasks automation increases personnel needs organization splits highly skilled workers create manage automation group lower skilled line dbas simply execute automation database administration work complex repetitive time-consuming requires significant training since databases hold valuable mission-critical data companies usually look candidates multiple years experience database administration often requires dbas put work off-hours example planned hours downtime event database-related outage performance severely degraded dbas commonly well compensated long hours one key skill required often overlooked selecting dba database recovery part disaster recovery case “ ” case “ ” database suffers failure ranging simple failure full catastrophic failure failure may data corruption media failure user induced errors either situation dba must skills recover database given point time prevent loss data often dbms software comes certain tools help dbas manage dbms tools called native tools example microsoft sql server comes sql server management studio oracle tools sql*plus oracle enterprise manager/grid control addition 3rd parties bmc quest software embarcadero technologies sql maestro group offer gui tools monitor dbms help dbas carry certain functions inside database easily another kind database software exists manage provisioning new databases management existing databases related resources process creating new database consist hundreds thousands unique steps satisfying prerequisites configuring backups step must successful next start human expected complete procedure exact way time time exactly goal multiple databases exist number dbas grows without automation number unique configurations frequently grows costly/difficult support complicated procedures modeled best dbas database automation software executed standard dbas software created specifically improve reliability repeatability procedures stratavia data palette gridapp systems clarity automated database operations grown since 2009 following amazon web services introduction aws rds providing automated managed database service microsoft azure launched similar automated database service 2010 sql azure providing automated backups geo-replication high availability introduction docker software containers enhanced support fast delivery containerized database instances amazon web serices microsoft azure enhanced automated support containers respective services third party support database container images grown including mongodb postgres mysql oracle microsoft sql server microsoft independent port docker software windocks newer technologies stratavia data palette suite gridapp systems clarity begun increase automation databases causing reduction database related tasks however best reduces amount mundane repetitive activities eliminate need dbas intention dba automation enable dbas focus proactive activities around database architecture deployment performance service level management every database requires database owner account perform schema management operations account specific database log data director add database owner accounts database creation data director users must log database-specific credentials view database entities data perform database management tasks database administrators application developers manage databases appropriate permissions roles granted organization administrator permissions roles must granted database group database apply within organization granted several education institutes offer professional courses including late-night programs allow candidates learn database administration also dbms vendors oracle microsoft ibm offer certification programs help companies hire qualified dba practitioners college degree computer science related field helpful necessarily prerequisite
Databases
svalbard global seed vault svalbard global seed vault secure seed bank norwegian island spitsbergen near longyearbyen remote arctic svalbard archipelago approximately north pole conservationist cary fowler association consultative group international agricultural research cgiar started vault preserve wide variety plant seeds duplicate samples spare copies seeds held gene banks worldwide seed vault attempt ensure loss seeds genebanks large-scale regional global crises seed vault managed terms spelled tripartite agreement among norwegian government crop trust nordic genetic resource center nordgen norwegian government entirely funded vault approximately 2008 construction storing seeds vault free end users norway crop trust pay operational costs primary funding trust comes organisations bill melinda gates foundation various governments worldwide nordic gene bank ngb since 1984 stored backup nordic plant germplasm via frozen seeds abandoned coal mine svalbard january 2008 nordic gene bank merged two nordic conservation groups form nordgen svalbard global seed vault officially opened 26 february 2008 although first seeds arrived january 2008 five percent seeds vault 18,000 samples 500 seeds came centre genetic resources netherlands cgn part wageningen university netherlands part vault first anniversary 90,000 food crop seed samples placed storage bringing total number seed samples 400,000 among new seeds included 32 varieties potatoes ireland national gene banks 20,000 new samples u.s agricultural research service seed samples came canada switzerland well international seed researchers colombia mexico syria shipment brought total number seeds stored vault 20 million anniversary vault contained samples approximately one-third world important food crop varieties also part anniversary experts food production climate change met three-day conference longyearbyen japanese sculptor mitsuaki tanabe presented work vault named seed 2009 momi in-situ conservation 2010 delegation seven u.s. congressmen handed number different varieties chili pepper 2013 approximately one-third genera diversity stored gene banks globally represented seed vault october 2016 seed vault experienced unusually large degree water intrusion due higher average temperatures heavy rainfall common water seep vault entrance tunnel warmer spring months case water encroached tunnel freezing vault designed water intrusion seeds risk result however norwegian public works agency statsbygg plans make improvements tunnel prevent intrusion future including waterproofing tunnel walls removing heat sources tunnel digging exterior drainage ditches seed vault 10th anniversary 26 february 2018 shipment 70,000 samples delivered facility bringing number samples received one million counting withdrawals time total number samples held vault 967,216 representing 13,000 years agricultural history norway sweden finland denmark iceland prime ministers ceremonially laid first stone 19 june 2006 seedbank inside sandstone mountain spitsbergen island employs robust security systems seeds packaged special three-ply foil packets heat sealed exclude moisture facility managed nordic genetic resource center though permanent staff on-site spitsbergen considered ideal lacked tectonic activity permafrost aids preservation sea level keep site dry even ice caps melt locally mined coal provides power refrigeration units cool seeds internationally recommended standard equipment fails least several weeks elapse facility rises surrounding sandstone bedrock temperature estimated take two centuries warm feasibility study prior construction determined vault could preserve major food crops seeds hundreds years including important grains could potentially remain viable thousands years running length facility roof front face entryway illuminated artwork named perpetual repercussion norwegian artist dyveke sanne marks location vault distance norway government-funded construction projects exceeding certain cost must include artwork norwegian state agency overseeing art public spaces engaged artist install lighting highlights importance qualities arctic light roof vault entrance filled highly reflective stainless steel mirrors prisms installation reflects polar light summer months winter network 200 fibre-optic cables gives piece muted greenish-turquoise white light svalbard global seed vault mission provide safety net accidental loss diversity traditional genebanks popular press emphasized possible utility event major regional global catastrophe frequently accessed genebanks lose samples due mismanagement accident equipment failures funding cuts natural disasters events occur regularity war civil strife history destroying genebanks national seed bank philippines damaged flooding later destroyed fire seed banks afghanistan syria iraq lost completely according economist svalbard vault backup world 1,750 seed banks storehouses agricultural biodiversity norwegian law prohibited storing genetically modified seeds vault adjacent arctic world archive provides similar service data etched code reels film project lead piql norway states film properly preserved last 1,000 years vault seed samples copies samples stored depositing genebanks researchers plant breeders groups wishing access seed samples seed vault must instead request samples depositing genebanks samples stored genebanks cases accessible accordance terms conditions international treaty plant genetic resources food agriculture approved 118 countries parties seed vault functions like safe deposit box bank bank owns building depositor owns contents box government norway owns facility depositing genebanks seeds send deposit samples svalbard constitute legal transfer genetic resources genebank terminology called black box arrangement depositor signs deposit agreement nordgen acting behalf norway agreement makes clear norway claim ownership deposited samples ownership remains depositor sole right access materials seed vault one access anyone else seeds seed vault database samples depositors maintained nordgen syrian civil war caused another seed bank international center agricultural research dry areas icarda move headquarters aleppo beirut due difficulties icarda transferring collection 2015 svalbard vault authorized first withdrawal seeds history seeds stored sealed three-ply foil packages placed plastic tote containers metal shelving racks storage rooms kept low temperature limited access oxygen ensure low metabolic activity delay seed aging permafrost surrounding facility help maintain low temperature seeds electricity supply fails years since opening vault saw minor water intrusion entrance annual spring permafrost thawing warmer temperatures heavy rainfall october 2016 caused significantly greater amounts water inundate entrance facility design ensured water froze several meters seeds endangered crop trust officially known global crop diversity trust plays key role planning seed vault coordinating shipments seed samples vault conjunction nordic genetic resource center trust provides annual operating costs facility set aside endowment funds norwegian government finances upkeep structure support bill melinda gates foundation donors crop trust assists selected genebanks developing countries well international agricultural research centres packaging shipping seeds seed vault international advisory council provides guidance advice includes representatives fao cgiar international treaty plant genetic resources institutions svalbard global seed vault ranked 6 time best inventions 2008 awarded norwegian lighting prize 2009 seed sample consists approximately 500 seeds sealed airtight aluminum bag facility storage capacity 4.5 million seed samples
Computer security
visifire visifire set data visualization components currently supports charts gauges visifire available microsoft silverlight wpf windows phone windows 8 one use api create charts gauges mobile web desktop environments visifire also embedded webpage standalone silverlight app independent server side technology used hence visifire used asp asp.net php jsp coldfusion ruby rails simple html javascript visifire also wizard-driven solution create charts sharepoint visifire development started early release silverlight 1.1 alpha microsoft next release silverlight directly silverlight 2.0 beta ported silverlight 2.0 beta release silverlight 2.0 final opened slew possibilities exploit full power silverlight 2.0 major architectural changes done new visifire 2.0 released later came visifire 3.0 improved looks major performance improvements gauges introduced visifire 4.0 later visifire sharepoint introduced wizard driven solution create stunning sharepoint charts next major update visifire support windows phone windows 8 applications recently released version visifire 5.0 major performance improvements current version visifire 5.1.5 visifire runs various platforms silverlight wpf windows phone windows 8 visifire licensed commercially one buy royalty free license based number developers distributed gpl discontinued due confusion prevailing around windows phone marketplace priority support provided enterprise customers ticket system users supported visifire community forum
Operating systems
city identification card united states city municipal identification card form identification card issued municipality city rather state federal government federal law cities may issue identification cards see fit consider immigration criminal status applicant new connecticut issued first municipal identification cards united states elm city resident card 2007 january 15 2009 city/county san francisco launched sf city id card municipal identification card program modeled new cities issue identification cards include asbury park new jersey washington d.c. dc one card mercer county new jersey community id card issued local non profit organization endorsement various law enforcement agencies august 31 2016 city council phoenix arizona voted 5 4 create city identification card would available undocumented immigrants cards available february 2017 program cancelled february 2018 november 8 2012 los angeles city council voted 12 1 solicit proposals municipal identification card modeled oakland city id system city oakland california debated proposed municipal identification system would include debit card function city residents regardless immigration status move backed oakland city id card coalition september 13 2011 oakland city council decided wait cost feasibility study completed late october proceeding hoping begin issuing id cards 2012 barring unforeseen circumstances however extended 2012 city council voting favor final portion program october 16 2012 first cards program slated issued february 1 july 5 2011 richmond city council voted unanimously issue municipal identification cards richmond residents regardless immigration status letter council urging passage measure city council member mayor argued many richmond residents lack necessary forms official identification required access financial institutions jobs housing protections home workplace residents include immigrants children students homeless transgender people indigent disabled elderly runaway youth adult survivors domestic violence program administered third-party vendor cost city november 2007 board supervisors san francisco voted issue municipal id cards residents city regardless immigration status cards officially launched january 15 2009 proof identity city residence required elm city resident card id card used new connecticut united states card originally designed protect estimated 10,000 15,000 illegal immigrants new robbed assaulted city residents receive card serves form identification debit card capacity 150 library card way pay parking meters cards first issued july 2007 first municipal identification cards issued united states card costs 5 children 10 adults hartford connecticut 2017 first issued may 22 2017 hartford city id government-issued identification card available hartford residents verify identification residency status hartford aventura florida issues optional aventura id card residents delray beach florida issues optional residency identification card sunny isles beach florida offers free optional sunny isles beach resident id card residents october 12 2016 chicago mayor rahm emanuel city clerk susana mendoza announced launch chicago municipal id program april 26 2018 city officials launched chicago citykey optional valid government-issued id card offered chicago residents citykey serves three-in-one card valid government issued id ventra card chicago transit authority chicago public library services first 100,000 id cards free cost initial response chicago citykey extremely high successful city wards residents waited hours line receive card may 17 2016 city council detroit michigan voted favor creation municipal identification program city residents struggle otherwise obtain government-issued id december 5 2017 city council northfield minnesota unanimously approved ordinance establishing city identification card program implemented march 2018 county clerk hudson county new jersey barbara a. netchert issues identification cards resident county cards available residents county fee ten dollars adults five dollars minors specified county teenagers aged fourteen sixteen starting april 2011 mercer county area community id card issued endorsement offices mercer county sheriff mercer county prosecutor police departments several municipalities including trenton princeton borough princeton township west windsor ewing township plainsboro card issued non profit latin american legal defense education fund laldef accepted law enforcement agencies municipal agencies clinics hospitals libraries social service agencies many stores banks although official government id card facilitates access basic community services unable obtain documents immigrants youth homeless persons recovery re-entry programs card replaces trenton princeton community id cards issued 2009 2010 county clerk monmouth county new jersey m. clark french issues identity cards residents county cards available u.s. citizens legal permanent residents asbury park issues identification card city residents cards became available august 1 2015 dover new jersey offers municipal id card elizabeth new jersey offers municipal id card highland park new jersey offers municipal id card new brunswick new jersey offers new brunswick city id card city newark introduced municipal identification program august 2015 residents newark cards cost 15 new applicants however new applicants senior citizens children cost 8 financial hardship application filed city fees unable met applicant jersey city city council announced municipal identification program april 2017 morristown new jersey offers municipal id card paterson new jersey offers municipal id card perth amboy new jersey offers municipal id card starting november 2013 plainfield community id cards issued support plainfield police department card issued non-profit group angels action inc trained mentored latin american legal defense education fund laldef mercer county identification local identity cards grant legal residency right work approved plainfied city cooperation card also accepted law enforcement agencies municipal agencies clinics hospitals libraries social service agencies many stores banks angels action local organizations also process trying encourage plainfield city council approve municipal identity id card system supply cards larger scale growing population plainfield angels actions also helped mentor encourage id cards newark roselle city council roselle new jersey unanimously passed ordinance allow borough launch community-wide identification card program october 21 2015 began issuing cards december 14 2015 union city nj board commissioners decided enact municipal identification program starting march 1 2017 program open resident city older 14 system part set allow residents city gain identification securing financial services e.g bank checking account july 2007 new york city councilman hiram monserrate proposed setting municipal identity system new york city residents similar new plan however shortly thereafter monserrate left council new york state senate proposal shelved february 10 2014 first state city address new york city mayor bill de blasio announced new plan create new york city municipal identification card named idnyc would available new yorkers regardless immigration status city resident could obtain card mayor announced way allow city residents lack legal immigration status united states access municipal private services facilities require photo identification cards also provide additional benefits discounts movie tickets broadway shows sporting events ymca memberships additionally cardholders able open bank account several financial institutions new york city cards first made available january 12 2015 philadelphia issues optional identification card city residents phl city id cards became available april 2019 providence rhode island issues optional identification card city residents idpvd cards became available june 2018 may 1 2014 washington d.c. issues dc one card legal residents visitors u.s. though services may available residents district undocumented immigrants may get card issued state driver license state non-driver id card one states issues credentials illegal immigrants new mexico utah washington school id card dc one card consolidated credential designed give adults children access dc government facilities programs designed help district consolidate printing id cards save money dc one card also building access card dc government employees public school secondary students request card includes immediate metro smartrip® capability help travel milwaukee issues optional municipal identification card residents
Computer security
10-yard fight 10-yard fight viewed top-down perspective vertical scrolling player select plays either offense defense offense player simply receives ball upon snap either attempts run quarterback toss ball running back throw ball one long distance receiver – basically option offense defense player chooses one two players control computer manipulates others ball also punted field goal attempted game five levels increasing difficulty high school college professional playoff super bowl player wins halves accelerated real time 30-minute half easier level player advances next level difficulty like career mode arcade game later ported famicom irem first japan later published north america europe nintendo 1985 nintendo entertainment system nes arcade game also ported msx home computer also irem exclusively japan graphically similar fundamental differences arcade nes versions game arcade version seeks simulate offense team attempting score touchdown ultimately leads player next level nes version developed allow defense offense well simultaneous 2-player mode may 2 2018 port nintendo switch released hamster part arcade archives series pittsburgh post-gazette called patriarch football games adam duerson sports illustrated stated one remembered could say makes great worth recognition fact brought football games atari era setting simple precedent future football games adam swiderski ugo networks called downright advanced compared earlier football titles added looked neat quality soundtrack n't play like real football nick chordas columbus dispatch said realistic time commenting players looked like real people n-sider called like racing game football game due objective racing first increase players time author bj klein however called less realistic tecmo bowl journal news called immortal classic
Computer architecture
scvp server-based certificate validation protocol scvp internet protocol determining path x.509 digital certificate trusted root delegated path discovery validation path delegated path validation according particular validation policy relying party receives digital certificate needs decide whether trust certificate first needs determine whether certificate linked trusted certificate process may involve chaining certificate back several issuers following case currently creation chain certificates performed application receiving signed message process termed path discovery resulting chain called certification path many windows applications outlook use cryptographic application programming interface capi path discovery capi capable building certification paths using certificates installed windows certificate stores provided relying party application equifax ca certificate example comes installed windows trusted certificate capi knows acme co ca certificate included signed email made available capi outlook capi create certification path however capi find acme co ca certificate way verify joe user trusted scvp provides us standards-based client-server protocol solving problem using delegated path discovery dpd using dpd relying party asks server certification path meets needs scvp client request contains certificate attempting trust set trusted certificates scvp server response contains set certificates making valid path certificate question one trusted certificates response may also contain proof revocation status ocsp responses certificates path certification path constructed needs validated algorithm validating certification paths defined rfc 5280 section 6 signatures expiration name constraints policy constraints basic constraints etc. could done locally client scvp server delegated path validation scvp facilitates federated pkis one bridge certificate authority
Internet protocols
ark software ark file archiver compressor developed kde included kde applications software bundle supports various common archive compression formats including zip 7z rar lha tar uncompressed compressed e.g gzip bzip2 lzip xz
Computer file systems
operation wolf assuming role special forces operative roy adams player attempts rescue five hostages held captive enemy territory game divided six stages advances story completed example jungle stage completed adams interrogates enemy soldier learns location concentration camp hostages held one first shooter games feature storyline game utilized optical controller housed inside gun assembly scaled bore strong resemblance uzi submachine gun turn mounted top square base covering pivot shaft allowed players swivel elevate gun geared motor inside casing simulated recoil felt player fired weapon in-game targets pulling trigger allowed fully automatic fire pressing button near muzzle launched grenade wide blast radius could hit multiple targets order complete stage player must shoot required number soldiers vehicles trucks boats helicopters armored transports indicated on-screen counter player begins limited supply ammunition grenades find throughout game either openly displayed revealed shooting crates/barrels coconuts trees animals pigs chickens dynamite bombs cause heavy damage every target screen enemy friendly special machine gun power-up allows unlimited ammunition increased rate fire 10 seconds enemies attack gunfire knives grenades mortar/bazooka rounds missiles first shot air player damage bar slowly fills hits taken addition shooting friendly targets nurses boys adds bar damage recovered picking health power-ups completing stages six stages objectives effects gameplay completion follows completing airport stage least one hostage rescued awards bonus based number stages played number hostages boarded plane new operation begins higher difficulty level fully healed damage bar fresh supply ammunition game ends following events occur outcome showing different game screen continuing game allows player restart last stage played language game set english six stages always played order result effects communication setup jungle obvious number enemies particular stage remains constant one operation next language set japanese first four stages initially available player may choose order play allowing strategic planning ported version nintendo entertainment system allowed multiple endings depending many hostages rescued player would awarded points form combat pay greeted president united states number surviving hostages corresponded president tone player game ported amstrad cpc dos nes master system fm towns commodore 64 pc engine ports lack kind light gun support exceptions nes master system zx spectrum featured magnum light phaser support must played keyboard controller box master system version features promotional art operation thunderbolt 2005 operation wolf released xbox playstation 2 microsoft windows part taito legends however light gun support unavailable february 4 2008 nes version operation wolf released north american wii virtual console whereas nes version allowed nes zapper support vc re-release feature kind light gun support including wii remote pointer functions making game playable standard controller mode game commercially successful coinslot dedicated arcade game chart number four behind street fighter continental circus wec le mans spectrum sales charts number two behind robocop number one every month year game also critically acclaimed several awards 1989 golden joystick awards 1988 including overall game year 8-bit well best coin-op conversion 8-bit best coin-op conversion 16-bit sinclair user gave top game 1988 award shooting game likely push edge 1988 later voted number 26 sinclair readers top 100 games time poll
Computer architecture
exynos exynos greek words exypnos meaning smart prasinos meaning green series arm-based reduced instruction set system-on-chips socs developed manufactured samsung electronics continuation samsung earlier s3c s5l s5p line socs 2010 samsung launched hummingbird s5pc110 exynos 3 single samsung galaxy smartphone featured licensed arm cortex-a8 cpu arm cortex-a8 code-named hummingbird developed partnership intrinsity using fastcore fast14 technology early 2011 samsung first launched exynos 4210 soc samsung galaxy ii mobile smartphone driver code exynos 4210 made available linux kernel support added version 3.2 november 2011 29 september 2011 samsung introduced exynos 4212 successor 4210 features higher clock frequency 50 percent higher 3d graphics performance previous processor generation built 32 nm high-κ metal gate hkmg low-power process promises 30 percent lower power-level previous process generation 30 november 2011 samsung released information upcoming soc dual-core arm cortex-a15 cpu initially named exynos 5250 later renamed exynos 5 dual soc memory interface providing 12.8 gb/s memory bandwidth support usb 3.0 sata 3 decode full 1080p video 60 fps along simultaneously displaying wqxga-resolution 2560 × 1600 mobile display well 1080p hdmi samsung exynos 5 dual used 2015 prototype supercomputer end-product use chip meant servers another vendor 26 april 2012 samsung released exynos 4 quad powers samsung galaxy iii samsung galaxy note ii exynos 4 quad soc uses 20 less power soc samsung galaxy ii samsung also changed name several socs exynos 3110 exynos 3 single exynos 4210 4212 exynos 4 dual 45 nm exynos 4 dual 32 nm exynos 5250 exynos 5 dual 2010 samsung founded design center austin called samsung ’ austin r center sarc samsung hired many ex-amd ex-intel ex-arm various industry veterans sarc develop high-performance low-power complex cpu system ip coherent interconnect memory controller architectures designs 2017 san jose advanced computing lab acl opened continue development mediatek unreleased custom gpu microarchitecture acquired 3 year design cycle sarc first custom core released exynos 8890 2016 exynos modem 303 exynos modem 333 exynos modem 5100 exynos t200 exynos s111 exynos auto v9
Computer architecture
control reconfiguration control reconfiguration active approach control theory achieve fault-tolerant control dynamic systems used severe faults actuator sensor outages cause break-up control loop must restructured prevent failure system level addition loop restructuring controller parameters must adjusted accommodate changed plant dynamics control reconfiguration building block toward increasing dependability systems feedback control figure right shows plant controlled controller standard control loop nominal linear model plant formula_1 plant subject fault indicated red arrow figure modelled general formula_2 subscript formula_3 indicates system faulty approach models multiplicative faults modified system matrices specifically actuator faults represented new input matrix formula_4 sensor faults represented output map formula_5 internal plant faults represented system matrix formula_6 upper part figure shows supervisory loop consisting fault detection isolation fdi reconfiguration changes loop end vectors inputs outputs contain available signals used controller fault-free operation alternative scenarios model faults additive external signal formula_9 influencing state derivatives outputs follows formula_10 goal reconfiguration keep reconfigured control-loop performance sufficient preventing plant shutdown following goals distinguished internal stability reconfigured closed loop usually minimum requirement equilibrium recovery goal also referred weak goal refers steady-state output equilibrium reconfigured loop reaches given constant input equilibrium must equal nominal equilibrium input time tends infinity goal ensures steady-state reference tracking reconfiguration output trajectory recovery goal also referred strong goal even stricter requires dynamic response input must equal nominal response times restrictions imposed state trajectory recovery goal requires state trajectory restored nominal case reconfiguration input usually combination goals pursued practice equilibrium-recovery goal stability question whether similar goals reached specific faults addressed reconfigurability analysis paradigm aims keeping nominal controller loop end reconfiguration block placed faulty plant nominal controller together faulty plant forms reconfigured plant reconfiguration block fulfill requirement behaviour reconfigured plant matches behaviour nominal fault-free plant linear model following formal feature nominal closed loop attempted recovered classical pseudo-inverse method closed loop system matrix formula_11 state-feedback control structure used new controller formula_12 found approximate formula_13 sense induced matrix norm perfect model following dynamic compensator introduced allow exact recovery complete loop behaviour certain conditions eigenstructure assignment nominal closed loop eigenvalues eigenvectors eigenstructure recovered nominal case fault optimisation control schemes include linear-quadratic regulator design lqr model predictive control mpc eigenstructure assignment methods probabilistic approaches developed learning automata neural networks etc methods reconfiguration achieved differ considerably following list gives overview mathematical approaches commonly used prior control reconfiguration must least determined whether fault occurred fault detection components affected fault isolation preferably model faulty plant provided fault identification questions addressed fault diagnosis methods fault accommodation another common approach achieve fault tolerance contrast control reconfiguration accommodation limited internal controller changes sets signals manipulated measured controller fixed means loop restructured
Computer security
puppy linux puppy linux operating system family light-weight linux distributions focus ease use minimal memory footprint entire system run random-access memory current versions generally taking 210 mb allowing boot medium removed operating system started applications abiword gnumeric mplayer included along choice lightweight web browsers utility downloading packages distribution originally developed barry kauler members community kauler retired 2013 tool woof build puppy linux distribution binary packages linux distributions barry kauler started puppy linux response trend distributions becoming stricter system requirements time distribution emphasis speed efficiency lightweight started boot disk howto gradually included components file-by-file puppy linux completed puppy linux started vector linux based became fully independent distribution puppy 0 initial release puppy linux unionfs extreme minimal persistence support package manager ability install applications puppy 1 series run comfortably dated hardware pentium computer least 32 mb ram newer systems usb keydrive version might better although usb device booting directly supported bios puppy floppy boot disk used kick-start possible run puppy linux windows 9x/windows also possible bios support booting usb drive boot cd keep user state usb keydrive saved shutdown read usb device bootup puppy 2 uses mozilla-based seamonkey internet suite primarily web browser e-mail client puppy 3 features slackware 12 compatibility accomplished inclusion almost dependencies needed installation slackware packages however puppy linux slackware-based distribution puppy 4 built scratch using t2 sde longer features native slackware 12 compatibility order reduce size include newer package versions found 3 compensate optional compatibility collection packages created restores lost compatibility puppy 4.2 features changes user interface backend upgraded packages language character support new in-house software optimizations still keeping iso image size 100 mb puppy 5 based project called woof designed assemble puppy linux distribution packages linux distributions woof includes binaries software derived ubuntu debian slackware t2 sde arch repositories puppy 5 came stripped version midori browser used reading help files choice web browsers installed including chromium firefox seamonkey internet suite iron opera puppy 6 built ubuntu 14.04 trusty tahr packages binary compatibility ubuntu 14.04 access ubuntu package repositories tahrpup built woof-ce build system forked barry kauler woof late last year announced retirement puppy development built latest testing branch incorporates latest woof-ce features released pae nopae isos option switch kernels puppy 7 built ubuntu 16.04 xenial xerus packages binary compatibility ubuntu 16.04 access ubuntu package repositories tahrpup built woof-ce build system forked barry kauler woof built latest testing branch incorporates latest woof-ce features released pae nopae isos option switch kernels new ui new kernel update greater hardware compatibility redesign puppy package manager bugfixes base packages inclusion woof structure puppy 8 built ubuntu bionic beaver 18.04.2 packages binary compatibility ubuntu 18.04.2 access ubuntu package repositories bionicpup built woof-ce build system forked barry kauler woof built latest testing branch incorporates latest woof-ce features puppy linux complete operating system bundled collection applications suited general use tasks used rescue disk demonstration system leaves previous installation unaltered accommodation system blank missing hard drive using modern software legacy computers puppy compact size allows boot media computer support function live usb flash devices usb mediums cd internal hard disk drive sd card zip drive ls-120/240 superdisk pxe floppy boot disk chainloads data storage media also ported arm run single board computer raspberry pi puppy linux features built-in tools used create bootable usb drives create new puppy cds remaster new live cd different packages also uses sophisticated write-caching system purpose extending life live usb flash drives puppy linux includes ability use normal persistent updating environment write-once multisession cd/dvd require rewritable disc unique feature sets apart linux distributions distributions offer live cd versions operating systems none offer similar feature puppy bootloader mount hard drives connect network automatically ensures bug even unknowingly incompatible software wo n't corrupt contents devices puppy linux offers session save shutdown since puppy linux fundamentally runs ram files configurations made changed session would disappear otherwise feature enables user either save contents writable storage medium write file system cd containing puppy multisession used create booted cd disc drive supports burning applies cd-rs well cd-rws dvds also possible save files external hard drive usb stick even floppy disk instead root file system puppy also installed hard disk default window manager puppy releases jwm packages icewm desktop fluxbox enlightenment also available via puppy petget package application management system see derivative distributions called puplets come default window managers jwm operating system boots everything puppy package uncompresses ram area ramdisk pc needs least 128 mb ram 8 mb shared video puppy load ramdisk however possible run pc 48 mb ram part system kept hard drive less effectively left cd puppy fairly full-featured system runs entirely ramdisk booted live system 'frugal installation however puppy also supports 'full installation mode enables puppy run hard drive partition without ramdisk applications chosen met various constraints size particular one aims distribution extremely easy set many wizards guide user wide variety common tasks puppy linux package manager puppy package manager installs packages pet puppy enhanced tarball format default also accepts packages distros .deb .rpm .txz .tgz packages using third-party tools convert packages distros pet packages puppy package manager also trim software bloat package reduce disk space used earlier releases puppy linux puppy unleashed used create puppy iso images consists 500 packages put together according user needs however later versions starting puppy linux version 5.0 replaced woof advanced tool creating puppy installations requires internet connection knowledge linux use able download binary source packages another linux distribution process puppy linux packages defining name linux distro equipped simpler version control named bones earlier releases later versions woof fossil version control used puppy also comes remastering tool takes snapshot current system lets user create live cd additional remastering tool able remove installed components puppy linux uses t2 sde build scripts build base binary packages relative ease woof tool remaster tool used build variants puppy linux many variants available variants puppy linux known puplets barry kauler reduced involvement puppy project designed two new distributions within puppy linux family quirky wary quirky – embedded less-stable distro files contained initramfs built kernel simple module loading management fewer drivers included used experimental purposes racy – variant puppy optimized newer pcs wary – puppy variant targeted users old hardware uses older linux kernel long-term support newest applications easy – puppy variant init script completely rewritten uses originally developed application containers aside conventional package management distrowatch reviewer rober storey concluded puppy 5.2.5 april 2011 lot people like puppy — top 10 distrowatch page-hit ranking enjoy puppy run exclusively netbook maybe thing wrong puppy users expectations tend exceed developer intentions detailed review puppy linux may 2011 howard fosdick os news addressed root user issue theory could problem — practice presents downside 've never heard single puppy user suffering problem due fosdick concluded like puppy lightest linux distro 've found still suitable end users install old p-iii p-iv computer family friends use effectively common tasks expensive new machine december 2011 jesse smith writing distrowatch reviewed puppy 5.3.0 slacko puppy praised simplicity flexibility clear explanations noting limitations running root concluded would also like see option added boot process would give user choice running unprivileged mode opposed running root always administrator advantages convenience means user always one careless click away deleting files one exploit away compromised operating system live cd hard beat puppy linux performance functional software minimal hardware requirements flexible great distro long n't push far niche december 2011 howard fosdick reviewed versions puppy linux available concluded puppy diversity flexibility make great community-driven system computer enthusiasts hobbyists tinkerers also make somewhat disorderly world might read bit figure puppy release puplet puppy online documentation extensive confusing always clear docs pertain releases users rely active friendly forum support also noted us enjoy computers sometimes forget many view disdain wrong buy new one every four years earth change interface every release ca n't work puppy great solution folks up-to-date free easy use supports free applications ubuntu slackware puppy repositories user-friendly
Operating systems
push ack floods push floods ack floods denial service attacks based psh ack flags since flags require additional processing may possible overwhelm service setting flags numerous requests proxy filters may drop appropriate packets flags set system considered attack
Computer security
hierarchical database model hierarchical database model data model data organized tree-like structure data stored records connected one another links record collection fields field containing one value type record defines fields record contains hierarchical database model mandates child record one parent whereas parent record one child records order retrieve data hierarchical database whole tree needs traversed starting root node model recognized first database model created ibm 1960s hierarchical structure developed ibm 1960s used early mainframe dbms records relationships form treelike model structure simple inflexible relationship confined one-to-many relationship ibm information management system ims rdm mobile examples hierarchical database system multiple hierarchies data rdm mobile newly designed embedded database mobile computer system hierarchical data model lost traction codd relational model became de facto standard used virtually mainstream database management systems relational-database implementation hierarchical model first discussed published form 1992 see also nested set model hierarchical data organization schemes resurfaced advent xml late 1990s see also xml database hierarchical structure used primarily today storing geographic information file systems currently hierarchical databases still widely used especially applications require high performance availability banking telecommunications one widely used commercial hierarchical databases ims another example use hierarchical databases windows registry microsoft windows operating systems organization could store employee information table contains attributes/columns employee number first name last name department number organization provides employee computer hardware needed computer equipment may used employee assigned organization could store computer hardware information separate table includes part serial number type employee uses tables might look like model codice_1 data table represents parent part hierarchy codice_2 table represents child part hierarchy contrast tree structures usually found computer software algorithms model children point parents shown employee may possess several pieces computer equipment individual piece computer equipment may one employee owner consider following structure child type parent hierarchy stating empno 10 boss 20 30 40 report 20 represented reportsto column relational database terms reportsto column foreign key referencing empno column child data type different would different table would still foreign key referencing empno column employees table simple model commonly known adjacency list model introduced dr. edgar f. codd initial criticisms surfaced relational model could model hierarchical data however model special case general adjacency list graph
Databases
wbadmin computing codice_1 command-line utility built windows vista windows server 2008 windows 7 windows server 2008 r2 windows 8 windows server 2012 windows 10 operating systems command used perform backups restores operating systems drive volumes computer files folders applications command-line interface codice_1 disk-based backup system create bare metal backup used restore windows operating system similar dissimilar hardware backup file created primarily form microsoft virtual hard disk .vhd files accompanying .xml configuration files backup .vhd file mounted windows disk manager view content however .vhd backup file direct disk clone utility replaces previous microsoft windows backup command-line tool ntbackup came built-into windows nt 4.0 windows 2000 windows xp windows server 2003 command-line version backup restore codice_1 also graphical user interface gui option available simplify creation computer backup restore workstation editions windows 7 use backup wizard located control panel server version done easily installed windows feature using windows management console wbadmin.msc wbadmin management console simplifies restoration whether single file multiple folders using command-line graphical user interface codice_1 creates backup quickly restored using windows media install dvd backup files located removable usb disk without need re-install scratch codice_1 uses differencing engine update backup files original backup file created volume shadow copy service updates changes subsequent full backups take matter moments rather many minutes taken create original backup file automatic backups scheduled regular basis using wizard two kinds restore operations supported
Computer security
stuart langridge stuart langridge also known 'aq 'zippy podcaster developer author member web standards project dom scripting task force invited expert w3c html working group acknowledged commentator dom scripting javascript techniques langridge best known presenter defunct lugradio free software podcast uk along jono bacon longest-serving member team often served incite discussion issues directly related software freedom lugradio frequently advocated freedom yet despite often attracted criticism using proprietary software langridge involved shot jaq podcast collaboration former lugradio co-host jono bacon part bad voltage podcast together jono bacon jeremy garcia founder linuxquestions.org bryan lunduke founder jupiter broadcasting also founder member bad voltage podcast since moved due commitments podcast first aired october 2013 current projects include jokosher multi-track audio editor gnome jackfield program run mac os x dashboard widgets gnome january 2009 langridge joined canonical developer left company 2013 work freelancer kryogenix consulting canonical worked desktop couch ubuntu role canonical ltd. staffer langridge written two books technical publisher sitepoint dhtml utopia run web server using linux apache tony steidler-dennison well writing stylish scripting weblog 2005
Operating systems
tscript tscript object-oriented embeddable scripting language c++ supports hierarchical transient typed variables tvariable main design criterion create scripting language interface c++ transforming data returning result enables c++ applications change functionality installation basic hello world tscript example standard variable formed fixed data boolean integer decimal variable length variable ascii string wide character string binary string type data used define variable type explicitly declared example code create variable called myinteger assign value zero integer type also declared default value set zero tvariable hierarchical nature similar xml javascript php variables tvariable type also transient integer changed astring assigning string value casting variable astring example integer variable created used reassigned equating astring tvariables also used hold array tvariables valid variable created array index subscripting notation used transform array example code create array four elements tvariable type list.type structure element integer class tscript similar array tvariable handle use strings array scriptures example code create structured variable list monday true list.tuesday false native c++ code structured tvariable elements accessible c++ either native code supporting hierarchical variables tscript able store primitive complex variables within variable structure removes requirement unique difference primitives structured data therefore making class structure logical grouping functionality rather data storage type tscript implements concepts inheritance code encapsulation defined variables example following code snippet show defined variables supports constructor another striking feature tscript function declarations use output parameters rather return values provide syntactic support standard function many procedural languages following algol form tscript pattern changed form change done two things first allows multiple output variables secondly changed return statement error handling function allowing functions list input output variables separated semi column changed normal flow function called used removes need using reference pointers return multiple variables common c/c++ use references scripting languages actually prevented forcing use structure array return multiple values second noticeable thing calling conventions functions integrated error handling purpose similar c++ java tscript since functions return error return statement operates similar throw statement example statement return error error message terminate function return error message alternatively blank statement return terminate function return error convenience tscript offers shorthand function calling situation one returned variable notation substitute case short notation prevents calling code catching errors automatically return parental calling code error handling many languages done use exceptions tscript uses similar process error handling although slightly different tscript global error variable similar traditional errno c although error variable tscript capable holding error code detailed error message many languages use syntax error returned via catch statement make operational flow code awkward situations errors recoverable tscript uses notation allows calling code filter error potentially recovering error returning normal operation returning error calling function c++ supports function overloading enables functions name differentiated input parameters causes tscript issue supporting loose type variables way tell type variable software executed counter problem tscript written run-time linking particular function called dependent type variables function called unusual tactic additional benefits first means need declare functions used example c++ two functions may call one another like situation needs prototyped order call tscript run-time linking means functions declared order without need prototype make writing code much easier less experienced programmers allowing focus logic software requirements language run-time linking also enables language support run-time coding methods like enables tscript programs write example using soap interface remote wsdl encoded script library allowing functions within called coded design time additionally also possible write code learn writing new functions needs tscript among small group scripting languages provide functionality dynamically load link existing shared libraries java jni vb6 two scripting languages enable code written would load third party library execute native interface gives tscript ability use wealth pre-existing functionality code written different languages done without need change shared library ’ interface compiled source code tscript uses standard c++ class encapsulation allocate de-allocate memory resources means allocated memory released variable containing destroyed operated differently garbage collection model java reference counting model .net languages operation system resources files sockets encryption keys managed via reference counting mechanism similar .net released soon variables containing values ability load existing shared libraries script access privileges granted user executes guard malicious code resources beyond basic memory allocation required granted script also includes ability use message boxes prompt user read and/or write access file directory using internet connection security architecture designed allow running scripts similar way javascript enabling usefulness powerful scripting languages like perl
Programming language topics
chaser company chaser cloud-based credit control software founded ceo david tuck former finance director wayn idio financial controller fever-tree ltd 2015 future 50 named chaser one britain disruptive businesses well awarding friend business award 2016 chaser named xero add-on partner year
Distributed computing architecture
space manbow space manbow shoot 'em video game developed published konami msx2 msx2+ home computers 1989 later re-released mobile phones september 1 2006 nintendo wii virtual console service november 24 2009 february 19 2014 wii u july 28 2015 windows store project egg never released outside japan game player pilots starship shaped like mambo fish two weapon types available throughout game powered standard pickups weapons gradually lose power unless player makes additional pickups however ship helped two stationary options similar found gradius series options able shift alternatively fire three directions forward backward towards top/bottom screen
Computer architecture
zynos zynos proprietary operating system used network devices made zyxel communications name contraction zyxel network operating system nos zyxel first introduced zynos 1998 zyxel released zynos version 4.0 gs2200 series 24 48 port ethernet switches april 2012 appears versions differ zyxel products web and/or command line interface cli depending device web access accomplished connecting ethernet cable pc open port device entering ip address device web browser rs-232 serial console port provided devices cli access accomplished using ssh telnet listed categories cli commands grouped web configurator divided following categories january 2014 zynos rom-0 vulnerability identified vulnerability allowed attacker download router configuration rom-0 file without type authentication required configuration file later decompressed expose router administrator password isp password wireless password etc danish computer security company secunia reports unpatched advisories vulnerabilities zynos version 4.x secunia reports seven advisories six vulnerabilities zynos version 3.x five advisories unpatched secunia rates severe unpatched advisory less critical dns vulnerability found certain zynos firmware versions versions affected narrowed attack done remote location regardless user interface accessible outside lan
Operating systems
winnuke computer security winnuke example nuke remote denial-of-service attack dos affected microsoft windows 95 microsoft windows nt microsoft windows 3.1x computer operating systems exploit sent string out-of-band data oob data target computer tcp port 139 netbios causing lock display blue screen death damage change data computer hard disk unsaved data would lost so-called oob simply means malicious tcp packet contained urgent pointer urg urgent pointer rarely used field tcp header used indicate data tcp stream processed quickly recipient affected operating systems handle urgent pointer field correctly person screen-name _eci published c source code exploit may 9 1997 source code widely used distributed microsoft forced create security patches released weeks later time numerous flavors exploit appeared going names fedup gimp killme killwin knewkem liquidnuke mnuke netnuke muerte nuke nukeattack nuker102 pnewq project1 pstlince simportnuke sprite sprite32 vconnect vzmnuker wingenocide winnukeit winnuker02 winnukev95 wnuke3269 wnuke4 wnuke95 company called semisoft solutions new zealand created small program called antinuke blocks winnuke without install official patch years later second incarnation winnuke uses another similar exploit found
Computer security
abstraction layer computing abstraction layer abstraction level way hiding working details subsystem allowing separation concerns facilitate interoperability platform independence examples software models use layers abstraction include osi model network protocols opengl graphics libraries computer science abstraction layer generalization conceptual model algorithm away specific implementation generalizations arise broad similarities best encapsulated models express similarities present various specific implementations simplification provided good abstraction layer allows easy reuse distilling useful concept design pattern situations may accurately applied quickly recognized layer considered top another depends every layer exist without layers requires layers function frequently abstraction layers composed hierarchy abstraction levels osi model comprises seven abstraction layers layer model encapsulates addresses different part needs digital communications thereby reducing complexity associated engineering solutions famous aphorism david wheeler problems computer science solved another level indirection often deliberately misquoted abstraction substituted indirection also sometimes misattributed butler lampson kevlin henney corollary ... except problem many layers indirection computer architecture computer system usually represented consisting several abstraction levels programmable logic often considered part hardware logical definitions also sometimes seen part device software firmware firmware may include low-level software also include software including operating system applications software layers divided hardware abstraction layers physical logical device drivers repositories filesystems operating system kernels middleware applications others distinction also made low-level programming languages like vhdl machine language assembly language compiled language interpreter script language unix operating system types input output operations considered streams bytes read device written device stream bytes model used file i/o socket i/o terminal i/o order provide device independence order read write device application level program calls function open device may real device terminal virtual device network port file file system device physical characteristics mediated operating system turn presents abstract interface allows programmer read write bytes from/to device operating system performs actual transformation needed read write stream bytes device graphics libraries opengl provide abstract graphical device model interface library responsible translating commands provided programmer specific device commands needed draw graphical elements objects specific device commands plotter different device commands crt monitor graphics library hides implementation device dependent details providing abstract interface provides set primitives generally useful drawing graphical objects
Computer architecture
b.c ii grog revenge b.c ii grog revenge 1984 video game sierra on-line commodore 64 colecovision msx sequel b.c quest tires based b.c newspaper comic strip johnny hart player controls thor caveman rides stone unicycle thor searching meaning life within several mountains player must navigate mountains collecting clams like comic strip used money case pay toll another caveman peter access next mountain two modes play first along mountainside user move four directions must avoid falling cliff slamming wall hitting rock hole encountering creature grog yell grog knock player mountain also green dinosaur eat player tire contact player may enter caves enter second mode caves dark except beam light emanating player clams must collected without running stalagmites end mountain bridge new mountain player enough clams game continues otherwise necessary return find clams zzap 64 gave game 91 rating describing stunningly impressive programme
Computer architecture
b.c quest tires b.c quest tires home video game designed rick banks michael bate published sierra on-line 1983 versions released commodore 64 atari 8-bit family colecovision zx spectrum msx apple ii based comic strip b.c johnny hart bc quest tires scrolling game similar irem moon patrol previous year title play title contemporaneous film quest fire sequel released 1984 player takes role caveman thor rescue girlfriend cute chick kidnapped dinosaur must travel stone unicycle actually impossible wheel several levels level thor moving left right avoiding various dangers b.c quest tires action game taking place several consecutive levels levels start simple thor jump potholes duck tree branches later levels become complex example requiring thor jump turtles order cross lake carried lava pit dooky bird b.c characters fat broad also appear levels softline stated given conventional gameplay get-from-point-a-to-point-b kind game use familiar comic characters made player feel like finishing game worthwhile ... otherwise magazine concluded b.c quest tires n't much computer game interactive cartoon cartoon limits provide challenge antic approved game another 'shoot aliens save world scenario first rate animation predicted players would enjoy game day two relegate shelf compute praised game excellent graphics animation approach cartoon standards
Computer architecture
failure detector distributed computing system failure detector computer application subsystem responsible detection node failures crashes failure detectors first introduced 1996 chandra toueg book unreliable failure detectors reliable distributed systems book depicts failure detector tool improve consensus achievement reliability atomic broadcast sequence messages distributed system word failure detectors seek errors process system maintain level reliability practice failure detectors spot crashes system ban processes making mistakes prevent serious crashes errors 21st century failure detectors widely used distributed computing systems detect application errors software application stops functioning properly distributed computing projects see list distributed computing projects become popular usage failure detects also becomes important critical chandra toueg co-authors book unreliable failure detectors reliable distributed system 1996 approached concept detecting failure nodes introducing unreliable failure detector describe behavior unreliable failure detector distributed computing system process system entered local failure detector component local component examine portion processes within system addition process must also contain programs currently suspected failure detectors chandra toueg claimed unreliable failure detector still reliable detecting errors made system generalize unreliable failure detectors forms failure detectors unreliable failure detectors failure detectors share properties furthermore chandra toueg point important fact failure detector prevent crashes system even crashed program suspected previously construction failure detector essential difficult problem occurred development fault-tolerant component distributed computer system result failure detector invented need detecting errors massive information transaction distributed computing systems classes failure detectors distinguished two important properties completeness accuracy completeness means failure detectors would find programs finally crashed process whereas accuracy means correct decisions failure detectors made process degrees completeness depend number crashed process suspected failure detector certain period degrees accuracy depend number mistakes failure detector made certain period failure detectors categorized following eight types properties failure detectors described nutshell properties failure detectors depend fast failure detector detects actual failures well avoids false detection perfect failure detector find errors without mistakes whereas weak failure detector find errors make numerous mistakes different types failure detectors obtained changing properties failure detectors first examples show increase completeness failure detector second example shows change one type failure detector another following example abstracted department computer science yale university functions boosting completeness failure detector initially suspects ∅ forever upon receiving p process q example p crashes weak-detector eventually suspect failure detectors system eventually suspect p infinite loop created failure detectors example also shows weak completeness failure detector also suspect crashes eventually inspection crashed programs depend completeness following correctness arguments satisfy algorithm changing failure detector w failure detector failure detector w weak completeness failure detector strong completeness weak accuracy arguments satisfied reduction weak failure detector w strong failure detector agree algorithm within distributed computing system
Computer architecture
fahrenheit 451 video game fahrenheit 451 computer strategy game released 1984 based novel name ray bradbury originally released software company trillium re-released 1985 company ’ new name telarium player goal help guy montag main character novel evade authorities make contact underground movement bradbury contributed game writing prologue responses game intelligent computer ray plot text game written len neufeld known previous authorship books interplanetary spy interactive novel series working aegis byron preiss visual publications game released apple ii atari st commodore 64 ms-dos macintosh msx tandy computers ending fahrenheit 451 former fireman guy montag fugitive wanted murder killing supervisor stealing contraband books game takes place five years later pointless war swept across country leading martial law firemen agent literary underground montag makes way new york mission break heavily guarded new york library 42nd street books burned contents transferred microcassette microcassettes need retrieved uploaded underground information network along way discovers clarisse young woman inspired rebellion still alive challenges player involve finding ways alter one appearance fingerprints chemindex body chemistry order evade detection issues arise finding food eat safe places rest player must also make contact members underground hiding city use lighter literary quotations end montag able break central library meet clarisse microcassettes found transmitted information network resistance cells world montag clarisse achieve victory saving extensive collection literature costs lives firemen storm office last cassette transmitted immolating 1980s reviewer praised gripping prose unique approach obtaining using literary quotations german reviewers maintained complexity plot nice graphics large number scenes non-fictional characters 1993 german study history interactive fiction recognized fahrenheit 451 highly complex interactive computer fairy tale hochkomplexes interaktives computermärchen adventure play classic literature quotations time game narrator player gleichsam literaturliteratur ein spiel mit klassikern und zugleich mit dem erzähler dem spieler selbst
Computer architecture
computable document format computable document format cdf electronic document format designed allow easy authoring dynamically generated interactive content cdf published public format created wolfram research computable document format supports gui elements sliders menus buttons content updated using embedded computation response gui interaction contents include formatted text tables images sounds animations cdf supports mathematica typesetting technical notation paginated layout structured drill layout slideshow mode supported styles controlled using cascading style sheet cdf files read using proprietary cdf player restrictive license downloaded free charge wolfram research cdf files created using mathematica online authoring tools available wolfram cloud computable document format used electronic books pearson education specifically mymathlab provide content wolfram demonstrations project add client-side interactivity wolfram alpha
Programming language topics
cabbage patch kids adventures park cabbage patch kids adventures park 1984 action/platform game based cabbage patch kids franchise first game cabbage patch kids adventures series mobygames described gameplay thus player cabbage patch kid pigtails day park day includes jumping onto vines leaping holes bouncing onto correct platforms misplaced jump lose life additionally creatures bees end player turn touched several screens challenge different combinations obstacles atariprotos wrote according colecovision version manual anna lee decided go exercise local park soon caught wild adventure hence subtitle adventures park game separated several different screens referred game scenes different obstacle kid overcome obstacles include bouncing balls water filled pits floating platforms bees even fires level consists ten scenes must overcome time limit runs along way anna may also collect various objects hidden trees using well placed trampolines points objects necessary win wake video game crash 1983 game served coleco attempt use one properties way cabbage patch kids give boost-through-association one properties way colecovision unreleased atari 2600 version developed individeo seen light day thanks discovery alex handy flea market california 2008 game known exist time thanks interview conducted former coleco programmer ed english many years prior atariage wrote atari 2600 version luck would cabbage patch kids adventures park impressive game comparable quality many modern homebrew games atariprotos said may able compare graphically colecovision version atari 2600 version cpk amazing feat programming gameplay retained conversion even included cute little background tune rarity 2600 games appears cpk simply victim collapsing game market time final version ready september 1984 coleco stopped 2600 operations
Computer architecture
panama papers south america allegations reactions investigations panama papers 11.5 million leaked documents detail financial attorney–client information 214,488 offshore entities documents dating back 1970s created taken panamanian law firm corporate service provider mossack fonseca leaked 2015 anonymous source page details related allegations reactions investigations south america argentine president mauricio macri listed head trading company based bahamas disclose tenure mayor buenos aires clear whether disclosure non-equity directorships required argentine law april 7 2016 federal prosecutor federico delgado began formal investigation macri involvement fleg trading ltd. company registered panama president macri listed director judge sebastián casanello asked start file inquiry initial petition made neuquén representative darío martínez martínez claims macri could guilty perjury due omissions sworn statement martínez also referenced another offshore company kagemusha sa named akira kurosawa 1980 film established 1981 president macri also connections investigation news outlets el destape infoeconomico end april found however macri involved least eight holding companies least seven founded run friends relatives mossack fonseca active least one year old daniel muñoz private secretary confidant former argentinian president néstor kirchner later also served two years aide néstor kirchner wife cristina fernández de kirchner president argentina 2007 2015 muñoz wife linked gold black limited company incorporated british virgin islands 2010 invest us real estate origin company funds listed personal savings 2010 beginning 2015 company ownership bearer shares financial instrument used hide owner identity one directors sergio tadisco told icij partner canal trece figurehead said agreed name used 2011 friendship muñoz wife january 2015 muñoz wife became named shareholders owning 50 percent time mossack fonseca become registered agent gold black however three weeks later compliance department proposed resigning muñoz identified connection governments kirchners resignation became effective june 2015 2009 muñoz investigated illicit enrichment charge later dropped 2013 argentinian media reported muñoz helped transfer bags money belonging president néstor kirchner buenos aires argentine capital santa cruz kirchner home state charges relation matter dismissed july 2015 lack evidence may 25 2016 died cancer last four years family argentine barcelona football player lionel messi said would file complaint reports said mossack fonseca set company 2012 named mega star enterprises inc family denied messi involved called accusations slanderous said company referred panama papers inactive messi declared income image rights proceedings argentine tax agency messi alongside father jorge stood trial three counts tax evasion may 2016 spanish prosecutors say tried evade €4.1m taxes income image rights assigning front companies belize uruguay 6 july 2016 messi father found guilty tax fraud handed suspended 21-month prison sentences respectively ordered pay €1.7 million €1.4 million fines five billionaires brazil sons two brazilian billionaires four former billionaire brazilian families appear panama papers leak according forbes brazilian news website uol access leaked documents published article list like many panama paper reports story cautions people mentioned documents may nothing wrong general nothing illegal per se offshore company fact common international business set one transactions joint ventures 're business world said brazil-based marcello hallake brazil-based partner law firm jones day however six ten members congress face one criminal investigation another high-profile construction executives senator among 84 people arrested petrobras scandal number reflects job protections 1988 constitution judges prosecutors three men marcel herrmann telles carlos alberto sicupira jorge felipe lemann son long-time business partner jorge paulo lemann brazil richest man controlling shareholder anheuser-busch inbev set three offshore companies british virgin islands bahamas tied private equity firm 3g beer firm ambev unit anheuser-busch inbev according uol two companies longer active men longer tied third told uol companies publicly disclosed registered documents described lemann advisor brazilian firm sao carlos father father business partners controlling stake panama papers reveal former supreme court judge joaquim barbosa bought apartment downtown miami police raided são paulo offices mossack fonseca january 2016 seeking records offshore companies firm opened two former executives petróleo brasileiro s.a. petrobras convicted 2015 corruption money laundering police say companies used hide illegally diverted funds january 2016 even panama papers published brazilian federal police part corruption investigation known operation car wash already accused mossack fonseca law firm helping suspects create offshore entities hide corrupt money alleged firm used real estate company help hide criminal proceeds scheme involving petrobras leak complicated already volatile political situation brazil tanking economy led calls impeachment president dilma rousseff amid many revelations political corruption impeachment proceedings began became clear next two people order succession implicated petrobras scandal according estado de são paulo company belonging eduardo cunha speaker lower house legislature leader impeachment drive surfaced panama papers rousseff mentioned papers politicians seven different political parties brazil named clients mossack fonseca leaked files mention politicians brazil largest party pmdb broke away president dilma rousseff coalition 2016 political figures psdb prominent opposition party country also mentioned leaks well others pdt pp psb psd ptb parties politicians rousseff party mentioned leaks group dutch journalists daily newspaper trouw found evidence panama papers showing tv globo cited many times money laundering investigation de nederlandsche bank revealed years media outlet conducted irregular financial transactions tax havens order pay broadcast rights copa libertadores head chilean branch transparency international campaigns corporate secrecy resigned name linked five firms tax havens leaked documents national directorate taxes customs launched investigation 850 clients mossack fonseca colombia subsidiary mossack fonseca established 2009 2014 colombia placed panama onto blacklist tax havens leaked documents also led panama move forward ongoing negotiations colombia tax information-sharing ecuadorian journalists published names three current government officials panama papers also reveal 2012 panamanian government believed mossack fonseca company anti-corruption prosecutor investigating embezzlement orlion s.a. sold president rafael correa delgado brother fabricio correa 2006 mossack fonseca asked shareholder information contacted legalsa asociados law firm guayaquil ecuador set offshore client shortly afterwards firm dropped offshore due lack information correa cousin pedro delgado campana convicted absentia ecuador embezzlement bought home north miami beach mossack fonseca company wife consul ecuador miami time arturo torres investigative editor el comercio told knight center newspaper published two stories connected panama papers rest six journalists ecuador report received summonses subpoenas little-known anticorruption agency council citizen participation social control cpccs demanding documents scheduled hearing postponed due earthquake april 16 national assembly commission justice also opened investigation mónica almeida el universo said government taken coverage panama papers attack stories ecuadorian media mentioned attorney general galo chiriboga pedro delgado campaña former president central bank ecuador correa cousin javier molina former adviser ministry intelligence one founders mossack fonseca quito two supporters leading candidate keiko fujimori undeclared interests mossack fonseca companies according icij partner ojopúblico said well three renowned chefs peru largest timber company also implicated mario vargas llosa also spanish nationality wife bought offshore company buffer mossack fonseca couple appears linked september 1 2010 october 6 year shortly vargas llosa nobel prize literature appearing linked denied using tax havens five people arrested april 22 suspicion laundering funds mexican drug cartel uruguayan investigation underway authorities decided move reports icij partner weekly búsqueda gerardo gonzález valencia used mossack fonseca companies buy real estate uruguay head los cuinos cartel brother abigael gonzález valencia imprisoned mexico united states designated drug kingpin well brother-in-law nemesio oseguera cervantes leads jalisco new generation cartel cjng many boliburguesía individuals became wealthy hugo chávez nicolás maduro administrations included scandal josmel velásquez brother security official late hugo chávez arrested april 15 trying catch flight country due offshore company revealed panama papers mother amelis figueroa also arrested allowed return home due health venezuelan news site armando.info reported josmel brother adrian former aide late president hugo chávez opened shell company though mossack fonseca republic seychelles 50,000 deposit report based documents leaked panamanian law firm mossack fonseca velásquez indicted april 20 franklin durán notorious venezuela argentina part el maletinazo suitcase scandal involving alleged illicit contribution venezuelan president hugo chavez christina fernandez de kirchner 800,000 venezuelan state-run oil company pdvsa able open shell company jail cell united states serving sentence operating unregistered foreign agent
Computer security
code access security code access security cas microsoft .net framework microsoft solution prevent untrusted code performing privileged actions clr loads assembly obtain evidence assembly use identify code group assembly belongs code group contains permission set one permissions code performs privileged action perform code access demand cause clr walk call stack examine permission set granted assembly method call stack code groups permission sets determined administrator machine defines security policy evidence information associated assembly default evidences used .net code access security developer use custom evidence so-called assembly evidence requires writing security assembly version 1.1 .net facility work evidence based hash assembly easily obtained code example c evidence may obtained following code clause this.gettype .assembly.evidence policy set expressions uses evidence determine code group membership code group gives permission set assemblies within group four policies .net first three policies stored xml files administered .net configuration tool 1.1 mscorcfg.msc final policy administered code current application domain code access security present assembly evidence policy take intersection permissions common generated permission set permissions granted assembly default enterprise user appdomain policies give full trust allow assemblies permissions machine policy restrictive since intersection taken means final permission set determined machine policy note policy system eliminated .net framework 4.0 code groups associate piece evidence named permission set administrator uses .net configuration tool specify particular type evidence example site particular value evidence example www.mysite.com identifies permission set code group granted code performs privileged action make demand one permissions demand makes clr walk call stack method clr ensure demanded permissions method assembly granted permissions permission granted security exception thrown prevents downloaded code performing privileged actions example assembly downloaded untrusted site assembly file io permissions assembly attempts access file code access security throw exception preventing call
Operating systems
list unix systems version unix time-sharing system evolved version version one evolving prototypal unix variants descendants displayed release version 10 unix research team bell labs turned focus plan 9 bell labs distinct operating system first released public 1993 systems list evolved version unix system iii evolving unix time-sharing system v7 descendants unix time-sharing system v6
Operating systems
gnome disks gnome disks graphical front-end udisks included gnome-disk-utility package used partition management s.m.a.r.t monitoring benchmarking software raid v. 3.12 introduction included gnome documentation project disks used known gnome disk utility palimpsest disk utility udisks named devicekit-disks earlier releases devicekit-disks part devicekit planned replace certain aspects hal hal devicekit deprecated gnome disks included default several linux distributions including debian ubuntu linux mint trisquel fedora red hat enterprise linux 6 centos
Computer file systems
comparison pascal delphi devised niklaus wirth late 1960s early 1970s pascal programming language originally produced borland software corporation embarcadero delphi composed ide set standard libraries pascal-based language commonly called either object pascal delphi pascal simply 'delphi embarcadero current documentation refers 'the delphi language object pascal since first released become popular commercial pascal implementation developing pascal wirth employed bootstrapping procedure newer version pascal compiler written compiled predecessor thus 'p2 compiler written dialect compilable 'p1 'p3 turn written 'p2 way till 'p5 'p5 compiler implemented pascal final state defined wirth subsequently became standardised 'iso 7185 pascal borland dialect like popular ucsd pascal took 'p4 version language basis rather wirth final revision much evolution independent standard pascal borland variant became basis delphi page goes differences delphi standard pascal go delphi-specific extensions language numerous still increasing 1 way procedures functions passed parameters differs delphi requires explicit procedural types declared standard pascal 2 delphi support called 'extraprocedural gotos goto statements may reference targets outside current procedure/function body 3 standard pascal file 'buffer variables together 'get 'put standard procedures operate neither supported delphi 4 given variant record standard pascal size particular variant specified delphi support form 'sized dynamic variable allocation 5 functions 'pack 'unpack implemented delphi 6 delphi compiler treat synonyms like standard pascal requires words valid delphi instead delphi uses scheme allowing different comment types indicate nested comments 7 delphi replace eoln space pascal standard requires reading end line eoln character supposed replaced space iso 7185 instead reading eoln delphi gives character code carriage return 13 followed line feed 10 8 numbers booleans printed 'default field widths delphi version write writeln standard procedures instead printed minimum amount space example delphi equivalent however standard pascal requires equivalent following totalwidth implementation-defined similarly booleans equivalent delphi iso 7185 9 temporary files supported delphi using traditional pascal i/o executing reset rewrite results error standard pascal opens temporary file exists duration program automatically deleted 10 notwithstanding fact delphi still allows using much traditional pascal rtl delphi-specific library functionality generally implemented ordinary delphi code uses rather adds compiler-provided intrinsics philosophy contrasts standard pascal whose rtl must provided compiler example standard pascal 'file type intrinsic type sort like record another compiler-defined type alongside records contrast tfilestream class delphi ordinary delphi class written ordinary delphi code similarly read readln write writeln standard procedures signatures legal pascal signatures delphi still implements vary rarely delphi-specific rtl routines require similarly special handling rather language evolved include features 'open arrays default parameters procedural overloading used user-written routines
Programming language topics
coprocessor coprocessor computer processor used supplement functions primary processor cpu operations performed coprocessor may floating point arithmetic graphics signal processing string processing cryptography i/o interfacing peripheral devices offloading processor-intensive tasks main processor coprocessors accelerate system performance coprocessors allow line computers customized customers need extra performance need pay coprocessors vary degree autonomy fpus rely direct control via coprocessor instructions embedded cpu instruction stream others independent processors right capable working asynchronously still optimized general-purpose code incapable due limited instruction set focused accelerating specific tasks common driven direct memory access dma host processor building command list playstation 2 emotion engine contained unusual dsp-like simd vector unit capable modes operation make best use mainframe computer processor time input/output tasks delegated separate systems called channel i/o mainframe would require i/o processing instead would set parameters input output operation signal channel processor carry whole operation dedicating relatively simple sub-processors handle time-consuming i/o formatting processing overall system performance improved coprocessors floating-point arithmetic first appeared desktop computers 1970s became common throughout 1980s early 1990s early 8-bit 16-bit processors used software carry floating-point arithmetic operations coprocessor supported floating-point calculations could carried many times faster math coprocessors popular purchases users computer-aided design cad software scientific engineering calculations floating-point units amd 9511 intel 8231/8232 weitek fpus treated peripheral devices others intel 8087 motorola 68881 national 32081 closely integrated cpu another form coprocessor video display coprocessor used atari 8-bit family texas instruments ti-99/4a msx home-computers called video display controllers commodore amiga custom chipset included unit known copper well blitter accelerating bitmap manipulation memory microprocessors developed cost integrating floating point arithmetic functions processor declined high processor speeds also made closely integrated coprocessor difficult implement separately packaged mathematics coprocessors uncommon desktop computers demand dedicated graphics coprocessor grown however particularly due increasing demand realistic 3d graphics computer games original ibm pc included socket intel 8087 floating-point coprocessor aka fpu popular option people using pc computer-aided design mathematics-intensive calculations architecture coprocessor speeds floating-point arithmetic order fiftyfold users used pc word processing example saved high cost coprocessor would accelerated performance text manipulation operations 8087 tightly integrated 8086/8088 responded floating-point machine code operation codes inserted 8088 instruction stream 8088 processor without 8087 could interpret instructions requiring separate versions programs fpu non-fpu systems least test run time detect fpu select appropriate mathematical library functions another coprocessor 8086/8088 central processor 8089 input/output coprocessor used programming technique 8087 input/output operations transfer data memory peripheral device reducing load cpu ibm n't use ibm pc design intel stopped development type coprocessor intel 80386 microprocessor used optional math coprocessor 80387 perform floating point operations directly hardware intel 80486dx processor included floating-point hardware chip intel released cost-reduced processor 80486sx floating point hardware also sold 80487sx coprocessor essentially disabled main processor installed since 80487sx complete 80486dx different set pin connections intel processors later 80486 integrated floating-point hardware main processor chip advances integration eliminated cost advantage selling floating point processor optional element would difficult adapt circuit-board techniques adequate 75 mhz processor speed meet time-delay power consumption radio-frequency interference standards required gigahertz-range clock speeds on-chip floating point processors still referred coprocessors operate parallel main cpu era 8- 16-bit desktop computers another common source floating-point coprocessors weitek coprocessors different instruction set intel coprocessors used different socket motherboards supported weitek processors provide transcendental mathematics functions example trigonometric functions like intel x87 family required specific software libraries support functions motorola 68000 family 68881/68882 coprocessors provided similar floating-point speed acceleration intel processors computers using 68000 family equipped hardware floating point processor could trap emulate floating-point instructions software although slower allowed one binary version program distributed cases 68451 memory-management coprocessor designed work 68020 processor dedicated graphics processing units gpus form graphics cards commonplace certain models sound cards fitted dedicated processors providing digital multichannel mixing real-time dsp effects early 1990 1994 gravis ultrasound sound blaster awe32 typical examples sound blaster audigy sound blaster x-fi recent examples 2006 ageia announced add-in card computers called physx ppu physx designed perform complex physics computations cpu gpu perform time consuming calculations designed video games although mathematical uses could theoretically developed 2008 nvidia purchased company phased physx card line functionality added software allowing gpus render physx cores normally used graphics processing using nvidia physx engine software 2006 bigfoot systems unveiled pci add-in card christened killernic ran special linux kernel freescale powerquicc running 400 mhz calling freescale chip network processing unit npu spursengine media-oriented add-in card coprocessor based cell microarchitecture spus vector coprocessors 2008 khronos group released opencl aim support general-purpose cpus ati/amd nvidia gpus accelerators single common language compute kernels 2010s mobile computation devices implemented sensor hub coprocessor examples coprocessors used handling sensor integration mobile devices include apple m7 m8 motion coprocessors qualcomm snapdragon sensor core qualcomm hexagon holographic processing unit microsoft hololens 2012 intel announced intel xeon phi coprocessor various companies developing coprocessors aimed accelerating artificial neural networks vision cognitive tasks e.g vision processing units truenorth zeroth 2018 ai chips smartphones apple several android phone vendors time cpus tended grow absorb functionality popular coprocessors fpus considered integral part processors main pipeline simd units gave multimedia acceleration taking role various dsp accelerator cards even gpus become integrated cpu dies nonetheless specialized units remain popular away desktop machines additional power allow continued evolution independently main processor product lines
Computer architecture
f2fs f2fs flash-friendly file system flash file system initially developed samsung electronics linux kernel motive f2fs build file system start takes account characteristics nand flash memory-based storage devices solid-state disks emmc sd cards widely used computer systems ranging mobile devices servers f2fs designed basis log-structured file system approach adapted newer forms storage jaegeuk kim principal f2fs author stated remedies known issues older log-structured file systems snowball effect wandering trees high cleaning overhead addition since nand-based storage device shows different characteristics according internal geometry flash memory management scheme flash translation layer ftl supports various parameters configuring on-disk layout also selecting allocation cleaning algorithms f2fs divides whole volume number segments fixed 2 mb section composed consecutive segments zone consists set sections default section zone sizes set size users easily modify size codice_1 f2fs splits entire volume six areas except superblock area consist multiple segments described order avoid misalignment file system flash storage f2fs aligns start block address cp segment size also aligns main area start block address zone size reserving segments ssa area f2fs uses checkpoint scheme maintain file system integrity mount time f2fs first tries find last valid checkpoint data scanning cp area order reduce scanning time f2fs uses two copies cp one always indicates last valid data called shadow copy mechanism addition cp nat sit also use shadow copy mechanism file system consistency cp points nat sit copies valid key data structure node similar traditional file structures f2fs three types nodes inode direct node indirect node f2fs assigns 4 kb inode block contains 923 data block indices two direct node pointers two indirect node pointers one double indirect node pointer described direct node block contains 1018 data block indices indirect node block contains 1018 node block indices thus one inode block i.e. file covers note node blocks mapped nat means location node translated nat mitigate wandering tree problem f2fs able cut propagation node updates caused leaf data writes directory entry dentry occupies 11 bytes consists following attributes dentry block consists 214 dentry slots file names bitmap used represent whether dentry valid dentry block occupies 4 kb following composition f2fs implements multi-level hash tables directory structure level hash table dedicated number hash buckets shown note 2b means bucket includes 2 data blocks f2fs finds file name directory first hash value file name calculated f2fs scans hash table level 0 find dentry consisting file name inode number found f2fs scans next hash table level 1 way f2fs scans hash tables level incrementally 1 n level f2fs needs scan one bucket determined following equation shows log files complexity case file creation f2fs finds empty consecutive slots cover file name f2fs searches empty slots hash tables whole levels 1 n way lookup operation runtime f2fs manages six active logs inside main area hot/warm/cold node hot/warm/cold data lfs two schemes free space management threaded log copy-and-compaction copy-and-compaction scheme known cleaning well-suited devices showing good sequential write performance since free segments served time writing new data however suffers cleaning overhead high utilization conversely threaded log scheme suffers random writes cleaning process needed f2fs adopts hybrid scheme copy-and-compaction scheme adopted default policy dynamically changed threaded log scheme according file system status order align f2fs underlying flash-based storage f2fs allocates segment unit section f2fs expects section size garbage collection unit size ftl respect mapping granularity ftl f2fs allocates section active logs many different zones possible ftl write active log data one allocation unit according mapping granularity f2fs cleaning demand background on-demand cleaning triggered enough free segments serve vfs calls background cleaner executed kernel thread triggers cleaning job system idle f2fs supports two victim selection policies greedy cost-benefit algorithms greedy algorithm f2fs selects victim segment smallest number valid blocks cost-benefit algorithm f2fs selects victim segment according segment age number valid blocks order address log block thrashing problem present greedy algorithm f2fs uses greedy algorithm on-demand cleaning background cleaner uses cost-benefit algorithm order identify whether data victim segment valid f2fs manages bitmap bit represents validity block bitmap composed bit stream covering whole blocks main area motorola mobility used f2fs moto g/e/x droid phones since 2012 google first used f2fs nexus 9 2014 however google products n't adopt f2fs pixel 3 f2fs updated inline crypto hardware support huawei used f2fs since huawei p9 2016 oneplus used f2fs since oneplus 3t 2016 zte used f2fs since zte axon 10 pro 2019
Computer file systems
connection string computing connection string string specifies information data source means connecting passed code underlying driver provider order initiate connection whilst commonly used database connection data source could also spreadsheet text file connection string may include attributes name driver server database well security information user name password example shows postgres connection string connecting wikipedia.com ssl connection timeout 180 seconds driver= postgresql unicode server=www.wikipedia.com ssl=true sslmode=require database=wiki uid=wikiuser connect timeout=180 pwd=ashiknoor users oracle databases specify connection strings
Databases
range query database range query common database operation retrieves records value upper lower boundary example list employees 3 5 years experience range queries unusual generally known advance many entries range query return return many queries top ten senior employees newest employee done efficiently upper bound number results return query returns exactly one result sometimes called singleton match least one requested keys
Databases
open architecture open architecture type computer architecture software architecture intended make adding upgrading swapping components easy example ibm pc amiga 500 apple iie open architecture supporting plug-in cards whereas apple iic computer closed architecture open architecture systems may use standardized system bus s-100 pci isa may incorporate proprietary bus standard used apple ii dozen slots allow multiple hardware manufacturers produce add-ons user freely install contrast closed architectures expandable one two expansion ports using proprietary connector design may require license fee manufacturer enhancements may installable technicians specialized tools training computer platforms may include systems open closed architectures mac mini compact macintosh closed macintosh ii power macintosh g5 open desktop pcs open architecture nettops typically closed similarly open software architecture one additional software modules added basic framework provided architecture open apis application programming interfaces major software products way basic functionality products modified extended google apis examples second type open software architecture consists messages flow computer systems messages standard structure modified extended per agreements computer systems example ibm distributed data management architecture open architecture allows potential users see inside parts architecture without proprietary constraints typically open architecture publishes parts architecture developer integrator wants share open business processes involved open architecture may require license agreements entities sharing architecture information open architectures successfully implemented many diverse fields including us navy
Computer architecture
kathleen booth kathleen booth born 1922 wrote first assembly language designed assembler autocode first computer systems birkbeck college university london helped design three different machines including arc automatic relay calculator sec simple electronic computer ape x c. kathleen britten born stourbridge worcestershire england obtained bsc mathematics university london 1944 went get phd applied mathematics 1950 married colleague andrew donald booth 1950 two children kathleen booth worked birkbeck college 1946–62 travelled united states andrew booth research assistant 1947 visiting john von neumann princeton upon returning uk co-authored general considerations design purpose electronic digital computer describing modifications original arc redesign arc2 using von neumann architecture part contribution arc assembly language also built maintained arc components kathleen andrew booth team birkbeck considered smallest early british computer groups 1947 1953 produced three machines arc automatic relay computer sec simple electronic computer ape x c all-purpose electronic rayon computer mr. booth worked team built computers programmed considered remarkable achievement due size group limited funds disposal although ape x c eventually led hec series manufactured british tabulating machine company small scale birkbeck group place front rank british computer activity booth regularly published papers concerning work arc ape x c systems co-wrote automatic digital calculators 1953 illustrated 'planning coding programming style co-founded school computer science information systems 1957 birkbeck college along andrew booth j.c. jennings 1958 taught programming course 1958 booth wrote one first books describing program ape x c computers 1944 1946 junior scientific officer royal aircraft establishment farnborough 1946 1962 booth research scientist british rubber producer research association ten years 1952 1962 research fellow lecturer birbeck college university london later became research fellow lecturer associate professor university saskatchewan canada 1962 1972 lakehead university canada became professor mathematics 1972 1978 booth research neural networks led successful programs simulating ways animals recognise patterns characters husband resigned suddenly birkbeck college 1961 chair conferred husband despite massive contributions i.c.t type 1400 computer donated department numerical automation fact installed london school hygiene tropical medicine
Programming language topics
volunteer computing volunteer computing type distributed computing arrangement people so-called volunteers provide computing resources projects use resources distributed computing and/or storage thus computer owners users donate computing resources processing power storage one projects volunteers frequently members general public possession personal computers internet connection also organizations act volunteers provide computing resources projects context mostly science-related projects executed universities academia general first volunteer computing project great internet mersenne prime search started january 1996 followed 1997 distributed.net 1997 1998 several academic research projects developed java-based systems volunteer computing examples include bayanihan popcorn superweb charlotte term volunteer computing coined luis f. g. sarmenta developer bayanihan also appealing global efforts social responsibility corporate social responsibility reported harvard business review used responsible forum 1999 seti home folding home projects launched projects received considerable media coverage one attracted several hundred thousand volunteers 1998 2002 several companies formed business models involving volunteer computing examples include popular power porivo entropia united devices 2002 berkeley open infrastructure network computing boinc project founded university california berkeley space sciences laboratory funded national science foundation boinc provides complete middleware system volunteer computing including client client gui application runtime system server software software implementing project web site first project based boinc predictor home based scripps research institute began operation 2004 soon thereafter seti home climateprediction.net began using boinc number new boinc-based projects created next years including rosetta home einstein home aqua home 2007 ibm world community grid switched united devices platform boinc client software early volunteer computing projects consisted single program combined scientific computation distributed computing infrastructure monolithic architecture inflexible example difficult deploy new application versions recently volunteer computing moved middleware systems provide distributed computing infrastructure independent scientific computation examples include systems basic structure client program runs volunteer computer periodically contacts project-operated servers internet requesting jobs reporting results completed jobs pull model necessary many volunteer computers behind firewalls allow incoming connections system keeps track user credit numerical measure much work user computers done project volunteer computing systems must deal several issues involving volunteered computers heterogeneity churn tendency individual computers join leave network time sporadic availability need interfere performance regular use addition volunteer computing systems must deal problems related correctness one common approach problems replicated computing job performed least two computers results corresponding credit accepted agree sufficiently effects may may noticeable even noticeable volunteer might choose continue participating however increased power consumption remedied extent setting option limit percentage processor used client available client software although issues lack accountability trust participants researchers implementing projects volunteer computing crucially important especially projects limited funding
Distributed computing architecture
house operating system house acronym haskell user operating system environment experimental open source operating system written haskell written explore system programming functional programming language includes graphical user interface several demos network protocol stack provides basic support ethernet ipv4 arp dhcp icmp ping udp tftp tcp
Operating systems
common weakness enumeration common weakness enumeration cwe category system software weaknesses vulnerabilities sustained community project goals understanding flaws software creating automated tools used identify fix prevent flaws project sponsored national cybersecurity ffrdc owned mitre corporation support us-cert national cyber security division u.s. department homeland security version 3.2 cwe standard released january 2019 cwe 600 categories including classes buffer overflows path/directory tree traversal errors race conditions cross-site scripting hard-coded passwords insecure random numbers common weakness enumeration cwe compatibility program allows service product reviewed registered officially cwe-compatible cwe-effective program assists organizations selecting right software tools learning possible weaknesses possible impact order obtain cwe compatible status product service must meet 4 6 requirements shown 48 organizations january 2018 develop maintain products services achieved cwe compatible status researchers think ambiguities cwe avoided reduced
Computer security
database dump database dump also sql dump contains record table structure and/or data database usually form list sql statements database dump often used backing database contents restored event data loss corrupted databases often recovered analysis dump database dumps often published free software free content projects allow reuse forking database
Databases
meredith gardner meredith knox gardner october 20 1912 – august 9 2002 american linguist codebreaker gardner worked counter-intelligence decoding soviet intelligence traffic regarding espionage united states came known venona project gardner born okolona mississippi grew austin texas graduating university texas austin earned master degree german university wisconsin–madison teaching assistant 1938 1940 linguist professor german university akron united states army signals intelligence service recruited work breaking german codes soon started working japanese codes instead mastering japanese language months 1946 gardner began work highly secret project later codenamed venona break soviet cryptosystems soviet encryption system involved use one-time pads thus thought unbreakable however soviets made mistake reusing certain pages pads later year gardner made first breakthrough venona identifying ciphers used spelling english words may 1947 gardner read decrypt implied soviets ran agent access sensitive information war department general staff u.s. army air corps major william ludwig ullmann became apparent gardner reading kgb messages showing massive soviet espionage united states 1949 meredith gardner made big breakthrough able decipher enough soviet message identify text 1945 telegram winston churchill harry s. truman checking message complete copy telegram provided british embassy cryptanalysts confirmed beyond doubt war soviets spy access secret communication president united states prime minister britain peter wright met meredith gardner london arrests atom spies quiet scholarly man entirely unaware awe held cryptanalysts used tell worked matches office young pipe-smoking englishman named philby used regularly visit peer shoulder admire progress making gardner rather sad figure late 1960s felt keenly cryptanalytical break made possible thing mathematical beauty depressed use put wright revealed gardner upset research resulted mccarthyism executions julius rosenberg ethel rosenberg wright quotes gardner saying never wanted get anyone trouble wright added gardner appalled fact discovery led almost inevitably electric chair felt rosenbergs guilty ought given clemency gardner mind venona almost art form want sullied crude mccarthyism gardner retired 1972 yet work remained mostly secret 1996 nsa cia center democracy honored gardner colleagues formal ceremony result campaigning u.s senator daniel patrick moynihan gardner died august 9 2002 chevy chase maryland age 89
Computer security
phantasie iii phantasie iii third video game phantasie series final installment phantasie trilogy based around fighting evil nikademus finishing good released 1987 time nikademus attempting take entire world party stop phantasie iii maintained style original two improved upon graphics platforms except dos version combat engine also saw upgrades adding specific wound locations characters able head torso limb specifically injured broken removed also possible tactical battle line-up ability move characters front middle rear party game also improved upon spell list added larger variety weapons equipment game also two possible endings depending whether characters chose fight nikademus join phantasie iii sold 46,113 copies scorpia pleased improving trading interface combat grand ending game trilogy called game far weakest series criticized short length phantasie iii reviewed 1988 dragon 130 hartley patricia kirk lesser role computers column reviewers gave game 4 5 stars phantasie phantasie iii questron ii later re-released together reviewed 1994 dragon 203 sandy petersen eye monitor column petersen gave compilation 2 5 stars
Computer architecture
java virtual machine tools interface java virtual machine tool interface jvmti properly jvm ti introduced j2se 5.0 tiger interface allows program inspect state control execution applications running java virtual machine jvm jvmti designed provide application programming interface api development tools need access state jvm examples tools debuggers profilers jvmti native interface jvm library written c c++ loaded initialization jvm library access jvm state calling jvmti jni java native interface functions register receive jvmti events using event handler functions called jvm event occurs jvmti defined java community process jsr-163 specification java platform profiling architecture jvmti replaces jvmpi java virtual machine profiling interface jvmdi java virtual machine debug interface jvmpi jvmdi declared deprecated j2se 5.0 removed java se6 jvmti lowest level java platform debugger architecture
Programming language topics
jsr 53 jsr 53 java specification request developed java community process specifies java servlet 2.3 specification javaserver pages 1.2 specification
Programming language topics
timable timable online event listing platform hong kong consisting websites mobile apps co-founded sam yuen mike ko 2010 covers events happening town ranging concerts dramas exhibitions festivals events family etc timable original word means able time according explanation website letter e omitted word based common english grammar like scalable writable timable represents vision platform – search time users search events matching spare time however name often mistaken timeable timetable moment corresponding chinese name timable contents contributed event organizers web 2.0 approach published timable editors end 2013 23,000 events recorded
Web technology
macro security macro computer science rule pattern specifies certain input sequence often sequence characters mapped replacement input sequence also often sequence characters according defined procedure macro used define variables procedures allow code reuse design domain-specific languages macros separated several types macros useful software users simplify regularly used actions repetitive code programmer sequence actions program productivity user increased however many problems exist tackled subsequently dangers text substitution macros like c macros c preprocessor powerful tool bring clarity code contrary obscure first n't form macros error checking c assembly language possible make macros work.indeed c language syntax macro replaced declared preprocessor compiler check code example //file example.c int main example compiles macro somestring n't used macro used would compilation error //file example.c int main gcc -o example example.c example.c function 'main example.c:6:26 erreur 'foo undeclared first use function example.c:6:26 note undeclared identifier reported function appears simple example applications count code lines begins huge really important macro n't compile may change syntax previous example quotation marks added foo others whole syntax false may change macro calls case type flaw minimal affect maintenance application second point 'll see repetitive code found macros lead wasted computing time let illustrate following code // file example2.c int main int whatmax int getnumber call macro called max 2 values variable foo return value function getnumber basic macro calling function calculate maximum 2 values code executed obtain ./example2 called max 5 moment nothing wrong let replace value getnumber 6 example result ./example2 called called max 6 function getnumber called two times yet need call one time macro replace call macro max syntax return whatmax return foo getnumber foo getnumber value getnumber greater value foo called two times one comparison one return see slow execution program function example need take time calculate return value last point section see macros potentially dangerous programs critical data operations needed order make operations legible macros used double-edged.let take example code execution // file example3.c define cube x x*x*x int main ./example3 10 z 18 normally result expected equal 64 z 30 preprocessor replace calls macros obtain // x 1*x 1*x 1 // equivalent x 1 x 1 x 1 // 3 1 3 1 3 1 // equal 10 // z 5 x+x // equivalent 5 x x // 18 macros c others languages like smx sam76 assembly language etc text substitution n't anything responsibility programmer careful case put parentheses others cases effects instantly predicted like one // file example4.c int main 8 expected value result execution ./example4 10 let see happens decompose execution stack ++x ++x stack first '+ unstacked first '++x evaluated unstacked x 4 second '++x'is evaluated unstacked x 5 '+ give x+x 5+5 10*/ result logical look execution stack obvious instinctively users macros careful without attention errors easily appear addition instructions like '++x imbricated instructions recommended either flaws completely different previous ones main problem vba-type macros viruses macro viruses relatively recent first one named concept created june 1995 main reason high-level languages used write macro code powerful easy use considerably increasing pool potential virus writers documents containing macros disseminated rapidly widely e-mail spread quickly destructive system macro means macros interact basic operators word document like often-used functionalities like filesave filesaveas macros strength weakness word document types macros redefinied users allow great flexibility user flaw hackers exploit take control document computer word document opened type viruses use automatic semi-automatic macros launched action events without user ’ knowledge consent example word document following macros autoexec autonew autoclose autoopen autoexit easy hacker replace basic functionalities macro virus name original functionality also combination shortcut keys associated system command like ctrl+b set bold font user change replacing customs macros hacker modify create macros user activate using shortcut key macros also activated macro button like button click information seems common safely type macro virus cut paste text document macro macro could invoked auto-open macro text would re-created document empty opened user notice document empty macro could also convert parts text order less noticeable removing macros document manually using anti-virus program would lead loss content document polymorphic viruses change code fundamental ways replication order avoid detection anti-virus scanners wordbasic first name language visual basic polymorphic viruses difficult indeed macro polymorphism relies encryption document however hackers control encryption key furthermore encryption n't really efficient encrypted macros document encryption key polymorphic macro replicates key n't change replication affects macro encryption addition difficulties macro ca n't modify another macro wordbasic really powerful language allows operations macros order implement macros viruses change contents hackers another macro fulfill task modify content virus however type macros viruses n't really widespread indeed hackers choose macros viruses easy quick implement make polymorphic macro need lot knowledge language wordbasic needs advanced functionalities time classic macro virus even hacker make polymorphic macro polymorphism needs done document needs update update visible user replication macro create do-nothing macros idea combined polymorphic macros macros necessarily do-nothing macro invokes next one arranged chain case removed disinfection destructive payload activated attack crash winword processor internal error since winword 6.0 number macros per template limited 150 attack limited still annoying macro viruses cases interact two viruses executed time modify source code results new virus ca n't recognize anti-viruses software result totally random macro virus infectious less infectious depends part virus changed however 'mating unintentional macro virus result chances less infectious indeed order replicate know commands source code changed random scheme macro ca n't replicate nevertheless possible macros intentionally different polymorphic macros viruses use another macro change contents order increase infectivity two viruses example article macro virus colors infected document another infected user system macro virus concept viruses use command autoopen first macro virus colors detected command autoopen command macro virus concept moreover concept duplicate unencrypted command virus colors encrypted colors encrypt commands replicate macro virus concept result hybridation macro virus infected user system first colors hybrid could replicate autoopen n't executed indeed command comes concept body hybrid colors create conflicts example shows potential mating macro viruses couple mating macro viruses created make difficult detect macro virus hypothesis two mate virus-specificscanners may reinforce virility viruses fortunately type macro virus rare polymorphic macro viruses may exist one indeed create two interact reduce virlity rather reinforce complicated one worst scenarios world viruses would tool allowing create new virus modifying existing one executable files hard create kind tool simple macro viruses since sources macros always available based idea polymorphic macros macro perform modifications macros present document considering modifications make macro order convert macro virus mutator quite easy create macro virus generators possible create quickly several thousands known viruses macros viruses stand-alone ’ depend macros infectious part virus replication viruses macros viruses called parasitic macros launched check macros viruses append contents way macros became viruses type macro ’ spread quickly stand-alone macros indeed depends macros without virus ’ spread parasitic macros often hybrid stand alone infect macros kind macro virus poses real problems virus-specific anti-virus fact change content viruses accurate detection n't possible different types anti-virus scanner one heuristic analysis anti-virus interpretes emulates macros indeed examine branches macros require np-complete complexity using backtracking case analysis one document contains macros would take much time interpreting emulating macro would lead either false positives errors macro viruses detected another type anti-virus integrety checker anti-virus cases n't work checks documents extensions dot doc indeed anti-virus producers suggest users word documents reside others extensions two content document tends change often like heuristic analysis lead false positives errors due fact type anti-virus checks whole document last type anti-virus seen virus-specific scanner searches signature viruses type anti-virus weakest previous ones indeed viruses detected virus-specific scanners ones knew producers software updates needed others types scanners moreover type anti-virus really weak morphing viruses cf.section macro virus change content signature detected virus-specific scanners even virus actions signature n't match one declare virus scanner additional responsibility anti-virus responsibility users potential macro virus detected user choose ignore quarantine destroy last option dangerous anti-virus activate destructives macro viruses destroy data deleted anti virus virus scanners users responsible security integrity documents/computer furthermore even anti-virus n't optimal virus detection macro viruses detected progression virus detection improve creation new macro viruses text-substitutions macros separated compiler like c securised integrated compiler limit utilisation marco solution allowing macros advantage improving productivity programmer particular multi-languages applications indeed independent language requirement compiler target language produce descriptive error messages location cause errors marco also needs module plug-in understand language plug-in must contain three oracles one check syntactic well-formedness one determine fragment free names last one test whether fragment captures given name moment prototype support c++ sql marco proves safe code using macros well-encapsulated language-scalable time example macro language allowing type-safe macros macroml expressive typed language supports generative macros macros translated target language metaml gives well-type program without runtime errors always faults world viruses fortunately lot macro viruses countered good anti-virus section presents characteristics anti-virus protect macro-viruses first specific anti-virus products really affect kind virus anti-virus analyzing content efficient also something notice modification process relatively slow noticeable user order protect macros viruses scanner detect elements chain remove properly anti-virus detect macros virus also remnants example colors anti-virus must detect microsoft scanprot macro virus protection tool contains remnants virus problem scanprot contain parts virus another problem virus b created modifying macros virus consists set macros virus b could detected remnant anti-virus would identify remove non-modified macros cases replication virus contain original macros could successful fact anti-virus would created new virus anti-virus updated easily fast counter viruses lot informations added every day performance anti-virus must drop updates problem easily identifiable set macros anti-virus parse body macro identify cut parts added macro viruses fortunately task difficult achieve
Computer security
kaspersky internet security kaspersky internet security often abbreviated kis internet security suite developed kaspersky lab compatible microsoft windows mac os x. kis offers protection malware well email spam phishing hacking attempts data leaks kaspersky lab diagnostics results distributed relevant developers version 6.0 first release kis pc world magazine praised version 6.0 detection malware kis detected 100 percent threats subset january 2006 wild-list list prevalent threats suite detected almost 100 99.57 percent adware samples kis ability scan within compressed packed files detecting 83.3 percent hidden malware however version 6.0 criticized completely removing malware leaving registry entries files pc world also highlighted suite false positives — eight 20,000 clean files incorrectly flagged malicious — noticeable impact computer performance however data cached scan making subsequent scan faster firewall blocked attacks inside outside computer tested magazine found graphical user interface awkward navigate features parental controls instant messaging protection found competing suites symantec mcafee part version 6.0 cnet pc world criticized suite relatively high retail price us 79.95 kis 6.0 supports windows 98 se nt workstation 4.0 2000 professional xp home edition xp professional xp professional x64 vista 50 megabytes free space internet explorer 5.5 windows installer 2.0 required ram cpu requirements dependent operating system version 7.0 introduced redesigned gui components renamed reorganized anti-hacker module renamed firewall anti-spy module integrated privacy control module pc world described new interface intuitive great-looking parental controls introduced specific settings different age categories child parent within age categories content categories drugs violence users manually configure profiles filtering profiles associated users since content filtered network level feature work internet browser filter relies database known urls analyse websites real-time attempts access forbidden urls logged sites visited tracked well raising privacy issues limits internet access may set based time chat rooms along webmail sites manually blocked spam filtering integrates microsoft outlook outlook express windows mail bat e-mail content analysed scored e-mail scores two specified thresholds either marked spam probably spam mail dispatcher feature shows subject sender information messages allows users avoid downloading blatant spam selecting messages download filter self-trains analyzing incoming outgoing e-mail marked spam analyzing folders containing spam valid e-mail senders verified valid e-mail whitelisted e-mail also whitelisted blacklisted based phrases present text e-mail non-ascii characters invisible text also blocked however version 7.0 relatively poor showing misidentifying 30 percent valid messages pc magazine testing 30 percent spam also made inbox protection data leaks incorporated release suite warns users programs attempt access send data certain areas internet explorer stores webform information malware protection mostly positive detection disinfection tests av-test.org version 7.0 detected 100 percent wildlist threats using one-month-old signatures set new malware however detection fell 14 percent files scanned 5.24 megabytes per second version 7.0 successfully identified six actively running rootkits four six inactive rootkits able remove two six rootkits firewall correctly blocked attempted outside connections reasonable level security left default settings version drops support windows 98 2000 nt windows xp service pack 2 required except case xp professional x64 edition vista supported well ram cpu requirements dependent operating system 75 megabytes free space internet explorer 5.5 windows installer 2.0 version introduces revised user interface application filtering module updated anti-virus engine vulnerability scanner main window separates settings four categories compared eight predecessor status bar changes colour green yellow red reflect overall program status flashes divert attention needed pc magazine also noted pop-up notifications kept minimum kaspersky claims core anti-virus engine revised increase scan speed pc magazine found initial scan took two hours however subsequent scans took two minutes complete however malware detection relatively low comparison anti-virus applications tested 650 thousand samples version 8.0 detected 95.6 percent top score around 99 percent using two-week-old signatures version 8.0 detected 52 percent viruses different set samples kaspersky also blocked 60 percent malware based solely behaviour top performers scored 55.3 percent 80 percent respectively version 2009 detected 98.1 percent adware however pc world noted achieve kind performance users modify program settings default settings kis allowed zango install block installation users must enable kis scan malware security analyzer looks operating system program patches also looks vulnerable system settings presenting users list recommended actions prevent malware gaining access system however pc world criticized amount computer jargon used lack information adjust settings appropriately hand pc magazine found feature straightforward often solution involved downloading installing update kis uses whitelist carbon black classify trusted malicious programs malicious programs allowed run unknown programs falling two categories restricted actions perform firewall blocked attacks pc magazine testing phishing protection introduced release testing pc magazine found feature blocked 44 percent phishing urls internet explorer 7 blocked 67 percent urls mozilla firefox blocked 81 percent spam filtering integrates mozilla thunderbird scans nntp traffic spam automatically diverted folder using unsupported e-mail client download pop3 imap nntp mail kaspersky still generate report messages however unsupported client toolbar program classify messages spam client version 2010 kaspersky internet security introduced overhauled user interface sandbox running applications virtualized environment 9.0.0.736 build kis 2010 fully supported windows 7 operating system beta version released windows users 8 june 2010 version included new interface well gadget available windows vista windows 7 users pc mag rated version good 4/5 stars firewall noted good made adequate malware detection rates two critical fixes released kaspersky lab making current version 11.0.2.556 1 march 2011 kaspersky released first build version 2012 came beta version english french russian version versions due later 7 june 2011 kaspersky lab announced commercial release kaspersky internet security 2012 france germany switzerland current version 12.0.0.374 beta version released windows users 3 march 2012 version includes interface looks currently least much like internet security 2012 safe run option proactive defense instead behavioural monitoring system watcher seems taking greater responsibility detecting malware safe banking feature added release candidate build 13.0.1.4088 rc released windows users 20 july 2012 final version released 28 august 2012 build 13.0.1.4190 beta testing started 12 march 2013 version introduced windows 8 like gui design final version released 3 august 2013 build 14.0.0.4651 india russia august 13 usa august 27 uk 2014 release frequently characterized inferior user expectations largely due removal range granular fine-tuning options 2013 earlier used experienced users number added back 2015 beta time technical release build 463 february 13 2014 build 14.0.0.4651 e released build 14.0.0.4651 latest current version april 2014 beta version 2015 product build 463 released followed technical release preview near-complete 2015 product first official release product bangladesh june 2014 march 2015 bloomberg accused kaspersky close ties russian military intelligence officials kaspersky slammed claims blog calling coverage sensationalist guilty exploiting paranoia increase readership result alleged russian involvement 2016 presidential election ongoing investigations department homeland security officially banned use kaspersky internet security united states federal government september 2017 december 12 2017 use kaspersky software banned use american federal government law
Computer security
sc-fde single-carrier frequency domain equalization sc-fde single-carrier sc modulation combined frequency-domain equalization fde alternative approach inter symbol interference isi mitigation
Internet protocols
oracle nosql database oracle nosql database ond nosql-type distributed key-value database oracle corporation provides transactional semantics data manipulation horizontal scalability simple administration monitoring oracle released oracle autonomous nosql database cloud oandc august 10 2018 oandc managed cloud service applications require low latency flexible data models elastic scaling dynamic workloads oracle bought company developed berkeley db sleepycat software developers focus application development data store requirements rather managing back-end servers storage expansion cluster deployments topology software installation/patches/upgrades backup operating systems availability oandc scales meet dynamic application workloads throughput requirements users create tables store application data perform database operations oandc table similar relational table additional properties including provisioned write units read units storage capacity users provision throughput storage capacity table based anticipated workloads oandc resources allocated scaled accordingly meet workload requirements users billed hourly based capacity provisioned oandc provides simple data model row identified unique key value arbitrary length interpreted application application manipulate insert delete update read single row transaction application also perform iterative non-transactional scan rows database oracle corporation distributes ond two editions ond licensed using freemium model open-source versions oracle nosql community edition available end-users purchase additional features support via oracle store integrating oracle products oracle enterprise manager oracle coherence oracle nosql enterprise edition purchased ond drivers licensed pursuant apache 2.0 license used community enterprise editions ond built upon oracle berkeley db java edition high-availability storage engine adds services provide distributed highly available key/value store suited large-volume latency-sensitive applications ond client-server sharded shared-nothing system data shard replicated nodes comprise shard provides simple key-value paradigm application developer major key record hashed identify shard record belongs ond designed support changing number shards dynamically response availability additional hardware number shards changes key-value pairs redistributed across new set shards dynamically without requiring system shutdown restart shard made single electable master node serve read write requests several replicas usually two serve read requests replicas kept date using streaming replication change master node committed locally disk also propagated replicas ond provides single-master multi-replica database replication transactional data delivered replica nodes flexible durability policies per transaction event master replica node fails consensus-based paxos-based automated fail-over election process minimizes downtime soon failed node repaired rejoins shard updated becomes available processing read requests thus ond applications tolerate failures nodes within shard also multiple failures nodes distinct shards proper placement masters replicas server hardware racks interconnect switches ond intended increase availability commodity servers ond driver partitions data real time evenly distributes across storage nodes network topology latency-aware routing read write operations appropriate storage node order optimize load distribution performance ond administration service accessed web console command-line interface service supports functionality ability configure start stop monitor storage node without requiring configuration files shell scripts explicit database operations allows java management extensions jmx simple network management protocol snmp agents available monitoring allows management clients poll information status performance metrics operational parameters storage node managed services elasticity refers dynamic online expansion deployed cluster adding storage nodes increases capacity performance reliability ond includes topology planning feature administrator modify configuration nosql database database online administrator administrators move replication nodes and/or partitions over-utilized nodes onto underutilized storage nodes vice versa ond supports multiple zones intelligently allocate replication processes data order improve reliability hardware network power-related failure modes two types zones primary zones contain nodes serve masters replicas typically connected fast interconnects secondary zones contain nodes serve replicas secondary zones used provide low latency read access data distant location offload read-only workloads analytics report generation data exchange improved workload management ond supports avro data serialization provides compact schema-based binary data format schemas defined using json ond supports schema evolution configurable smart topology system administrators indicate much capacity available given storage node allowing capable nodes host multiple replication nodes system knows capacity storage nodes configuration automatically allocates replication nodes intelligently intended better load balancing better use system resources minimizing system impact event storage node failure smart topology supports data centers ensuring full set replicas initially allocated data center ond provides facilities perform rolling upgrade allowing system administrator upgrade cluster nodes database remains available ond configurable either c/p a/p cap particular writes configured performed synchronously replicas c/p cap i.e partition node failure causes system unavailable writes replication performed asynchronously reads configured served replica a/p cap i.e system always available guarantee consistency release 3.0 introduced tabular data structure simplifies application data modeling leveraging existing schema design concepts table model layered top distributed key-value structure inheriting advantages simplifying application design enabling seamless integration familiar sql-based applications primary key based indexing limits number low latency access paths sometimes applications need non-primary-key based paths support specific application requirements ond supports secondary index value field ond ee stream based apis allow reading writing large objects lobs audio video files without materialize entire file memory intended decrease latency operations across mixed workloads objects varying sizes ond provides acid compliant transactions full create read update delete crud operations adjustable durability consistency transaction guarantees sequence operations operate single atomic unit long affected records share major key path ond includes support java c python c rest apis allow application developer perform crud operations libraries include avro support developers serialize key-value records de-serialize key-value records interchangeably c java applications ond supports oracle rest data services ords allows customers build rest-based application access data either oracle database ond supports spatial queries rfc7946 compliant geojson data spatial functions indexing geojson data supported kvavroinputformat kvinputformat classes available read data ond natively hadoop mapreduce jobs one use class read nosql database records oracle loader hadoop oracle big data sql common sql access layer data stored hadoop hdfs hive ond allows customers query oracle nosql data hive oracle database users run mapreduce jobs data stored ond configured secure access latest release also supports primitive complex data types ond ee supports external table allows fetching oracle nosql data oracle database using sql statements select select count etc nosql data exposed external tables one access data via standard jdbc drivers and/or visualize enterprise business intelligence tools oracle event processing oep provides read access ond via nosql database cartridge cartridge configured cql queries used oracle semantic graph includes jena adapter oracle nosql database store large volumes rdf data triplets/quadruplets adapter enables fast access graph data stored ond via sparql queries integration oracle coherence allows ond used cache oracle coherence applications allowing applications directly access cached data ond ond ee supports os-independent cluster-wide password-based user authentication oracle wallet integration enables greater protection unauthorized access sensitive data additionally session-level secure sockets layer ssl encryption network port restrictions improve protection network intrusion ond version 4.0 – new features ond team worked several key oracle partners including intel cisco performing yahoo cloud serving benchmarks ycsb various hardware configurations published results example 2012 oracle reported ond exceeded 1 million mixed ycsb ops/sec
Databases
extent file systems extent contiguous area storage reserved file file system represented range block numbers tracks count key data devices file consist zero extents one file fragment requires one extent direct benefit storing range compactly two numbers instead canonically storing every block number range also extent allocation results less file fragmentation extent-based file systems also eliminate metadata overhead large files would traditionally taken block-allocation tree savings small compared amount stored data file sizes general make large portion metadata large files overall benefits storage efficiency performance slight order resist fragmentation several extent-based file systems allocate-on-flush many modern fault-tolerant file systems also copy-on-write although increases fragmentation similar design cp/m file system uses extents well correspond definition given cp/m extents appear contiguously single block combined directory/allocation table necessarily correspond contiguous data area disk ibm os/360 successors allocates files multiples disk tracks cylinders files could originally 16 extents restriction since lifted initial allocation size size additional extents allocated required specified user via job control language system attempts allocate initial size contiguous area although may split contiguous space available systems supporting filesystem extents include following
Computer file systems
comparison video hosting services following tables compare general technical information number current notable video hosting services please see individual products articles information basic general information hosts creator/company license/price etc
Distributed computing architecture
damn small linux damn small linux commonly abbreviated dsl computer operating system x86 family personal computers free open source software terms gnu gpl free open source licenses designed run graphical applications older pc hardware—for example machines 486/early pentium processors little memory dsl live cd size 50 mb originally started experiment see much software could fit 50 mb eventually became full-fledged linux distribution installed storage media small capacities like bootable business cards usb flash drives various memory cards zip drives dsl originally conceived maintained john andrews five years community included robert shingledecker created mydsl system dsl control panel features issues main developers robert according exiled project currently continues work tiny core linux created april 2008 dsl originally based model-k 22 mb stripped version knoppix soon based knoppix proper allowing much easier remastering improvements dsl supports x86 pcs minimum system requirements 486 processor 8 mb ram dsl demonstrated browsing web dillo running simple games playing music systems 486 processor 16 mb ram system requirements higher running mozilla firefox optional add-ons openoffice.org office suite version 4.4.10 dsl released november 18 2008 current includes following software dsl built-in scripts download install advanced packaging tool apt apt enabled user install packages debian repositories additionally dsl hosts software ranging large applications like openoffice.org gcc smaller ones amsn means mydsl system allows convenient one-click download installation software files hosted mydsl called extensions june 2008 mydsl servers hosting 900 applications plugins extensions boot options also called cheat codes dsl automatic hardware detection may fail user may want use something default settings language keyboard vga fail safe graphics text mode ... dsl allows user enter one cheat codes boot prompt nothing entered dsl boot default options cheat codes affect many auto-detection hardware options many cheat codes also affect gui list cheat codes seen boot time also dsl wiki also run partydisk dsl mydsl handled maintained mostly robert shingledecker hosted many organizations ibiblio belgium belnet 2 areas mydsl regular testing regular area contains extensions proven stable enough everyday use broken different areas apps net system uci universal compressed iso extensions .uci format mounted separate filesystem minimize ram usage testing area newly submitted extensions theoretically work 'as advertised may number bugs standard flavour dsl live cd also versions available one also boot dsl using boot-floppy created one available floppy images 'bootfloppy.img 'bootfloppy-grub.img 'bootfloppy-usb.img 'pcmciabootfloppy.img old computers bios support el torito bootable cd specification dsl kernel loaded floppy disk ram kernel runs dsl cd usb drive dsl ported xbox video game console x-dsl x-dsl requires modified xbox run live cd installed xbox hard drive users also run x-dsl usb flash drive using usb adaptor included phantasy star online plugs memory card slot includes one usb 1.1 port x-dsl boots x11-based gui xbox controller used control mouse pointer enter text using virtual keyboard x-dsl fluxbox desktop programs e-mail web browsing word processing playing music x-dsl customized downloading extensions mydsl servers dsl live usb damn small linux created manually application like unetbootin see list tools create live usb systems full list due infighting among project originators main developers dsl development seemed standstill long time future project uncertain much dismay many users july 8 2012 john andrews original developer announced new release developed dsl website including forums inaccessible back well first rc new 4.11 released august 3 2012 followed second one september 26 damnsmalllinux.org site inaccessible sometime 2015 february 2016 march 27 2016 damnsmalllinux.org accessible time february 10 2019 inaccessible yet may 21 2019 accessible linux distributions derived damn small linux
Operating systems
ciao programming language ciao general-purpose programming language supports logic constraint functional higher-order object-oriented programming styles main design objectives high expressive power extensibility safety reliability efficient execution ciao provides full prolog system supporting iso-prolog declarative subsets extensions prolog functional programming including lazy evaluation higher-order predicate abstractions constraint programming objects well feature terms records persistence several control rules breadth-first search iterative deepening ... concurrency threads/engines distributed execution agents parallel execution libraries also support www programming sockets external interfaces c java tcltk relational databases etc etc ciao built kernel extensible modular design allows restricting extending language — seen language building language restrictions extensions activated separately program module several extensions coexist application different modules programming large ciao supported via ciao also support programming small compiler capable producing small executables including builtins used program interpreter supports scripting environment includes classical top-level evolved emacs interface embeddable source-level debugger number execution visualization tools ciao preprocessor supports static debugging verification assertion checking optimization via source source program transformation tasks performed ciaopp distributed separately ciao includes lpdoc automatic documentation generator processes programs adorned ciao assertions machine-readable comments generates manuals many formats including html pdf texinfo info man etc. well on-line help ascii readme files entries indices manuals info www ... maintains www distribution sites ciao compiler run outside top level shell generates several forms architecture-independent stand-alone executables run speed efficiency executable size competitive high-level languages general particular commercial academic prolog/clp systems modules compiled compact bytecode c source files linked statically dynamically autoloaded
Programming language topics
os-level virtualisation os-level virtualization refers operating system paradigm kernel allows existence multiple isolated user-space instances instances called containers solaris docker zones solaris virtual private servers openvz partitions virtual environments ves virtual kernel dragonfly bsd jails freebsd jail chroot jail may look like real computers point view programs running computer program running ordinary operating system see resources connected devices files folders network shares cpu power quantifiable hardware capabilities computer however programs running inside container see container contents devices assigned container unix-like operating systems feature seen advanced implementation standard chroot mechanism changes apparent root folder current running process children addition isolation mechanisms kernel often provides resource-management features limit impact one container activities containers term container popularly referring os-level virtualization systems sometimes ambiguously used refer fuller virtual machine environments operating varying degrees concert host os e.g microsoft hyper-v containers ordinary operating systems personal computers computer program see even though might able access system resources include operating system may able allow deny access resources based program requests user account context runs operating system may also hide resources computer program enumerates appear enumeration results nevertheless programming point view computer program interacted resources operating system managed act interaction operating-system-virtualization containerization possible run programs within containers parts resources allocated program expecting see whole computer run inside container see allocated resources believes available several containers created operating system subset computer resources allocated container may contain number computer programs programs may run concurrently separately may even interact one another containerization similarities application virtualization latter one computer program placed isolated container isolation applies file system operating-system-level virtualization commonly used virtual hosting environments useful securely allocating finite hardware resources among large number mutually-distrusting users system administrators may also use consolidating server hardware moving services separate hosts containers one server typical scenarios include separating several programs separate containers improved security hardware independence added resource management features improved security provided use chroot mechanism however nowhere near ironclad operating-system-level virtualization implementations capable live migration also used dynamic load balancing containers nodes cluster operating-system-level virtualization usually imposes less overhead full virtualization programs virtual partitions use operating system normal system call interface need subjected emulation run intermediate virtual machine case full virtualization vmware esxi qemu hyper-v paravirtualization xen uml form virtualization also require hardware support efficient performance operating-system-level virtualization flexible virtualization approaches since host guest operating system different host one different guest kernel example linux different distributions fine operating systems windows hosted solaris partially overcomes limitation described branded zones feature provides ability run environment within container emulates older solaris 8 9 version solaris 10 host linux branded zones referred lx branded zones also available x86-based solaris systems providing complete linux userspace support execution linux applications additionally solaris provides utilities needed install red hat enterprise linux 3.x centos 3.x linux distributions inside lx zones however 2010 linux branded zones removed solaris 2014 reintroduced illumos open source solaris fork supporting 32-bit linux kernels implementations provide file-level copy-on-write cow mechanisms commonly standard file system shared partitions partitions change files automatically create copies easier back space-efficient simpler cache block-level copy-on-write schemes common whole-system virtualizers whole-system virtualizers however work non-native file systems create roll back snapshots entire system state
Operating systems
finalcode finalcode inc. multi-national software company provides data-centric security information rights management irm help enterprises mitigate data leakage meet compliance requirements finalcode allows users securely collaborate share files using communication channel including existing enterprise content management ecm cloud storage collaboration applications finalcode privately held headquartered san jose california additional offices singapore japan australia united kingdom finalcode inc founded 2014 part international expansion finalcode opened regional headquarters singapore may 2016 september 2016 additional regional headquarter opened london uk cover emea region finalcode also additional offices presence japan australia finalcode provides aes-256 encryption granular permission sets corporate user policy templates file lifecycle activity analytics dynamic policy modification ability remotely delete files shared nowiki finalcode ’ patented cryptoease™ technology adds layer file protection remains persistent whether file circulates internally outside organization offering comprehensive file-based information rights management irm allows organizations file owner retains comprehensive file control auditing capability means recipients usage permissions delete files remotely. /ref official website
Computer security
higemaru makaijima nanatsu shima daibōken higemaru makaijima hero pirate ship higemaru named momotaru must pilot sailing vessel around ocean surrounding seven islands goal find greatest treasure must collect keys open dock gates islands invading several pirate ships defeating captain board combat gameplay pirate ships taken directly arcade predecessor small modifications momotaru collected key pirate ship must sail around islands search correct dock gate key corresponds player embarks exploration island find items defeat boss collect treasures heading search another island key island exploration sections extremely reminiscent dungeon exploration aspects legend zelda game often compared
Computer architecture
fluent design system fluent design system codenamed project neon officially unveiled microsoft fluent design system design language developed 2017 microsoft fluent design revamp microsoft design language 2 includes guidelines designs interactions used within software designed windows 10 devices platforms system based five key components light depth motion material scale new design language includes prominent use motion depth translucency effects transition fluent long-term project preliminary aspects design particularly acrylic translucency effects reveal effects buttons incorporated windows 10 particularly within fall creators update released october 2017 well update xbox one system software released alongside aspects fluent introduced windows time purpose light draw attention illuminate information upon hovering reveal highlight illuminates nearby hidden borders objects hamburger navigation menu lists buttons upon selection clicking tapping white circular illumination effect quickly appears additionally windows holographic environment rounded white pointer exists 6 november 2017 microsoft employee david haz stated plans apply reveal highlight taskbar exist—but occurred focusable items border glow via focus visual addition depth utilizes z-axis allows content differentiation via layering depth presented via drop shadows z-depth layering motion establishes relationship ui elements provides continuity experience list animations inserting removing items collection connected animations item transitions content change element appears continue flying across app used portion content page change fade-in fade-out bring dismiss items view parallax moves objects different rates background moves slower content example list scroll faster background image creating depth effect addition motion item pressed momentarily recedes background restores original position examples press feedback include start menu live tiles action center quick actions microsoft edge address bar buttons acrylic material creates translucent blurred effect slight noise effect visual hierarchy created using different opacities example app primary content surfaces often opaque exception widgets lightweight apps calculator secondary pane 80 background acrylic tertiary pane 60 background acrylic background acrylic blurs items behind active acrylic material in-app acrylic blurs content within app acrylic disabled specific window app longer selected types acrylic disabled system-wide transparency disabled battery saver mode enabled low-end hardware background acrylic disabled window de-selected windows 10 mobile hololens tablet mode apps scale across different form factors display sizes 0d 3d elements adapt screen size available across multiple dimensions conscious controls also categorized within scale e.g scrollbars inputs adapt different methods invocation fluent key principles blocks light depth motion material scale turn away flat concept metro defined preserving clean look feel metro introduced fluent renews visuals aero design approach introduced windows vista windows 7 including blurred translucency parallax animated patterns drop shadow highlight effects following mouse pointer input gesture movements faux materials metro dumped
Operating systems
special real time operating system special real time operating system srtos discontinued ibm real time operating system originally designed use electricity industry later also applied areas industrial process control formed part realtime plant management system rpms advanced control system acs rather standalone operating system designed extension os/vs1 os/vs2 later mvs operating systems also used paper industry srtos originally released 1976 continued used 1980s
Operating systems
digital forensics framework digital forensics framework dff computer forensics open-source software used professionals non-experts collect preserve reveal digital evidence without compromising systems data digital forensics framework offers graphical user interface gui developed pyqt classical tree view features recursive view tagging live search bookmarking available command line interface allows user remotely perform digital investigation comes common shell functions completion task management globing keyboard shortcuts dff run batch scripts startup automate repetitive tasks advanced users developers use dff directly python interpreter script investigation addition source code package binary installers gnu/linux windows digital forensics framework available operating system distributions typical free open-source software foss including debian fedora ubuntu digital forensics framework methods available digital forensics oriented distribution live cd published books mention digital forensics framework dff used solve 2010 digital forensic research workshop dfrws challenge consisting reconstructing physical dump nand flash memory
Computer security
alpha7 alpha7 cloud technology company headquartered singapore business cloud enabler clients including listed companies enterprises small medium-sized enterprises spanning various industries asia-pacific region founded january 2014 singapore january 2015 alpha7 launched “ cooaas ” chief operating officer service concept intended provide services chief operating officer coo outsourced retainer project basis alpha7 currently works 25 companies whose applications offered cooaas platform may 2015 alpha7 launched imap system recommending right tools business owners help day-to-day operations imap recommends technology tools solutions services based businesses available budget across marketing sales business operations finance human resources business owners receive advice five areas need focus imap targets small medium enterprises fewer 1,000 employees.in month alpha7 received private funding 3.1 million us 2.3 million september 2015 launched a7 appsconnect a7 bizconnect a7 appsconnect offers companies access applications focused key business functions marketing sales operations finance human resources applications offered include sugarcrm vtiger dolibarr drupal quickbooks eventbrite a7 bizconnect advisory tool reviews businesses front back-end business processes recommending business outcomes aimed delivering productivity growth based available budgets alpha7 also provides cloud advisory consultancy services small medium-sized enterprises smes startups
Distributed computing architecture
nexenta os nexenta os officially known nexenta core platform discontinued computer operating system based opensolaris ubuntu runs ia-32- x86-64-based systems emerged fall 2005 sun microsystems started opensolaris project june year nexenta systems inc. initiated project sponsored development nexenta os version 1.0 released february 2008 late 2011 nexenta os brand terminated replaced illumian derived community development illumos openindiana distinguished use debian packaging illumian version 1.0 released february 2012 following initial release illumian 2012 illumian project discontinued initially two official apt repositories testing unstable totalling 9000 packages third stable added first official release nexenta os available installcd vmware images live cd also available releases alpha 5 nexenta repositories follow general debian structure main contrib non-free stable releases use subset structure packages originate debian gnu/linux nexenta.org website retired early 2012 since nexenta os use linux kernel sun recently began releasing code solaris operating system free open source software supports less diverse hardware debian variants nexenta os team decided focus minimal opensolaris effort called nexenta core platform ncp forms basis nexentastor nas storage solution version 1.0 nexenta core platform released february 10 2008 nexenta core platform first operating system combine opensolaris kernel gnu userland tools aimed bring technologies zfs zones gnu/debian community additional purpose os provide kernel allowing proprietary closed source hardware drivers produced inclusion open source operating system nexentastor proprietary operating system built nexenta systems top nexenta core platform optimized use virtualized server environments including nas iscsi fibre channel applications built around zfs file system features iscsi support unlimited incremental backups 'snapshots snapshot mirroring replication block level mirroring cdp integrated search within zfs snapshots custom api focus zfs carries potential benefits virtualized server farms terms performance thin provisioning operating system currently distributed iso vmware disk images pricing determined per-terabyte per-server licensing basis community edition available free charge users less 18 terabytes raw disk space pre-redundancy volume creation free tier model changed release version 5.0 community edition 10 terabyte limit assigned usable post-redundancy volume creation disk space enterprise version except lack paid plugins commercial support install many free open source plugins developed hosted community edition website community edition though intended hobbyist use production use community edition forbidden nexentastor eula therefore use term community edition remains disputable readydataos firmware embedded network-attached storage nas distribution based nexenta os zfs support nexenta os runs netgear readydata hardware
Operating systems
autopackage autopackage free computer package management system aimed making simple create package installed linux distributions created mike hearn around 2002 august 2010 listaller autopackage announced projects merge projects amsn inkscape offered autopackage installer freecode offered content submitters field put url autopackages list available packages limited program versions obsolete example recent autopackage gimp 2.2.6 even though gimp version 2.8.2 august 2012 autopackage designed installing binary pre-compiled versions non-core applications word processors web browsers personal computer games rather core libraries applications operating system shells concept autopackage improve linux desktop platform stable binary interfaces comparable windows macos autopackage intended provide installation core applications libraries compatibility reasons using autopackage distribute non-core libraries something thorny issue one hand distributing via autopackage allows installation greater range systems hand conflicts native package dependencies autopackage intended complementary system distribution usual packaging system rpm deb unlike formats autopackage verifies dependencies checking presence deployed files rather querying database installed packages simplifies design requirements autopackage relying available resources rather necessitating tracking package choices targeted distributions programs use autopackage must also relocatable meaning must installable varying directories single binary enables autopackage installed non-root user user home directory autopackage packages indicated .package extension executable bash scripts installed running files autopackage archive easily extracted anything autopackage internal format must parsed order determine file layout issues autopackage programs installed hard-coded system paths may conflict existing packages installed means thus leading corruption usually remedied uninstalling older version package installed autopackage autopackage files also installed removed using listaller toolset listaller simply includes autopackage packages package container format handles autopackage like listaller package file
Operating systems
compaq presario r3000 compaq presario r3000 line series laptops designed built hewlett-packard corporation could shipped microsoft windows 98 2000 xp series used intel amd processors could 256 mb 256 mib 512 mb ram reserved graphics card ati mobility radeon 9000/9100 igp integrated graphics processor board sound card made analog devices also board connected jbl pro speakers ports computer usb ieee 1394 firewire headphone microphone s-video monitor parallel also rj45 connector network cable phone line jack one special series expansion port hp expansion dock type port found hp notebooks models series broadcom wifi adapters computer disk reader writer capable playing dvds burning cds downloading software disk computer encased black silver plastic shell weighs ten pounds two cooling fans mounted keyboard
Computer architecture
4k disk monitor system pdp-8 disk monitor discontinued operating system released digital equipment corporation pdp-8 line mini-computers minimum hardware requirements consisted teleprinter 3 cycle data break option pdp-8/s model mass storage option df32 disk sub-system tc01 dectape unit later releases additional option using rf08 disk drive distribution media paper tape common means data storage computers era included user programs consisted mainly modified versions paper tape software library distributed dec pdp-8 family small computers much exported tss-8 ms/8 operating systems
Operating systems
adventure island video game hudson adventure island side-scrolling platform game produced hudson soft released japan famicom msx september 12 1986 released north america nintendo entertainment system september 1988 pal region 1992 title adventure island classic adventure island adaptation arcade game wonder boy developed escape sega adventure island followed series sequels connection wonder boy series player controls master higgins known master wigins united kingdom takahashi meijin japanese versions young man ventured adventure island south pacific hearing evil witch doctor kidnapped princess tina rescue higgins must survive series 32 stages eight worlds called areas divided four stages rounds divided four checkpoints player reaches fourth round area must confront boss end continue next area game completed player saves girl defeating eighth final form evil lord master higgins player character loses life whenever touches enemy enemy attack fire roast falls pitfall body water moreover player also health gauge starts 11 points gradually depletes time whenever higgins trips rock path higgins health gauge reaches zero lose life well higgins still extra lives left revive last checkpoint passed game ends higgins lives runs replenish health higgins pick numerous fruits milk bottle path maximum health reaches 16 points player score reaches 50,000 points 100,000 points 200,000 points higgins receive extra life finding bee-like fairy known honey girl grant higgins invincibility ten seconds allow kill enemies single touch also hidden somewhere stage special pot doubles player end-of-stage bonus collected higgins starts life without ability attack gain ability attack picking stone axe found specific spots stage higgins wielding stone axe trade magical fireballs longer range capable destroying rocks rolling stones invulnerable stone axe break egg player must touch hit weapon twice addition weapons numerous bonus items stuck inside also negative item eggplant drains higgins life meter eggs immediately visible plain sight locations hidden eggs usually indicated weapon thrown player disappears falling ground uncovered jumping indicated spot hidden spots n't contain hidden eggs instead cloud warp player bonus stage instead uncovered standing still short period time bonus stages player collect series fruits worth 500 points regardless type higgins falls pitfall however instead losing life return regular stage next checkpoint fourth round area higgins confront different form evil witch doctor game boss character ability change head eight different types higgins must defeat striking head specific number times weapon number hits required defeat increases area first form requires eight hits every subsequent form requires two additional hits eighth final form requires 22 hits evil witch doctor defeated change head escape next area uses attack form thing changes besides durability mobility speed speed fireball attacks higgins defeats final form evil witch doctor fall pit girl rescued adventure island began development direct port sega arcade game wonder boy rights hudson soft obtained developer escape known westone bit entertainment development port decision made change character design protagonist modeling naming hudson soft spokesman takahashi meijin western version adventure island takahashi meijin character renamed master higgins wonder boy series adopted action rpg system sequels beginning wonder boy monster land adventure island sequels stuck game system original wonder boy moreover hudson soft also obtained rights port wonder boy sequels turbografx-16 changing title character designs game exception incidentally japanese version dragon curse turbografx-16 adaptation titled adventure island rights adventure island series currently owned konami absorbed hudson soft 2012 nes version adventure island re-released japan game boy advance famicom mini title may 21 2004 later re-released internationally virtual console service 2008 wii 2014 wii u remake also developed playstation 2 gamecube titled hudson selection volume 4 takahashi meijin bōken jima released exclusively japan december 18 2003 two sequels produced nes adventure island ii adventure island 3 well fourth game famicom released exclusively japan titled takahashi meijin bōken jima iv addition standalone famicom mini re-release first game four games re-released compilation game boy advance titled hudson best collection vol 6 bōken jima collection released japan january 19 2006 sequels also released platforms adventure island adventure island ii game boy based second third nes games respectively super adventure island super adventure island ii super nes new adventure island turbografx-16 wii gacha wa shi meijin bōken jima 2007 mobile adventure island quest takahashi meijin 2010 mobile takahashi meijin appears playable character crossover fighting game dreammix tv world fighters released japan gamecube december 13 2003 takahasia meijin also appears sport mobile game gachapin mukku supōtsugēmuapuri 2008 adventure island received positive mixed reviews critics gamespot awarded game 6.5 10 calling fast-paced challenging platformer gamesradar+ ranked 23rd best nes game ever made staff praised fact challenge comes quality level design low quality
Computer architecture
simcenter amesim simcenter amesim commercial simulation software modeling analysis multi-domain systems part systems engineering domain falls mechatronic engineering field software package suite tools used model analyze predict performance mechatronics systems models described using nonlinear time-dependent analytical equations represent system ’ hydraulic pneumatic thermal electric mechanical behavior compared 3d cae modeling approach gives capability simulate behavior systems detailed cad geometry available hence used earlier system design cycle v-model create simulation model system set libraries used contain pre-defined components different physical domains icons system connected purpose icon ports several inputs outputs causality enforced linking inputs one icon outputs another icon vice versa simcenter amesim libraries written c language also support modelica non-proprietary object-oriented equation based language model complex physical systems containing e.g. mechanical electrical electronic hydraulic thermal control electric power process-oriented subcomponents software runs linux windows platforms simcenter amesim part siemens plm software simcenter portfolio combines 1d simulation 3d cae physical testing intelligent reporting data analytics portfolio intended provide engineers analysts comprehensive solution development complex products include smart systems implementing predictive engineering analytics approach simcenter amesim software developed imagine s.a. company acquired june 2007 lms international acquired november 2012 siemens ag imagine s.a. company created 1987 dr michel lebrun university claude bernard france control complex dynamic systems coupling hydraulic servo-actuators finite-elements mechanical structures initial engineering project involved deck elevation sinking ekofisk north sea petroleum platforms early 1990s association pr c. w. richards coming university bath england led first commercial release simcenter amesim 1995 dedicated fluid control systems simcenter amesim used companies automotive aerospace advanced manufacturing industries simcenter amesim multi-domain software allows link different physics domains hydraulic pneumatic mechanic electrical thermal electromechanical based bond graph theory modelling system done four steps submodel parameter mode simcenter amesim model compiled windows platform simcenter amesim works free gcc compiler provided software also works microsoft visual c++ compiler free express edition since version 4.3.0 simcenter amesim uses intel compiler platforms simcenter amesim features create system simulation model simcenter amesim components different physical domains assembled physical libraries developed engineering services partnerships customers version 2019.1 simcenter amesim offered 48 libraries 6500 multi-physics models answer various application requirements simcenter amesim libraries simcenter amesim simcenter sysdm simcenter system architect simcenter webapp server simcenter amesim used engineering schools universities also reference framework various research projects europe free simcenter amesim student edition license downloaded
Programming language topics
mimer sql mimer sql sql-based relational database management system produced swedish company mimer information technology ab mimer ab formerly known upright database technology ab originally developed research project uppsala university uppsala sweden 1970s developed commercial product database deployed wide range application situations including nhs pulse blood transfusion service uk volvo cars production line sweden automotive dealers australia sometimes one limited options available realtime critical applications resource restricted situations mobile devices mimer sql originated project itc service center supporting uppsala university institutions leverage relational database capabilities proposed codd others initial release 1975 designated rapid written ibm assembler language name changed mimer 1977 avoid trademark issue universities interested project number machine architectures mimer re-written fortran achieve portability models developed mimer mimer/ql implementing quel query languages emergence sql 1980s standard query language resulted mimers developers choosing adopt product becoming mimer sql 1984 mimer transferred newly established company mimer information systems mimer sql database server currently supported main platforms windows macos linux openvms alpha integrity previous versions database engine supported operating systems including solaris aix hp-ux tru 64 sco versions mimer sql available download free development enterprise product standards based sql database server based upon mimer sql experience database server product highly configurable components added removed replacing foundation product achieve derived product suitable embedded real-time small footprint application mimer sql realtime database server replacement database engine specifically designed applications real-time aspects paramount sometimes marketed automotive approach resource limited environments mimer sql mobile database server replacement runtime environment without sql compiler used portable certain custom devices termed mobile approach custom embedded approaches applied multiple hardware operating system system combinations options enable mimer sql deployed wide variety additional target platforms real-time operating systems including android vxworks database available real-time embedded automotive specialist versions requiring maintenance intention make product suitable mission-critical automotive process automation telecommunication systems mimer sql provides support multiple database application programming interfaces apis odbc jdbc ado.net embedded sql c/c++ cobol fortran native api mimer sql real-time api mimer sql micro c api mimer provider manager ado.net provider dispatcher uses different plugins access different underlying ado.net providers mimer provider manager makes possible write database independent ado.net applications mimer sql mainly uses optimistic concurrency control occ manage concurrent transactions makes database locking free enables real-time predictability mimer sql assigned port 1360 internet assigned numbers authority iana registry name mimer taken norse mythology mimer giant guarding well wisdom also known mímisbrunnr metaphorically database system managing data
Databases
dragon buster game featured side-scrolling platform gameplay overworld map similar later super mario bros. series dragon buster also earliest game feature double jump mechanic one first use visual health meter beginning prince named clovis born son kingdom chief bodyguard royal lawrence family young child clovis mischievous undisciplined father thought might best place care monk lived woods far kingdom monk care clovis began learn various aspects knowledge including superior swordsman word reached monk king lawrence 16-year-old daughter celia abducted held fearsome dragon wished break kingdom spirit coerce kingdom bidding clovis felt sense duty chase dragon rescue celia name father order save princess trained daily monk learned withstand injury whether cut swords burned flame still capable fighter ever player must guide hero clovis round castle rescue beloved princess celia multiple princess celias game one every castles goal reach true celia end game final castle celia wears different outfit time rescued player progresses round must choose various paths take castle many paths choose number increases player gets higher rounds paths take player individual levels round multiple bosses level many less powerful enemies scattered throughout level player must find boss contains exit level proceed round finally reach castle clovis vitality restores 25 level completed game ends clovis vitality reaches zero five different types levels cave tower boneyard mountain ruins levels boasts particular type monster others example boneyard boasts lots boss skeleton cave mostly linear type level mostly descends horizontal movement boasts lots bats snakes tower notable many floors player must lot climbing type level boneyard probably hardest type level lot enemies paths choose player likely end defeating every boss level finds boss contains exit mountain player dropping time starts top mountain must work way ruins standard type level bit everything four types levels contain finally castle end round every castle starts long drop takes player dragon room must fight dragon game ported nec pc-8801 computer enix port featured introduction game entirely new ending featuring cinema screens depicting battle-torn clovis teary-eyed celia dragon buster also included hidden mini-game tales abyss playstation 2 nintendo 3ds included various namco museum compilations including namco museum volume 2 original playstation namco museum battle collection playstation portable namco museum virtual arcade xbox 360
Computer architecture