text
stringlengths
6
1.88M
source
stringclasses
13 values
stegomalware stegomalware type malware uses steganography hinder detection steganography practice concealing file message image video within another file message image video network traffic type malware operates building steganographic system hide malicious data within resources extracts executes dynamically considered one sophisticated stealthy ways obfuscation term stegomalware introduced researchers context mobile malware presented inscrypt conference 2014 however fact mobile malware could potentially utilize steganography already presented earlier works use steganography malware first applied botnets communicating probabilistically unobservable channels mobile malware based covert channels proposed year steganography later applied components malware engineering return-oriented programming compile-time obfuscation among others europol-supported cuing initiative monitors use steganography malware
Computer security
bento database bento database application mac os x made filemaker inc. bento differs significantly company flagship product filemaker pro relies heavily templates integration applications default bento data sources include apple address book calendar previously called ical applications modify directly filemaker announced july 31 2013 would discontinue bento september 30 2013 bento compatible mac os x 10.5 later due reliance features available previous versions operating system certain actions switching templates use core animation animate transition also includes integration time machine backing requires ical 3.0 later renamed calendar live data editing public preview made available along initial product announcement november 13 2007 first final version released january 8 2008 bento template pre-made library forms necessary catalog items within certain context release bento 2 october 14 2008 bento users could import export share templates june 16 2009 filemaker launched template sharing site users download variety templates well share couple user-created template sharing sites also exist october 14 2008 filemaker released bento 2.0 bug fixes new features including integration apple mail new version offer upgrade pricing cost version 1 many customers expressed disappointment official bento user forums filemaker responded using pricing model companies products apple iwork ilife suites additionally november 25 filemaker provided official statement indicating would discontinue revisions bug fixes version 1 product.given interest revision neither quick easy decision come to. br br bento 1 received extensive beta testing like every software product issues discovered shipment followed bento 1.0.2 address critical issues discovered. br br addressing product issues discovered 1.0.2 2.0 release reworked product significant sometimes architectural ways simply put means way easily migrate fixes 2.0 backwards 1.0 would reengineer 1.0 effectively became 2.0 would strongly delayed 2.0.3 version bento releasing free update bento 2.0.1/2.0.2 week continued development bento product line may 20 2012 price bento 4 49 single license 99 'family pack five licenses filemaker announced july 31 2013 would completely discontinue bento product line september 30 2013 technical support bento products finally ending july 30 2014
Databases
translation memory translation memory tm database stores segments sentences paragraphs sentence-like units headings titles elements list previously translated order aid human translators translation memory stores source text corresponding translation language pairs called “ translation units ” individual words handled terminology bases within domain tm software programs use translation memories sometimes known translation memory managers tmm translation memory systems tm systems confused translation management system tms another type software focused managing process translation translation memories typically used conjunction dedicated computer assisted translation cat tool word processing program terminology management systems multilingual dictionary even raw machine translation output research indicates many companies producing multilingual documentation using translation memory systems survey language professionals 2006 82.5 874 replies confirmed use tm usage tm correlated text type characterised technical terms simple sentence structure technical lesser degree marketing financial computing skills repetitiveness content program breaks source text text translated segments looks matches segments source half previously translated source-target pairs stored translation memory presents matching pairs translation candidates translator accept candidate replace fresh translation modify match source last two cases new modified translation goes database translation memory systems search 100 matches say retrieve segments text match entries database exactly others employ fuzzy matching algorithms retrieve similar segments presented translator differences flagged important note typical translation memory systems search text source segment flexibility robustness matching algorithm largely determine performance translation memory although applications recall rate exact matches high enough justify 100 -match approach segments match found translated translator manually newly translated segments stored database used future translations well repetitions segment current text translation memories work best texts highly repetitive technical manuals also helpful translating incremental changes previously translated document corresponding example minor changes new version user manual traditionally translation memories considered appropriate literary creative texts simple reason little repetition language used however others find value even non-repetitive texts database resources created value concordance searches determine appropriate usage terms quality assurance empty segments simplification review process source target segment always displayed together translators work two documents traditional review environment translation memory managers suitable translating technical documentation documents containing specialized vocabularies benefits include main problems hindering wider use translation memory managers include use tm systems might effect quality texts translated main effect clearly related so-called error propagation translation particular segment incorrect fact likely incorrect translation reused next time source text similar source text translated thereby perpetuating error.traditionally two main effects quality translated texts described sentence-salad effect bédard 2000 cited ’ hagan 2009 50 peep-hole effect heyn 1998 first refers lack coherence text level text translated using sentences tm translated different translators different styles according latter translators may adapt style use tm system order contain intratextual references segments better reused future texts thus affecting cohesion readability o'hagan 2009 potential present probably unconscious effect translated text different languages use different sequences logical elements within sentence translator presented multiple clause sentence half translated less likely completely rebuild sentence consistent empirical evidences martín-mor 2011 show translators likely modify structure multiple clause sentence working text processor rather tm system also potential translator deal text mechanically sentence-by-sentence instead focusing sentence relates around text whole researchers dragsted 2004 identified effect relates automatic segmentation feature programs necessarily negative effect quality translations note effects closely related training rather inherent tool according martín-mor 2011 use tm systems effect quality translated texts especially novices experienced translators able avoid pym 2013 reminds translators using tm/mt tend revise segment go along allowing little time final revision whole text end might fact ultimate cause effects described following summary main functions translation memory function used transfer text translation text file tm import done raw format external source text available importing tm along translation sometimes texts reprocessed user another format used import native format format one uses tm save translation memories file process analysis involves following steps export transfers text tm external text file import export inverses translating one main purposes tm retrieve useful matches memory translator choose best one tm must show source target text pointing identities differences several different types matches retrieved tm tm updated new translation accepted translator always updating database question previous contents database tm modified changing deleting entries tm systems allow translators save multiple translations source segment translation memory tools often provide automatic retrieval substitution networking enables group translators translate text together faster working isolation sentences phrases translated one translator available others moreover translation memories shared final translation opportunity mistakes one translator corrected team members text memory basis proposed lisa oscar xml tm standard text memory comprises author memory translation memory unique identifiers remembered translation target language document 'exactly aligned text unit level source document subsequently modified text units changed directly transferred new target version document without need translator interaction concept 'exact 'perfect matching translation memory xml tm also provide mechanisms in-document leveraged fuzzy matching 1970s infancy stage tm systems scholars carried preliminary round exploratory discussions original idea tm systems often attributed martin kay proper place paper details fully given paper shown basic concept storing system translator might start issuing command causing system display anything store might relevant ... going examine past future fragments text contain similar material observation kay actually influenced suggestion peter arthern translators use similar already translated documents online 1978 article gave fully demonstration call tm systems today new text would typed word processing station typed system would check text earlier texts stored memory together translation official languages european community ... one advantage machine translation proper would passages retrieved would grammatically correct effect operating electronic 'cut stick process would according calculations save least 15 per cent time translators employ effectively producing translations idea incorporated alps automated language processing systems tools first developed researcher brigham young university time idea tm systems mixed tool call repetitions processing aimed find matched strings long time concept so-called translation memory come real exploratory stage tm systems would 1980s one first implementation tm system appeared sadler vendelmans bilingual knowledge bank bilingual knowledge bank syntactically referentially structured pair corpora one translation translation units cross-coded corpora aim bilingual knowledge bank develop corpus-based general-purpose knowledge source applications machine translation computer-aided translation sadler vendelman 1987 another important step made brian harris bi-text defined bi-text single text two dimensions 1988 source target texts related activity translator translation units made similar echoes sadler bilingual knowledge bank harris work proposed something like tm system without using name database paired translations searchable either individual word whole translation unit latter case search allowed retrieve similar rather identical units tm technology became commercially available wide scale late 1990s efforts made several engineers translators note first tm tool called trados sdl trados nowadays tool opening source file applying translation memory 100 matches identical matches fuzzy matches similar identical matches within text instantly extracted placed within target file matches suggested translation memory either accepted overridden new alternatives translation unit manually updated stored within translation memory future use well repetition current text similar way segments target file without match would translated manually automatically added translation memory 2000s online translation services began incorporating tm machine translation services like google translate well professional hybrid translation services provided sites like gengo ackuna incorporate databases tm data supplied translators volunteers make efficient connections languages provide faster translation services end-users one recent development concept 'text memory contrast translation memory also basis proposed lisa oscar standard text memory within xml tm comprises 'author memory 'translation memory author memory used keep track changes authoring cycle translation memory uses information author memory implement translation memory matching although primarily targeted xml documents xml tm used document converted xliff format much powerful first-generation tm systems include linguistic analysis engine use chunk technology break segments intelligent terminological groups automatically generate specific glossaries translation memory exchange tmx standard enables interchange translation memories translation suppliers tmx adopted translation community best way importing exporting translation memories current version 1.4b allows recreation original source target documents tmx data termbase exchange lisa standard revised republished iso 30042 allows interchange terminology data including detailed lexical information framework tbx provided three iso standards iso 12620 iso 12200 iso 16642 iso 12620 provides inventory well-defined “ data categories ” standardized names function data element types predefined values iso 12200 also known martif provides basis core structure tbx iso 16642 also known terminological markup framework includes structural meta-model terminology markup languages general universal terminology exchange utx format standard specifically designed used user dictionaries machine translation used general human-readable glossaries purpose utx accelerate dictionary sharing reuse extremely simple practical specification segmentation rules exchange srx intended enhance tmx standard translation memory data exchanged applications used effectively ability specify segmentation rules used previous translation may increase leveraging achieved gilt metrics gilt stands globalization internationalization localization translation gilt metrics standard comprises three parts gmx-v volume metrics gmx-c complexity metrics gmx-q quality metrics proposed gilt metrics standard tasked quantifying workload quality requirements given gilt task open lexicon interchange format olif open xml-compliant standard exchange terminological lexical data although originally intended means exchange lexical data proprietary machine translation lexicons evolved general standard terminology exchange xml localisation interchange file format xliff intended provide single interchange file format understood localization provider xliff preferred way exchanging data xml format translation industry translation web services transws specifies calls needed use web services submission retrieval files messages relating localization projects intended detailed framework automation much current localization process use web services xml tm xml-based text memory approach translation memory based concept text memory comprises author translation memory xml tm donated lisa oscar xml-intl gettext portable object format though often regarded translation memory format gettext po files bilingual files also used translation memory processes way translation memories used typically po translation memory system consist various separate files directory tree structure common tools work po files include gnu gettext tools translate toolkit several tools programs also exist edit po files mere source text files
Computational linguistics
grosch law grosch law following observation computer performance made herb grosch 1953 believe fundamental rule modestly call grosch law giving added economy square root increase speed — calculation ten times cheaply must hundred times fast adage commonly stated computer performance increases square cost computer costs twice much computer b expect computer four times fast computer b two years grosch statement seymour cray quoted business week august 1963 expressing thought computers obey square law — price doubles get least four times much speed law also interpreted meaning computers present economies scale costly computer price–performance ratio linearly becomes better implies low-cost computers compete market analysis rental cost/performance data computers 1951 1963 knight found grosch law held commercial scientific operations modern analysis data found grosch law applied commercial operations separate study knight found grosch law apply computers 1963-1967 also confirmed modern analysis paul strassmann asserted 1997 never clear whether grosch law reflection ibm priced computers whether related actual costs provided rationale bigger computer always better ibm sales force used grosch rationale persuade organizations acquire computing capacity needed grosch law also became justification offering time-sharing services big data centers substitute distributed computing grosch stated law useful 1960s 1970s today originally intended law means pricing computing services
Computer architecture
lynx web browser lynx customizable text-based web browser use cursor-addressable character cell terminals oldest web browser still general use active development started 1992 lynx product distributed computing group within academic computing services university kansas initially developed 1992 team students staff university lou montulli michael grobe charles rezac hypertext browser used solely distribute campus information part campus-wide information server browsing gopher space beta availability announced usenet 22 july 1992 1993 montulli added internet interface released new version 2.0 browser garrett blythe created doslynx april 1994 later joined lynx effort well foteos macrides ported much lynx vms maintained time 1995 lynx released gnu general public license maintained group volunteers led browsing lynx consists highlighting chosen link using cursor keys links page numbered entering chosen link number current versions support ssl many html features tables formatted using spaces frames identified name explored separate pages lynx inherently display various types non-text content web images video launch external programs handle image viewer video player unlike web browsers lynx support javascript adobe flash websites require work correctly speed benefits text-only browsing apparent using low bandwidth internet connections older computer hardware may slow render image-heavy content lynx support graphics web bugs track user information fetched therefore web pages read without privacy concerns graphic web browsers however lynx support http cookies also used track user information lynx therefore supports cookie whitelisting blacklisting alternatively cookie support disabled permanently conventional browsers lynx also supports browsing histories page caching raise privacy concerns lynx accepts configuration options either command-line options configuration files 142 command line options according help message template configuration file codice_1 lists 233 configurable features overlap two although command-line options codice_2 matched codice_1 addition pre-set options command-line configuration file lynx behavior adjusted runtime using options menu overlap settings lynx implements many runtime optional features optionally controlled setting configuration file allowing choices saved separate writable configuration file reason restricting options saved originated usage lynx common mid-1990s i.e. using lynx front-end application internet accessed dial-in connections refreshable braille display text-to-speech–friendly interface lynx used internet access visually impaired users lynx substitutes images frames non-textual content text codice_4 codice_5 codice_6 html attributes allows hiding user interface elements browser becomes specifically suitable use cost-effective general purpose screen reading software version lynx specifically enhanced use screen readers windows developed indian institute technology madras lynx also useful accessing websites remotely connected system graphical display available despite text-only nature age still used effectively browse much modern web including performing interactive tasks editing wikipedia since lynx take keystrokes text file still useful automated data entry web page navigation web scraping consequently lynx used web crawlers web designers may use lynx determine way search engines web crawlers see sites develop online services provide lynx view given web page available lynx also used test websites performance one run browser different locations remote access technologies like telnet ssh one use lynx test web site connection performance different geographical locations simultaneously another possible web design application browser quick checking site links lynx originally designed unix-like operating systems though ported vms soon public release systems including dos microsoft windows classic mac os os/2 included default openbsd installation openbsd 2.3 may 1998 5.5 may 2014 main tree prior july 2014 subsequently made available ports tree also found repositories linux distributions well homebrew fink repositories macos ports beos minix qnx amigaos os/2 also available sources built many platforms e.g. mention made google android operating system
Internet protocols
digger gold digger gold common slang term gold recovered electronics components board fingers cpus connector pins gold fingers boards circuits often stripping solution used remove gold board material nitric acid also works well regard many gold components soldered boards silver-based solders soluble nitric acid gold dissolving metals solution digger gold recovered dissolution gold aqua regia subsequent selective precipitation gold using ferrous sulfate another selective reducing agent hydrazine
Computer security
elvees multicore multicore series 32-bit microprocessors embedded dsp cores developed elvees russia microprocessor mips32 core called riscore32 elvees optionally fpu arm cortex-a9 core processors series radiation hardened rad-hard space applications
Computer architecture
commodore pc compatible systems commodore pc compatible systems range ibm pc compatible personal computers introduced 1984 home computer manufacturer commodore business machines incompatible commodore prior commodore 64 amiga architectures generally regarded good serviceable workhorse pcs nothing spectacular well-established commodore name seen competitive asset 1984 commodore signed deal intel second source manufacture intel 8088 cpu used ibm pc along license manufacture computer based dynalogic hyperion unknown whether systems produced sold 1987 first model released pc-10 sold 559 without monitor sold alongside commodore amiga commodore 64c/128 lines home graphics computers pc10 comparable market blue chip pc leading edge model tandy 1000 line pc compatibles line consists following models
Computer architecture
stormy peters stormy peters information technology industry analyst prominent free open source software foss advocate promoting business use foss advocates consultant conference speaker co-founded later appointed executive director gnome foundation previously worked mozilla cloud foundry works red hat peters birth name robyn however gone name since childhood peters completed bachelor arts major computer science rice university initially worked software engineer hewlett-packard unix development team approximately 1999 peters managing hp-ux desktop development became aware gnome project team decided provide gnome hpux peters role explaining open source business intellectual property models hewlett-packard management later founded hewlett-packard open source program office 2000 became one founding members gnome foundation advisory board december 2005 peters became director product management openlogic open source services company july 2008 peters left openlogic became executive director gnome foundation role coordinating sponsors business development marketing november 2010 left mozilla since august 2011 member gnome board directors peters given keynote talks many open source conferences including open source business conference linux.conf.au 2008 2009 gnome.asia summit beijing ho chi minh city respectively ohio linuxfest 2010
Operating systems
mark steedman mark jerome steedman fba frse born 18 september 1946 computational linguist cognitive scientist steedman graduated university sussex 1968 b.sc experimental psychology university edinburgh 1973 ph.d. artificial intelligence dissertation formal description musical perception gained 1972 advisor prof. h.c. longuet-higgins frs held posts lecturer psychology university warwick 1977–83 lecturer reader computational linguistics university edinburgh 1983-8 associate full professor computer information sciences university pennsylvania 1988–98 held visiting positions university texas austin max planck institute psycholinguistics nijmegen university pennsylvania philadelphia steedman currently holds chair cognitive science school informatics university edinburgh 1998- works computational linguistics artificial intelligence cognitive science generation meaningful intonation speech artificial agents animated conversation communicative use gesture tense aspect combinatory categorial grammar ccg also interested computational musical analysis combinatory logic
Computational linguistics
ibm rivina rivina experimental 64-bit powerpc microprocessor built ibm 2000 successor guts gigahertz unit test site purpose build processor able reach high frequencies first microprocessors reach surpass 1 ghz mark project work conducted fewer twenty engineers course two years idea use aggressive circuit design techniques carefully crafted floorplan microarchitecture keeping short six stage pipeline guts supported subset 100 mainly integer instructions powerpc instruction set rivina used complete 64-bit powerpc specification including dual precision floating point address translation guts small single cycle 4 kb l1 cache rivina used two-cycle two set associative 64 kb cache instead processor comprised 19 million transistors manufactured using ibm cmos 7s 0.22 μm copper fabrication process able reach 1.15 ghz dissipating 112 watts 101 °c
Computer architecture
linker computing computing linker link editor computer utility program takes one object files generated compiler assembler combines single executable file library file another 'object file simpler version writes output directly memory called loader though loading typically considered separate process computer programs typically composed several parts modules parts/modules need contained within single object file cases refer means symbols addresses modules mapped memory addresses linked execution typically object file contain three kinds symbols compilers object file result compiling one input source code file program comprises multiple object files linker combines files unified executable program resolving symbols goes along linkers take objects collection called library runtime library linkers include whole library output include files referenced object files libraries library linking may thus iterative process modules included requiring additional modules linked libraries exist diverse purposes one system libraries usually linked default linker also takes care arranging objects program address space may involve relocating code assumes specific base address another base since compiler seldom knows object reside often assumes fixed base location example zero relocating machine code may involve re-targeting absolute jumps loads stores executable output linker may need another relocation pass finally loaded memory execution pass usually omitted hardware offering virtual memory every program put address space conflict even programs load base address pass may also omitted executable position independent executable unix variants sintran iii process performed linker assembling object files program called loading loading executable code onto file additionally operating systems program handles jobs linking loading program dynamic linking many operating system environments allow dynamic linking deferring resolution undefined symbols program run means executable code still contains undefined symbols plus list objects libraries provide definitions loading program load objects/libraries well perform final linking approach offers two advantages also disadvantages static linking result linker copying library routines used program executable image may require disk space memory dynamic linking portable since require presence library system runs static linking also prevents dll hell since program includes exactly versions library routines requires conflict programs program using routines library require entire library installed compiler information layout objects final output take advantage shorter efficient instructions place requirement address another object example jump instruction reference absolute address offset current location offset could expressed different lengths depending distance target generating conservative instruction usually largest relative absolute variant depending platform adding relaxation hints possible substitute shorter efficient instructions final link step performed input objects read assigned temporary addresses linker relaxation pass subsequently reassigns addresses may turn allow relaxations occur general substituted sequences shorter allows process always converge best solution given fixed order objects case relaxations conflict linker needs weigh advantages either option instruction relaxation typically occurs link-time inner-module relaxation already take place part optimising process compile-time cases relaxation also occur load-time part relocation process combined dynamic dead-code elimination techniques ibm system/360 mainframe environments os/360 including z/os z/architecture mainframes type program known linkage editor name implies linkage editor additional capability allowing addition replacement and/or deletion individual program sections operating systems os/360 format executable load-modules containing supplementary data component sections program individual program section replaced parts program updated relocatable addresses references corrected linkage editor part process one advantage allows program maintained without keep intermediate object files without re-compile program sections n't changed also permits program updates distributed form small files originally card decks containing object module replaced systems object code form format 80-byte punched-card images updates introduced system using medium later releases os/360 subsequent systems load-modules contain additional data versions components modules create traceable record updates term linkage editor construed implying program operates user-interactive mode like text editor intended batch-mode execution editing commands supplied user sequentially organized files punched cards dasd magnetic tape tapes often used initial installation os
Programming language topics
veracode veracode application security company based burlington massachusetts founded 2006 company provides automated cloud-based service securing web mobile third-party enterprise applications veracode provides multiple security analysis technologies single platform including static analysis dynamic analysis mobile application behavioral analysis software composition analysis march 9 2017 ca technologies announced acquiring veracode approximately 614 million cash april 3 2017 ca technologies announced completed acquisition veracode july 11 2018 broadcom announced acquiring veracode parent ca technologies 18.9 billion cash november 5 2018 broadcom announced completed acquisition ca technologies thus officially became new owner veracode business day thoma bravo private equity firm headquartered san francisco california announced agreed acquire veracode broadcom 950 million cash veracode founded chris wysopal christien rioux former engineers stake cambridge massachusetts-based security consulting firm known employing former “ white hat ” hackers l0pht heavy industries much veracode software written rioux 2007 company launched securityreview service used test code order find vulnerabilities could lead cybersecurity breaches hacking service intended used alternative penetration testing involves hiring security consultant hack system november 29 2011 company announced appointed robert t. brennan former ceo iron mountain incorporated new chief executive officer company issued report cybersecurity june 2015 report found sectors failed industry-standard security tests web mobile applications government worst performing sector regards fixing security vulnerabilities report issued company december 2015 found four five applications written popular web scripting languages contain least one critical risks industry-standard security benchmark 2014 veracode customers included three top four banks fortune 100 fortune reported march 2015 veracode planned file initial public offering ipo later year order go public major investors company include .406 ventures accomplice starvest partners meritech capital partners funding round announced september 2014 firm raised late-stage investment led wellington management company participation existing investors 2013 veracode ranked 20th forbes list top 100 promising companies america veracode named one 20 coolest cloud security vendors 2014 cloud 100 crn magazine gartner named veracode leader four consecutive years 2013 2014 2015 2016 gartner magic quadrant application security testing
Computer security
karl lieberherr karl j. lieberherr professor computer science northeastern university boston studies eth zurich obtaining m.s 1973 ph.d. 1977 wrote first book adaptive programming work theme one several secondary influences development aspect-oriented programming adaptive programming tries create applications easy maintain evolve creating new abstraction layer design implementation object-oriented applications concept takes encapsulation new level allowing changes way object works without changing interface objects technique solves situations object takes assumptions objects work change object takes assumption creating chain effect rest system aspect oriented programming affects way application created following directives concept one could create separate objects treat data process separated way allows flexible application change evolve easily
Programming language topics
hit-and-run ddos hit-and-run ddos type denial-of-service ddos attack uses short bursts high volume attacks random intervals spanning time frame days weeks purpose hit-and-run ddos prevent user service using service bringing host server type attack distinguished persistent ddos attack continues attacker stops attack host server able defend ddos attack characterized explicit attempt attackers prevent legitimate users service using service hit-and-run ddos accomplished using high volume network application attacks short bursts attacks last long enough bring server hosting service normally 20 60 minutes attack repeated every 12 24 hours period days weeks causing issues company hosting service hit-and-run ddos sometimes used test ddos attack attacker inject bad packets network test online functioning network verified functioning attacker use persistent ddos attack hit-and-run ddos exploits anti-ddos software services used defend prolonged ddos attacks activating software take longer actual attack allowing denial service ddos protection start defend attack
Computer security
deputy director national security agency deputy director national security agency highest-ranking civilian within national security agency senior civilian nsa deputy director acts agency chief operating officer guiding directing strategies policy serves principal advisor director nsa deputy director reports nsa director required technically experienced civilian current deputy director george c. barnes armed forces security agency afsa predecessor nsa nowiki /nowiki november 1950 april 1951 deputy director service
Computer security
ocfs2 oracle cluster file system ocfs second version ocfs2 shared disk file system developed oracle corporation released gnu general public license first version ocfs developed main focus accommodate oracle database management system used cluster computing posix-compliant file system version 2 posix features included ocfs2 version 2 integrated version 2.6.16 linux kernel initially marked experimental alpha-test code restriction removed linux version 2.6.19 kernel version 2.6.29 late 2008 features included ocfs2 access control lists quotas ocfs2 used distributed lock manager resembles openvms dlm much simpler oracle announced version 1.6 november 2010 included copy write feature called reflink
Computer file systems
phy chip phy abbreviation physical layer electronic circuit usually implemented chip required implement physical layer functions osi model phy connects link layer device often called mac acronym medium access control physical medium optical fiber copper cable phy device typically includes physical coding sublayer pcs physical medium dependent pmd layer functionality ethernet phy component operates physical layer osi network model implements ethernet physical layer portion 1000base-t 100base-tx 10base-t standards specifically ethernet phy chip implements hardware send receive function ethernet frames interfaces analog domain ethernet line modulation digital domain link-layer packet signaling phy usually handle mac addressing link layer job similarly wake-on-lan boot rom functionality implemented network interface card nic may phy mac functionality integrated one chip separate chips examples include microsemi simpliphy synchrophy vsc82xx/84xx/85xx/86xx family marvell alaska 88e1310/88e1310s/88e1318/88e1318s gigabit ethernet transceivers offerings intel ics
Internet protocols
drakconf drakconf mandriva control center computer program written perl configuration mandriva linux linux distribution tool allows easy configuration mandriva licensed open-source gnu general public license also used mageia fork mandriva called mageia control center part so-called drakxtools specifically designed linux distribution running command-line x window system environment however source code available could ported distributions tool key feature mandriva linux puts many configuration tools together one place easier user new linux configuring system instead changing configuration files using text editor
Operating systems
contextual deep linking contextual deep linking form deep linking mobile apps links specific content within app rather generic welcome screen app basic mobile deep linking typically allows deep link content apps ’ already downloaded contextual deep linking allows pass information app store referring information passed app store ios google play bringing user content links within app whether app previously installed
Web technology
george springer mathematician george springer september 3 1924 – february 18 2019 american mathematician computer scientist professor emeritus computer science indiana university bloomington springer perhaps best known coauthor daniel p. friedman widely used textbook scheme art computer programming scheme one two main dialects lisp three pioneering books scheme scheme programming language 1982 r. kent dybvig structure interpretation computer programs 1985 harold abelson gerald jay sussman julie sussman scheme art computer programming 1989 springer friedman springer earned bachelor degree 1945 case western reserve university named case institute technology master degree 1946 brown university earned phd 1949 harvard university thesis coefficient problem univalent mappings exterior unit circle lars ahlfors 1949 1951 springer c.l.e moore instructor massachusetts institute technology 1951 1954 assistant professor northwestern university academic year 1954/1955 fulbright lecturer visiting professor university münster worked heinrich behnke autumn 1955 springer became associate professor subsequently professor university kansas academic year 1961/1962 fulbright lecturer visiting professor university würzburg 1964 professor mathematics 1987 also professor computer science indiana university bloomington academic year 1971/1972 visiting professor imperial college london springer began career working function theory one several complex variables wrote textbook riemann surfaces 1980s turned toward computer science working programming languages springer born cleveland ohio 1924 family jewish immigrants poland met wife annemarie née keiner harvard university married 1950 death 2011 three children springer died february 18 2019 aged 94
Programming language topics
forfiles codice_1 computer software utility microsoft windows selects files runs command file selection criteria include name last modified date command specifier supports special syntax options used directly command-line batch files scripts codice_1 command originally provided add-on windows nt resource kits became standard utility windows vista part new management features codice_1 command several command-line switches switches parameters given outputs name every file current directory command string executed given except noted sequences form 0x literal ff represents two-digit hexadecimal number replaced corresponding single-byte value used embed non-printing ascii characters extended ascii characters sequence replaced literal quotation mark though recommended use instead hide command interpreter several variables provided used command placeholders values file variables technically required must used command vary file date switch /d selects files based last modified date given date argument date argument given literal date mm/dd/yyyy format date formats accepted alternatively date argument given number case taken mean age days i.e. day date days present date date argument begins minus files modified given date selected older file modified earlier otherwise files modified given date selected younger files modified later explicit plus may given default note modes select files given date way select files given date without also either following command selects log files *.log windows directory 30 days older lists date following command would delete files use required examples internal command processor rather external utility programs
Operating systems
timeline operating systems article presents timeline events history computer operating systems 1951 current day narrative explaining overall developments see history operating systems
Operating systems
vx-rexx vx-rexx highly extensible rexx gui development system os/2 developed watcom initially released 1993 much new code ecomstation written using vx-rexx though rexx 3gl vx-rexx interface allows build rexx programs using combination 3gl 4gl techniques drag-and-drop interface inserting code allows quite complex programs built without actually entering code vx-rexx interface written vx-rexx means extended and/or modified using rexx code also number macro hooks used add functionality directly toolbox contains number standard tools static text group box push button radio button check box picture box image push/radio button list box combo box drop-down single multiline entry field slider specialized ones container value-set notebook dde client timer additional controls built using som distributed .dll files anything simple variants existing controls tri-state check box self-validating entry field completely custom-drawn controls example self-contained tic-tac-toe board written c compiled added vx-rexx project
Operating systems
ibm spectrum scale ibm spectrum scale high-performance clustered file system software developed ibm deployed shared-disk shared-nothing distributed parallel modes used many world largest commercial companies well supercomputers top 500 list example filesystem asc purple supercomputer composed 12,000 processors 2 petabytes total disk storage spanning 11,000 disks 2015 spectrum scale known ibm general parallel file system gpfs like typical cluster filesystems spectrum scale provides concurrent high-speed file access applications executing multiple nodes clusters used aix 5l clusters linux clusters microsoft windows server heterogeneous cluster aix linux windows nodes addition providing filesystem storage capabilities spectrum scale provides tools management administration spectrum scale cluster allows shared access file systems remote spectrum scale clusters spectrum scale available ibm aix since 1998 linux since 2001 windows server since 2008 spectrum scale known gpfs began tiger shark file system research project ibm almaden research center early 1993 tiger shark initially designed support high throughput multimedia applications design turned well suited scientific computing another ancestor spectrum scale ibm vesta filesystem developed research project ibm thomas j. watson research center 1992 1995 vesta introduced concept file partitioning accommodate needs parallel applications run high-performance multicomputers parallel i/o subsystems partitioning file sequence bytes rather multiple disjoint sequences may accessed parallel partitioning abstracts away number type i/o nodes hosting filesystem allows variety logically partitioned views files regardless physical distribution data within i/o nodes disjoint sequences arranged correspond individual processes parallel application allowing improved scalability vesta commercialized piofs filesystem around 1994 succeeded gpfs around 1998 main difference older newer filesystems gpfs replaced specialized interface offered vesta/piofs standard unix api features support high performance parallel i/o hidden users implemented hood spectrum scale available ibm aix since 1998 linux since 2001 windows server since 2008 spectrum scale offered part ibm system cluster 1350 today spectrum scale used many top 500 supercomputers listed top 500 supercomputing sites web site since inception spectrum scale successfully deployed many commercial applications including digital media grid analytics scalable file services 2010 ibm previewed version gpfs included capability known gpfs-snc snc stands shared nothing cluster officially released gpfs 3.5 december 2012 known fpo features spectrum scale file systems include high availability ability used heterogeneous cluster disaster recovery security dmapi hsm ilm spectrum scale clustered file system breaks file blocks configured size less 1 megabyte distributed across multiple cluster nodes system stores data standard block storage values includes internal raid layer called spectrum scale raid virtualize volumes redundancy parallel access much like raid block storage system also ability replicate across volumes higher file level features architecture include hadoop hdfs filesystem designed store similar greater quantities data commodity hardware — datacenters without raid disks storage area network san compared spectrum scale storage pools allow grouping disks within file system administrator create tiers storage grouping disks based performance locality reliability characteristics example one pool could high-performance fibre channel disks another economical sata storage fileset sub-tree file system namespace provides way partition namespace smaller manageable units filesets provide administrative boundary used set quotas specified policy control initial data placement data migration data single fileset reside one storage pools file data resides migrated based set rules user defined policy two types user defined policies spectrum scale file placement file management file placement policies direct file data files created appropriate storage pool file placement rules selected attributes file name user name fileset file management policies allow file data moved replicated files deleted file management policies used move data one pool another without changing file location directory structure file management policies determined file attributes last access time path name size file spectrum scale policy processing engine scalable run many nodes allows management policies applied single file system billions files complete hours
Computer file systems
resource measurement facility resource measurement facility rmf performance monitor z/os operating system also collects data long-term performance analysis capacity planning product consists following components rmf significantly enhanced every release z/os operating system – approximately year – enhancements occurring support new hardware new processor models
Operating systems
spywareblaster spywareblaster antispyware antiadware program microsoft windows designed block installation activex malware spywareblaster prevents download installation execution spyware adware browser hijackers dialers malicious programs based activex spywareblaster works basis blacklists activating killbit clsid known malware programs effectively preventing infecting protected computer approach differs many anti-spyware programs typically offer user chance scan hard drive computer memory remove unwanted software installed spywareblaster also allows user prevent privacy risks tracking cookies another feature ability restrict actions websites known distributors adware spyware spywareblaster supports several web browsers including internet explorer mozilla firefox google chrome spywareblaster currently distributed freeware non-commercial users
Computer security
urpmi urpmi package management tool installing removing updating querying software packages local remote networked media wraps around rpm package manager rpm package manager user suffer often-encountered dependency hell works official sources mandriva unofficial sources penguin liberation front graphical front-end rpmdrake made 2 parts addition now-defunct mandriva linux also used urpmi developed experiment pascal rigaux pixel address rpm install limitations maintained françois pons different mandriva employees currently 2010-2013 maintained thierry vignaud maintainer rpmdrake one co-maintainers drakx installer tools mandriva continued job mageia version used mandriva future products based mageia per øyvind karlsen maintains fork urpmi rosa linux backporting fixes improvements thierry vignaud work version used mandriva business server based mageia
Operating systems
rs-449 rs-449 specification also known eia-449 tia-449 defines functional mechanical characteristics interface data terminal equipment typically computer data communications equipment typically modem terminal server effort replace rs-232c offering much higher performance longer cable lengths emerged unwieldy system requiring dc-37 de-9 connectors effort eventually abandoned favor rs-530 used single db-25 connector full title standard eia-449 general purpose 37-position 9-position interface data terminal equipment data circuit-terminating equipment employing serial binary data interchange late 1970s eia began developing two new serial data standards replace rs-232 rs-232 number issues limited performance practicality among relatively large voltages used signalling +5 -5v mark space supply +12v power supply typically required made somewhat difficult implement market rapidly dominated +5/0v transistor-transistor logic ttl circuitry even lower-voltage cmos implementations high voltages unbalanced communications also resulted relatively short cable lengths nominally set maximum although practice could somewhat longer running slower speeds reason large voltages due ground voltages rs-232 included protective ground signal ground standard define implemented often case protective ground left unconnected signal ground connected ground ends result slight difference ground potential two ends cable voltage signal ground pin might zero large signal voltages needed provide positive signal case address problem new rs-422 rs-423 standards used well-defined grounding always based sender reference made signal 400 mv reference case rs-422 instance every signal second pin operating opposite voltage thereby balancing voltages always providing positive signal process starting decision made unbundle mechanical aspects standard electrical former becoming rs-449 standards track primary difference rs-422 rs-423 former return line every signal later single shared signal ground meant rs-422 double number signal wires along changes number connections began grow point even rs-423 functionally similar rs-232 longer fit db25 connector led use larger dc-37 even enough pins support rs-422 solved adding additional ground wires separate de-9 connector resulted horrendous number wires conclusion 1983 success ... remains seen standard rarely used although could found network communication equipment eia-449-1 rescinded january 1986 superseded eia/tia-530-a final version eia-449-1 withdrawn september 2002 widespread use rs-422/423 early apple macintosh computers used simple 9-pin din connector inter-machine links used three-wire connectors
Internet protocols
aggregate server access protocol aggregate server access protocol used reliable server pooling rserpool framework communication
Internet protocols
pckeeper pckeeper advertised optimization services package featuring set software utilities windows os owned essentware s.a. company based bratislava slovakia includes 2 separate products windows pckeeper live pckeeper antivirus pckeeper originally developed zeobit llc founded 2009 slava kolomiychuk pckeeper released september 2010 kromtech alliance acquired pckeeper mackeeper zeobit may 2013 2015 pckeeper changed legal owners kromtech alliance corp. essentware s.a. kromtech alliance made decision focus products mac users essentware s.a. office registered panama principal officers developers company remain ukraine two class action lawsuits filed kromtech mac os version pckeeper mackeeper first lawsuit filed illinois alleges contrary zeobit marketing in-software representations however neither free trial full registered versions mackeeper perform credible diagnostic testing user mac instead zeobit intentionally designed mackeeper invariably ominously report consumer mac needs repair at-risk due harmful errors privacy threats problems regardless computer actual condition second complaint filed holly yencha pennsylvania alleges free starter version mackeeper identifies harmless programs critical problems complaint claims mackeeper reporting algorithm even brand new computers 'critical condition require repair purchasing full version pckeeper live sometimes installed users pcs partner programs cause unwanted pop-up windows pckeeper live offers 13 different pc services 4 categories human assistance find fix geek demand live support security anti-theft data hider shredder files recovery cleaning disk cleaner disk explorer duplicates finder uninstaller optimization context menu manager startup manager pckeeper sometimes advertised pop ads many pop ads occur pornography websites pckeeper live rated good 3.5 5 pcmag editor stating improves pc performance great novice users utility wo n't clean pc well iolo system mechanic considering accessibility wallet friendliness one check kromtech pckeeper live human specialists unique price plans make tune-up utility worthy consideration rival applications offer better pc improvement techradar.pro rates 3 5 stars noted overall pckeeper light-weight tool wo n't annoy pop-up windows consider fact pckeeper live optimization features easily found free tools simply useful price kromtech solution seems unreasonably high kromtech 24/7 support elevates pckeeper live overpriced utility program tool even non-geek use optimize his/her computer pckeeper reviewed wide range tech experts reviewed turkish french portuguese spanish german review pcmag thus described pckeeper live improves pc performance multiple price points advice microsoft-certified computer specialists anti-theft technology gained 3,5 5 points pckeeper antivirus integrates avira secure anti-virus api savapi official interface avira ’ anti-malware scanning engine pckeeper antivirus block malware-hosting url phishing url according virus bulletin pckeeper antivirus pro scored 96.1 rap tests set stability level stable pckeeper antivirus got vb100 award pckeeper antivirus version 1.x received 2 opswat gold certifications antispyware antivirus categories german organization av-test.org tested 25 anti-virus programs testers found ahnlab microsoft windows defender pckeeper antivirus lowest performing anti-virus applications windows 8.1 pcmag rated pckeeper antivirus good 3 5 noting pckeeper antivirus streamlined attractive interface easy use non-techies good score hands-on malware blocking testing however scored poorly independent lab testing chat based support soured fact served misinformation pc mag concluded 'd better panda free antivirus 2015 editors choice free antivirus slightly edged pckeeper tests swept field lab tests high marks across board price pckeeper could bitdefender antivirus plus 2015 kaspersky anti-virus 2015 named editors choice paid antivirus better choice may 2013 pckeeper let customers decide much pay software launching pay want campaign
Computer security
eric robi eric robi american forensic computer examiner president computer forensic consulting firm university instructor advanced computer forensics eric robi founded federal forensics group 2002 subsequently renamed elluma discovery 2010 reflect expanded range services growth electronic discovery computer forensics marketplace also instructor advanced computer forensics california state university fullerton extended education taught classes computer programming multimedia tools california state university los angeles eric obtained certified computer examiner certification southeast cybercrime institute kennesaw state university 2004 rendered testimony approximately 14 trials nasd arbitration many hearings depositions conducted computer forensic work 250 cases june 2010 eric robi interviewed fox 11 news los angeles computer scareware january 2009 interviewed fox 11 news cell phone spyware may 2009 also interviewed cbs news dallas cell phone spyware technology may 2010
Computer security
sendo x sendo x sendo first series 60 based high-end phone developed sendo switched microsoft symbian series 60 platforms among unique features sendo x one ability users download new firmware sendo website upgrade phone home computer sendo shunted multiple times sendo z100 new release dates cancelling phone november 2002 announced switch microsoft smartphone 2002 operating system series 60 platform decision resulted 2004q2 release sendo x phone made celestica czech republic however least model number stickers mention made netherlands referring distribution centre arnhem netherlands.. sendo pinball funny farmer sendo licensed opera mobile 6.2 updates worked version 8.0 mobilegazette.com impressed feature richness without over-bloated call phone stylish
Operating systems
zap file .zap file zero administration package text file allows publishing application user microsoft windows system windows 2000 xp professional windows vista windows 7 professional applications .msi file exist used active directory domains installed using group policy .zap file simple complicated system administrator wishes make two required fields .zap file application name called friendly name setup command line information optional .zap file begins title line consisting word application inside single square brackets underneath come entry fields two required fields friendlyname name setupcommand \\server\share\setupfile also add optional entries displayversion publisher note displayversion publisher require quotation marks around variables simple example .zap file .zap file restricted .msi file rolled back application fails install correctly use elevated privileges install i.e user needs rights install software usually given group policy install first use install separate feature first use many .zap files require user intervention overcome systems administrator creates batch file runs quiet silent install batch file command however running executable file setup.exe often bypasses quiet passive silent installation switches even specified setupcommand addition .zap files run automatically prior user logon instead user must access add/remove programs within windows control panel select add new programs select installation user must access location .zap file located access location setup files locations different otherwise able install application .zap files assigned computers must published users therefore user moves another computer even temporarily install application machine whether program finally .zap files automatically uninstall user longer requires software instead software remains installed machine permanently unlike .msi installation set uninstall computer removed relevant ou creating .zap file placing accessible share usually creating active directory group access location systems administrator needs create group policy object open editing screen select user configuration software settings software installation create new package location .zap file since gpos default .msi system admin needs ensure search .zap files instead .msi files accepting new package assigning gpo relevant organizational unit ou publish application user need reload group policy server manages gpo done either logging running gpupdate command line
Operating systems
lapdm lapdm data link layer protocol used gsm cellular networks lapdm forms layer 2 um interface base transceiver station mobile station say used radio link cellular network subscriber handset lapdm derived much older link layer protocol called hdlc specified 3gpp specifications ts 04.05 ts 04.06 lapdm similar isdn layer 2 lapd simplifications another important difference lapdm lapd establishment contention resolution procedure gsm 04.06 section 5.4.1.4 wherein ms sends l3 message information field sabm frame echoed back bts corresponding ua frame procedure required lapdm possibility handset accidentally attempting use wrong channel lapd require contention resolution since hard-wired isdn devices accidentally use wrong channel associated control procedure used layer 2 iden rf interface similar lapdm
Internet protocols
soap attachments soap attachments swa mime web services use web services send receive files combination soap mime primarily http note swa new specification rather mechanism using existing soap mime facilities perfect transmission files using web services invocations swa w3c note submitted proposal adopted w3c instead mtom w3c recommendation handling binary data soap messages release soap 1.2 additionally note soap 1.2 attachment feature published
Web technology
licklider transmission protocol licklider transmission protocol point point protocol use deep space links ltp commonly seen standard underlying convergence layer protocol bundle protocol rfc 5050 supporting wide selection networks ltp named honor american computer scientist joseph carl robnett licklider ltp designed run directly data link layer e.g aos also run user datagram protocol udp e.g used sensor network private network bandwidth contestation ’ issue software debug purposes therefore address issues like routing congestion control originally designed support “ long-haul ” transmission interplanetary network design based experiences ccsds file delivery protocol cfdp developed space communication features application divides data send two parts either part may size 0 ltp engine stores data queue checks whether link towards destination available starts transmission link available data remains queue transmission starts soon so-called “ link state cue ” arrives either underlying link layer management information base given red data send last segment red data marked “ end red data ” flag timer started segment absent green data send “ end block ” flag set otherwise green data transmitted last segment part gets marked “ end block ” flag receiver issues report segment sender received “ end red data ” segment data complete report segment transmitted timer started upon arrival report segment sender cancels timer queues report-acknowledgement receiver informs application red data successfully transmitted receiver receives report-acknowledgement cancels timer transmission red data completed transmission completed “ end block ” segment arrived two reference implementations ltp
Internet protocols
share permissions share permissions implemented ntfs fat file systems shared resource different permissions read change full control permissions also implemented samba
Computer file systems
karen sandler karen sandler executive director software freedom conservancy former executive director gnome foundation attorney former general counsel software freedom law center march 2014 sandler executive director software freedom conservancy june 2011 march 2014 sandler served executive director gnome foundation leadership gnome embarked ambitious project draw women free open source software outreach program women october 31 2005 june 21 2011 worked software freedom law center sflc first counsel organization general counsel january 6 2010 sflc sandler advised wide range free open source software organizations free software foundation apache software foundation x.org foundation software public interest software freedom conservancy sflc became public speaker issues free open source software conferences oscon scale linuxcon 2010 led initiative advocating free software implantable medical devices exploring issues surrounding software implanted medical device defibrillator regulates inherited heart condition addition work software freedom conservancy sandler also served general counsel pro bono non-profit question copyright also co-host software freedom law show 2008-2010 free freedom 2010- podcasts sandler received 2017 free software award work promoting software freedom working sflc sandler worked associate corporate departments gibson dunn crutcher llp new york clifford chance new york london sandler received law degree columbia law school 2000 james kent scholar co-founder columbia science technology law review received bachelor degree engineering cooper union may 21 2011 married mike tarantino grammy nominated music engineer wedding invitation working paper record player playable record covered number internet publications record contained song sandler tarantino made together
Operating systems
replay 4 replay 4 proprietary backup disaster recovery software windows application servers developed appassure software released september 9 2009 replay 4 uses image-based approach backup taking snapshot moment time provides application integration mission-critical microsoft applications including microsoft exchange sql sharepoint hyper-v. replay 4 also supports windows small business servers domain controllers file servers web servers blackberry enterprise servers replay 4 provides support advanced features block level snapshots incremental forever data capture integrated data deduplication bare-metal restore dissimilar hardware failover virtual machines offsite cloud recovery etc latest version adds ability replicate data off-site storage also incorporates new technology data deduplication replay 4 named 2009 backup disaster recovery software product year storage magazine february 2010 may 2010 replay 4 named new server software product year 8th annual american business awards
Computer security
xprint xprint deprecated printing extension x window system allows application render output printer would display device server portion xprt uses extension xpextension handle paged output devices xprint outputs postscript pcl 3 pcl 5 raster bitmap printer resolution xprint based iso 10175 specifications applications frameworks supporting xprint include mozilla mozilla firefox qt athena motif lesstif toolkits xprint first introduced x11r6.3 rewritten inclusion x11r6.8 removed x.org server may 2008 xprint available separate repository
Programming language topics
d-bus computing d-bus desktop bus software bus inter-process communication ipc remote procedure call rpc mechanism allows communication multiple computer programs processes concurrently running machine d-bus developed part freedesktop.org project initiated havoc pennington red hat standardize services provided linux desktop environments gnome kde freedesktop.org project also developed free open-source software library called libdbus reference implementation specification library confused d-bus indeed implementations d-bus client library also exist gdbus gnome qtdbus qt/kde dbus-java sd-bus part systemd d-bus ipc mechanism initially designed replace software component communications systems used gnome kde linux desktop environments corba dcop respectively components desktop environments normally distributed many processes one providing —usually one— services services may used regular client applications components desktop environment perform tasks due large number processes involved —adding processes providing services clients accessing them— establishing one-to-one ipc communications becomes inefficient quite unreliable approach instead d-bus provides software-bus abstraction gathers communications group processes single shared virtual channel processes connected bus n't know internally implemented d-bus specification guarantees processes connected bus communicate linux desktop environments take advantage d-bus facilities instantiating one bus many process connect number buses provided granted access practice means user process connect system bus current session bus another user session buses even different session bus owned user latter restriction may change future user sessions combined single user bus d-bus provides additional simplifies existing functionality applications including information-sharing modularity privilege separation example information incoming voice-call received bluetooth skype propagated interpreted currently-running music player react muting volume pausing playback call finished d-bus also used framework integrate different components user application instance office suite communicate session bus share data word processor spreadsheet every connection bus identified context d-bus called bus name bus name consists two dot-separated strings letters digits dashes underscores example valid bus name process sets connection bus bus assigns connection special bus name called unique connection name bus names type immutable—it guaranteed wo n't change long connection exists—and importantly ca n't reused bus lifetime means connection bus ever assigned unique connection name even process closes connection bus creates new one unique connection names easily recognizable start the—otherwise forbidden—colon character example unique connection name characters colon particular meaning process ask additional bus names connection provided requested name already used another connection bus d-bus parlance bus name assigned connection said connection owns bus name sense bus name ca n't owned two connections time unlike unique connection names names reused available process may reclaim bus name released —purposely not— another process idea behind additional bus names commonly called well-known names provide way refer service using prearranged bus name instance service reports current time date system bus lies process whose connection owns bus name regardless process bus names used simple way implement single instance applications second instances detect bus name already taken also used track service process lifecycle since bus sends notification bus name released due process termination original conception replacement several component oriented communications systems d-bus shares predecessors object model express semantics communications clients services terms used d-bus object model mimic used object oriented programming languages n't mean d-bus somehow limited oop languages —in fact used implementation written c procedural programming language d-bus process offers services exposing objects objects methods invoked signals object emit methods signals collectively referred members object client connected bus interact object using methods making requests commanding object perform actions instance object representing time service queried client using method returns current date time client also listen signals object emits state changes due certain events usually related underlying service example would service manages hardware devices —such usb network drives— signals new hardware device added event clients instruct bus interested receiving certain signals particular object since d-bus bus passes signals processes registered interest process connected d-bus bus request export many d-bus objects wants object identified object path string numbers letters underscores separated prefixed slash character called resemblance unix filesystem paths object path selected requesting process must unique context bus connection example valid object path however enforced —but also discouraged— form hierarchies within object paths particular naming convention objects service entirely developers service many developers choose namespace using reserved domain name project prefix e.g every object inextricably associated particular bus connection exported d-bus point view lives context connection therefore order able use certain service client must indicate object path providing desired service also bus name service process connected bus turn allows several processes connected bus export different objects identical object paths unambiguously members —methods signals— used object specified interface interface set declarations methods including passing returning parameters signals including parameters identified dot-separated name resembling java language interfaces notation example valid interface name despite similarity interface names bus names mistaken d-bus object implement several interfaces least must implement one providing support every method signal defined combination interfaces implemented object called object type using object good practice client process provide member interface name besides member name mandatory ambiguity caused duplicated member names available different interfaces implemented object —otherwise selected member undefined erroneous emitted signal hand must always indicate interface belongs d-bus specification also defines several standard interfaces objects may want implement addition interfaces although technically optional d-bus service developers choose support exported objects since offer important additional features d-bus clients introspection standard interfaces d-bus specification defines number administrative bus operations called bus services performed using object resides bus name bus reserves special bus name manages requests made specifically combination bus name object path administrative operations provided bus defined object interface operations used example provide information status bus manage request release additional well-known bus names d-bus conceived generic high-level inter-process communication system accomplish goals d-bus communications based exchange messages processes instead raw bytes d-bus messages high-level discrete items process send bus another connected process messages well-defined structure even types data carried payload defined allowing bus validate reject ill-formed message regard d-bus closer rpc mechanism classic ipc mechanism type definition system marshaling bus supports two modes interchanging messages client service process every d-bus message consists header body header formed several fields identify type message sender well information required deliver message recipient destination bus name object path method signal name interface name etc. body contains data payload receiver process interprets —for instance input output arguments data encoded well known binary format called wire format supports serialization various types integers floating-point numbers strings compound types also referred marshaling d-bus specification defines wire protocol build d-bus messages exchanged processes within d-bus connection however define underlying transport method delivering messages existing d-bus implementations follow architecture reference implementation architecture consists two main components library equivalent internally uses native lower-level ipc mechanism transport required d-bus messages two processes ends d-bus connection d-bus specification n't mandate particular ipc transport mechanisms available use communications library decides transport methods supports instance linux unix-like operating systems typically uses unix domain sockets underlying transport method also supports tcp sockets communications libraries processes must agree selected transport method also particular channel used communication information defined d-bus calls address unix-domain socket filesystem objects therefore identified filename valid address would codice_1 processes must pass address respective communications libraries establish d-bus connection address also provide additional data communications library form comma-separated codice_2 pairs way example provide authentication information specific type connection supports message bus daemon like used implement d-bus bus processes want connect bus must know bus address address process establish d-bus connection central message bus process scenario message bus daemon selects bus address remainder processes must pass value corresponding equivalent libraries defines different bus address every bus instance provides addresses defined daemon configuration files two processes use d-bus connection exchange messages directly way d-bus normally intended used usual way always use message bus daemon i.e communications central point process establish point-to-point d-bus connection process —client service— sends d-bus message message bus process receives first instance delivers appropriate recipient message bus daemon may seen hub router charge getting message destination repeating d-bus connection recipient process recipient process determined destination bus name message header field subscription information signals maintained message bus daemon case signal propagation messages message bus daemon also produce messages response certain conditions error message process sent message nonexistent bus name d-bus started 2002 havoc pennington alex larsson red hat anders carlsson version 1.0 —considered api stable— released november 2006 heavily influenced dcop system used versions 2 3 kde d-bus replaced dcop kde 4 release implementation d-bus supports posix operating systems port windows exists used qt 4 gnome gnome gradually replaced parts earlier bonobo mechanism also used xfce one earlier adopters nowadays deprecated hardware abstraction layer hal used d-bus export information hardware added removed computer usage d-bus steadily expanding beyond initial scope desktop environments cover increasing amount system services instance networkmanager network daemon bluez bluetooth stack pulseaudio sound server use d-bus provide part services systemd uses d-bus wire protocol communication systemd also promoting traditional system daemons d-bus services logind another heavy user d-bus polkit whose policy authority daemon implemented service connected system bus also used wire protocol alljoyn protocol home automation end alljoyn adds discovery session management security header compression embedded device support makes transport agnostic although several implementations d-bus widely used reference implementation libdbus developed freedesktop.org project designed specification however libdbus low-level implementation never meant used directly application developers reference guide reimplementations d-bus included standard libraries desktop environments programming language bindings freedesktop.org project recommends applications authors use one higher level bindings implementations instead predominance libdbus used d-bus implementation caused terms d-bus libdbus often used interchangeably leading confusion gdbus implementation d-bus based gio streams included glib aiming used gtk+ gnome gdbus wrapper libdbus complete independent reimplementation d-bus specification protocol mate desktop xfce version 4.14 also based gtk+ 3 also use gdbus qtdbus implementation d-bus included qt library since version 4.2 component used kde applications libraries components access d-bus services available system 2013 systemd project rewrote libdbus effort simplify code also resulted significant increase overall d-bus performance preliminary benchmarks bmw found systemd d-bus library increased performance 360 version 221 systemd sd-bus api declared stable libnih project provides light-weight standard library c support d-bus additionally good support cross compiling kdbus project aimed reimplement d-bus kernel-mediated peer-to-peer inter-process communication mechanism beside performance improvements kdbus would advantages arising linux kernel features namespaces auditing security kernel mediating closing race conditions allowing d-bus used boot shutdown needed systemd kdbus inclusion linux kernel proved controversial dropped favor bus1 generic inter-process communication several programming language bindings d-bus developed java c ruby
Internet protocols
automated journalism automated journalism also known algorithmic journalism robot journalism news articles generated computer programs artificial intelligence ai software stories produced automatically computers rather human reporters programs interpret organize present data human-readable ways typically process involves algorithm scans large amounts provided data selects assortment pre-programmed article structures orders key points inserts details names places amounts rankings statistics figures output also customized fit certain voice tone style data science ai companies automated insights narrative science united robots yseop develop provide algorithms news outlets 2016 media organizations used automated journalism early adopters include news providers associated press forbes propublica los angeles times due formulaic nature automation mainly used stories based statistics numerical figures common topics include sports recaps weather financial reports real estate analysis earnings reviews statsheet online platform covering college basketball runs entirely automated program associated press began using automation cover 10,000 minor baseball leagues games annually using program automated insights statistics mlb advanced media outside sports associated press also uses automation produce stories corporate earnings 2006 thomson reuters announced switch automation generate financial news stories online news platform famously algorithm called quakebot published story 2014 california earthquake los angeles times website within three minutes shaking stopped automated journalism sometimes seen opportunity free journalists routine reporting providing time complex tasks also allows efficiency cost-cutting alleviating financial burden many news organizations face however automated journalism also perceived threat authorship quality news precarity employment within industry robot reporters built produce large quantities information quicker speeds associated press announced use automation increased volume earnings reports customers ten times software automated insights data companies produce 150 300-word articles time takes journalists crunch numbers prepare information automating routine stories tasks journalists promised time complex jobs investigative reporting in-depth analysis events francesco marconi associated press stated automation news agency freed 20 percent reporters ’ time focus higher-impact projects automated journalism cheaper content produced within less time also lowers labour costs news organizations reduced human input means less expenses wages salaries paid leaves vacations employment insurance automation serves cost-cutting tool news outlets struggling tight budgets still wish maintain scope quality coverage automated story often confusion credited author several participants study algorithmic authorship attributed credit programmer others perceived news organization author emphasizing collaborative nature work also way reader verify whether article written robot human raises issues transparency concerns perceived credibility automated news critics doubt algorithms fair accurate free subjectivity error attempted influence also remarked machines replace human capabilities creativity humour critical-thinking computers alone lack ability write stories perspective emotion thorough analysis surprising observations among concerns automation loss employment journalists interest saving costs mentioned previously news organizations inclined cut staff switching cheaper faster machines 2014 annual census american society news editors announced newspaper industry lost 3,800 full-time professional editors falling 10 within year biggest drop since industry cut 10,000 jobs 2007 2008 future automated journalism seen beneficial however others would argue could detrimental industry removes sense objectivity stated benefits section costs efficiency robot journalism present proven however utilizing system automation may separate audience article happen human journalist writing world issues may personal writing style attached story whereas article written using automation would result story bland personality automated articles written within firm would style similar sense journalist would lost process question regarding issue problems exist current technologies 2020s industry may change new technological advancements may made implement fix issues currently associated thought using robot journalism nieman reports article identifies whether machines replace journalists addresses many concerns around concept automated journalism practices discuss benefits surrounding concepts automated journalism beneficial industry however ultimately support idea human journalists stay around matter much technology changes rationale supported thought benefits automation never outweigh perks skilled journalist date current technological advancements due journalism industry reliance technology industry must stay dynamic shift current trends professionals work within field must field competitive saturated due internet internet caused many shifts way industry operates also opened avenue citizen journalist participate media much frequently due many people owning smartphones access online databases media sites many people taken roles amateur journalists overall benefited industry efficiency perspective however seen hurting professionals work journalism field
Computational linguistics
él visual novel elle also known japanese adult visual novel developed elf corporation originally released june 13 1991 remake produced elf corporation retitled él released september 29 2000 green bunny produced anime original video animation titled él released two volumes 2001 series depicts survivors nuclear war gathered single tightly-monitored city december 1999 nuclear war devastates earth renders world inhospitable ensure survival humanity megaroasu plan carried terrorist organization called black widow attacks tries disrupt plan story takes place 2008 player takes role unnamed hero unknown past expert marksman heroine el miles includes ensemble minor characters advance plot game simple click adventure one ending games genre 2000 remake story exception setting refocused 2030 graphics updated included three-dimensional computer graphics script dubbed cast professional voice actors cast credits private released nuclear war triggered environmental pollution group survivors start megaro earth project city built dome protect last fragments humanity el miles sniper – policewoman defending city terrorist organization black widows el placed charge protecting parsley pop singer nearly raped black widow operatives singer finds falling love el attempts seduces el discovers fellow snipers becoming black widow operatives constantly tormented leader gimmick also unusual blackouts unexplained visions another reality end second episode whole world el miles lived actually 'created dream el man named joe last humanity disrupted parsley first release titled elle originally released june 13 1991 remake produced elf corporation retitled él released september 29 2000 original release pc-9801 software four 5 2hd floppy disks remake released windows 95 98 2000 xp cd green bunny produced anime original video animation titled él released two volumes 2001 nutech digital acquired rights él ova 2001 english release volumes 1 2 box set would follow january 2002 featuring english dub included voice talents adult actresses shelbee myne lola ova credits include kazuma kanezawa director kazuma kanezawa wrote script designs masaki kawai takeo takahashi yukio segami production arms green bunny chris beveridge reviewed english localizations series nutech digital release originally reviewed 2002 positive noting strong visuals seconds cross coloration second episode kitty media release also reviewed favorably among differences nutech digital release redubbing work release strong points ova writing execution surprise ending large cast characters resulted poor development secondary characters visuals original release hold compared newer works 2007 review increasing industry standards
Computer architecture
list features removed windows xp next version windows nt windows 2000 well successor windows windows xp introduced many new features also removed others following list
Operating systems
information trust institute information trust institute iti founded 2004 interdisciplinary unit designed approach information security research systems perspective examines information security looking makes machines applications users trustworthy mission create computer systems software networks society depend trustworthy meaning secure dependable reliable available correct safe private survivable iti stated goal create new paradigm designing trustworthy systems ground validating systems intended trustworthy iti academic/industry partnership focusing application areas electric power financial systems defense homeland security among others brings together 100 researchers representing numerous colleges units university illinois urbana–champaign
Computer security
avast antivirus avast antivirus family internet security applications developed avast microsoft windows macos android ios avast antivirus products include free proprietary versions provide computer security browser security antivirus software firewall anti-phishing antispyware anti-spam among services 2017 avast popular antivirus vendor market largest share market antivirus applications avast programs available internet-connected devices available 45 languages avast product range includes following february 2018 test various antimalware products av-test avast free antivirus earned 6 6 points protection category detecting 100 malware samples used test earning av-test certified seal avast mobile security antivirus app also performed well detected 100 malware samples january 2018 test android malware av-comparatives
Computer security
game center game center got removed home screen ios 10 update still exists today mac os also games ios pop open certain games ios today game center app released apple allows users play challenge friends playing online multiplayer social gaming network games games share multiplayer functionality mac ios versions app game center implemented developers ios 4.1 later mac os x 10.8 later gamekit framework game center available ipod touch 2nd generation later ios 4.1 higher required iphone 3gs later ios 4.1 higher required models ipad ios 4.2 higher required mac computers running os x 10.8 mountain lion later apple tv 4 running tvos apple watch running watchos 3 gaming became major part ios platform apple launched app store july 10 2008 unlike console systems currently market apple unified multiplayer social system platform gap soon filled third parties openfeint plus agon online scoreloop third parties control online gaming environment multiple third parties involved left non-unified experience game center announced ios 4 preview event hosted apple april 8 2010 preview released registered apple developers august released september 8 2010 ios 4.1 iphone 4 iphone 3gs ipod touch 2nd generation 4th generation included ios 4.2 ipad updated version game center released ios 5 featured addition turn-based gaming player photos friend suggestions achievement points ios 6 update added challenges way players challenge players beat leaderboard scores earn achievements june 13 2016 application removed ios 10 macos sierra however service still exists within game center players connect friends send friend requests start playing games organize online multiplayer games number friends connected single game center account limited 500 games may feature achievements completing certain task player rewarded points depending game leaderboard may present player compare score friends world many ios games use game center use every feature apps choose include following features supported game center
Operating systems
scrapy scrapy free open-source web-crawling framework written python originally designed web scraping also used extract data using apis general-purpose web crawler currently maintained scrapinghub ltd. web-scraping development services company scrapy project architecture built around spiders self-contained crawlers given set instructions following spirit n't repeat frameworks django makes easier build scale large crawling projects allowing developers reuse code scrapy also provides web-crawling shell used developers test assumptions site ’ behavior well-known companies products using scrapy lyst parse.ly sayone technologies sciences po medialab data.gov.uk ’ world government data site scrapy born london-based web-aggregation e-commerce company mydeco developed maintained employees mydeco insophia web-consulting company based montevideo uruguay first public release august 2008 bsd license milestone 1.0 release happening june 2015 2011 scrapinghub became new official maintainer
Web technology
openbsd foundation openbsd foundation canadian federal non-profit organization founded openbsd project single point contact persons organizations requiring legal entity deal wish support openbsd also serves legal safeguard projects affiliated openbsd including openssh openbgpd openntpd opencvs opensmtpd libressl announced public openbsd developer bob beck july 25 2007
Operating systems
software-defined data center software-defined data center sddc also virtual data center vdc marketing term extends virtualization concepts abstraction pooling automation data center resources services achieve service itaas software-defined data center elements infrastructure — networking storage cpu security – virtualized delivered service itaas may represent outcome sddc sddc differently cast toward integrators datacenter builders rather toward tenants software awareness infrastructure visible tenants sddc support claimed wide variety approaches critics see software-defined data center marketing tool software-defined hype noting variability 2013 analyst projected least software-defined data center components would experience market growth software-defined networking market expected valued us 3.7 billion 2016 compared us 360 million 2013 idc estimates software-defined storage market poised expand faster storage market software-defined data center encompasses variety concepts data-center infrastructure components component potentially provisioned operated managed application programming interface api core architectural components comprise software-defined data center include following software-defined data center differs private cloud since private cloud offer virtual-machine self-service beneath could use traditional provisioning management instead sddc concepts imagine data center encompass private public hybrid clouds data centers traditionally lacked capacity accommodate total virtualization 2013 companies began laying foundation software-defined data centers virtualization ben cherian midokura considered amazon web services catalyst move toward software-defined data centers convinced world data center could abstracted much smaller units could treated disposable pieces technology turn could priced utility 2013 software-defined data center term promoted paradigm shift according steve herrod promise software-defined data center companies would longer need rely specialized hardware hire consultants install program hardware specialized language rather would define applications resources require—including compute storage networking security availability—and group required components create “ logical application. ” commonly cited benefits software-defined data centers include improved efficiency extending virtualization throughout data center increased agility provisioning applications quickly improved control application availability security policy-based governance flexibility run new existing applications multiple platforms clouds addition software-defined data center implementation could reduce company energy usage enabling servers data center hardware run decreased power levels turned believe software-defined data centers improve security giving organizations control hosted data security levels compared security provided hosted-cloud providers software-defined data center marketed drive prices data center hardware challenge traditional hardware vendors develop new ways differentiate products software services concepts software-defined general software-defined data centers particular dismissed “ nonsense ” “ marketecture ” “ software-defined hype. ” critics believe minority companies “ completely homogeneous systems ’ ” already place yahoo google transition software-defined data centers according observers software-defined data centers ’ necessarily eliminate challenges relate handling differences development production environments managing mix legacy new applications delivering service-level agreements slas software-defined networking seen essential software-defined data center also considered “ least mature technology ” required enable software-defined data center however several companies including arista networks cisco microsoft vmware market products enable virtual networks provisioned extended moved across existing physical networks several competing network virtualization standards already existed 2012 neutron networking component open-source software openstack project provides application-level abstraction network resources includes interface configuring virtual switches software-defined data center approach force organizations adapt software-defined environments require rethinking many processes—including automation metering billing—and executing service delivery service activation service assurance widespread transition sddc could take years
Distributed computing architecture
certificate management cms certificate management cms cmc internet standard published ietf defining transport mechanisms cryptographic message syntax cms defined rfc 5272 transport mechanisms rfc 5273 one two protocols utilizing certificate request message format crmf described rfc 4211 protocol certificate management protocol cmp enrollment secure transport est protocol described rfc 7030 profile cmc use provisioning certificates end entities est play similar role scep
Internet protocols
heterogeneous system architecture heterogeneous system architecture hsa cross-vendor set specifications allow integration central processing units graphics processors bus shared memory tasks hsa developed hsa foundation includes among many others amd arm platform stated aim reduce communication latency cpus gpus compute devices make various devices compatible programmer perspective relieving programmer task planning moving data devices disjoint memories must currently done opencl cuda cuda opencl well fairly advanced programming languages use hsa increase execution performance heterogeneous computing widely used system-on-chip devices tablets smartphones mobile devices video game consoles hsa allows programs use graphics processor floating point calculations without separate memory scheduling rationale behind hsa ease burden programmers offloading calculations gpu originally driven solely amd called fsa idea extended encompass processing units gpus manufacturers dsps well modern gpus well suited perform single instruction multiple data simd single instruction multiple threads simt modern cpus still optimized branching etc originally introduced embedded systems cell broadband engine sharing system memory directly multiple system actors makes heterogeneous computing mainstream heterogeneous computing refers systems contain multiple processing units central processing units cpus graphics processing units gpus digital signal processors dsps type application-specific integrated circuits asics system architecture allows accelerator instance graphics processor operate processing level system cpu among main features hsa defines unified virtual address space compute devices gpus traditionally memory separate main cpu memory hsa requires devices share page tables devices exchange data sharing pointers supported custom memory management units render interoperability possible also ease various aspects programming hsa intended isa-agnostic cpus accelerators support high-level programming languages far hsa specifications cover hsa intermediate layer hsail virtual instruction set parallel programs mobile devices one hsa application areas yields improved power efficiency block diagrams provide high-level illustrations hsa operates compares traditional architectures hsa-specific features implemented hardware need supported operating system kernel specific device drivers example support amd radeon amd firepro graphics cards apus based graphics core next gcn merged version 3.19 linux kernel mainline released 8 february 2015 programs interact directly queue jobs utilizing hsa runtime first implementation known focuses berlin apus works alongside existing radeon kernel graphics driver additionally supports heterogeneous queuing hq aims simplify distribution computational jobs among multiple cpus gpus programmer perspective support heterogeneous memory management hmm suited graphics hardware featuring version 2 amd iommu accepted linux kernel mainline version 4.14 integrated support hsa platforms announced sumatra release openjdk due 2015 amd app sdk amd proprietary software development kit targeting parallel computing available microsoft windows linux bolt c++ template library optimized heterogeneous computing gpuopen comprehends couple software tools related hsa codexl version 2.0 includes hsa profiler amd kaveri a-series apus cf kaveri desktop processors kaveri mobile processors sony playstation 4 allowed integrated gpu access memory via version 2 amd iommu earlier apus trinity richland included version 2 iommu functionality use external gpu connected via pci express post-2015 carrizo bristol ridge apus also include version 2 iommu functionality integrated gpu arm bifrost microarchitecture implemented mali-g71 fully compliant hsa 1.1 hardware specifications arm announced software support would use hardware feature
Computer architecture
applied data research applied data research adr large software vendor 1960s mid-1980s adr often described first independent software vendor founded 1959 adr originally contract development company adr eventually built series products adr widely used major packages included autoflow automatic flowcharting roscoe metacobol extensible macro processor cobol language librarian source-code management adr later purchased datacom/db database management system insyte datacom developed companion product ideal interactive development environment application ’ life fourth-generation programming language another popular adr product librarian version control system ibm mainframe operating systems known ca librarian 1978 reported librarian use 3,000 sites decade later number doubled adr received first patent issued computer program sorting system april 23 1968 program developed martin a. goetz adr instigated litigation federal court ibm accusations ibm retarding growth independent software industry monopolizing software industry leading ibm famous 1969 1970 adr programmatics wholly owned subsidiary adr received out-of-court settlement 1.4 million ibm ibm also agreed serve supplier autoflow meant another potential 600,000 revenues adr adr licensed datacom/db tcsc firm sold modified versions ibm dos/360 dos/vs operating systems known edos 1980 nixdorf computer bought tcsc nixdorf sought continue licensing arrangement adr ncsc went court dispute whether licensing arrangement terminated acquisition adr nixdorf settled court 1981 agreement nixdorf could continue resell adr products adr bought massachusetts computer associates also known compass late 1960s adr sold ameritech 1986 kept intact subsidiary 1988 ameritech sold adr computer associates unrelated massachusetts computer associates subsequently rename ca technologies computer associates integrated company systems products division new information products division roscoe remote os conversational operating environment originally marketed roscoe last marketed ca-roscoe software product ibm mainframes text editor also provides operating system functionality ability submit batch jobs similar ispf xedit ability support 200+ concurrent active users still low overhead based single address space architecture rpf roscoe programming facility scripting language string processing capability
Operating systems
blended threat blended threat also known blended attack software exploit turn involves combination attacks different vulnerabilities example many worm trojan horse computer virus exploit multiple techniques attack propagate kind computer threat blended threats combination worms trojan virus kinds malware recent years cyberattacks demonstrated increased ability impact physical systems stuxnet triton trisis malware 2017 ransomware outbreaks wannacry recognizing threats cyber systems exist potential physical hazards term blended threat also defined natural accidental purposeful physical cyber danger indicates potential crossover impacts harm life information operations environment and/or property adaptation based terminology 2010 us department homeland security risk lexicon symantec elaborated idea blended threats blog post noting malware begins become contained natural disaster hits region people need help flood medical centers researchers discover additional concerns inside malware ’ code type attack known “ blended threat ” – natural accidental purposeful combination physical cyber incident post describes private-sector infrastructure preparedness activities focused blended threats including planned healthcare sector higher education adding idea types crossover incidents considered blended threats august 2018 oracle wrote post observed incidents include number good examples one example approximately 20:00 gmt july 2 internet intelligence map country statistics view showed decline traceroute completion ratio dns query rate azerbaijan related widespread blackout metrics gradually recovered next day published reports reuters washington post noted blackout due explosion hydropower station following overload electrical system due increased use air conditioners driven heat wave saw temperatures exceed 100° f. another day later tropical storm maria caused islandwide power outage guam disrupted internet service island several hours venezuela experienced large power failure left capital city caracas without electricity caused disruption internet connectivity well shown figure traceroute dns metrics saw minor declines around 13:00 gmt read cited article black hat 2018 ruben santamarta reversemode provided another example cyber-physical threats demonstrated guardian summarized satellite communications ships planes military use connect internet vulnerable hackers worst-case scenario could carry 'cyber-physical attacks turning satellite antennas weapons operate essentially like microwave ovens
Computer security
smart card management system smart card management system scms credential management system cms system managing smart cards life cycle smart cards thus system issue smart cards maintain smart cards use finally take smart cards use eol chip/smart cards provide foundation secure electronic identity used control access facilities networks computers smart cards security credentials authenticating smart card holder example using two-factor authentication security requirements smart card management system often high therefore vendors systems found computer security industry smart card management systems generally implemented software applications system needs accessible one operator user simultaneously normally case software application often provided form server application accessible several different client systems alternative approach multiple synchronized systems smart card management systems connect smart cards systems systems smart card management system must connect depends use case smart cards typical systems connect include smart card lifecycle smart card changing state examples states include issued blocked revoked process taking smart card one state another main responsibility smart card management system different smart card management systems call processes different names list widely used names processes listed briefly explained
Computer security
sql server compact microsoft sql server compact sql ce compact relational database produced microsoft applications run mobile devices desktops prior introduction desktop platform known sql server windows ce sql server mobile edition includes 32-bit 64-bit native support sql ce targets occasionally connected applications applications embedded database free download redistribute odbc driver sql ce exist one planned native applications may use sql ce via ole db latest last release sql server compact 4.0 february 2013 sql server compact edition deprecated new versions updates planned although microsoft continue support july 2021 sql server compact shares common api microsoft sql server editions also includes ado.net providers data access using ado.net apis built-in synchronization capabilities well support linq entity framework future releases unify synchronization capabilities microsoft synchronization services unlike editions microsoft sql server sql ce runs in-process application hosting disk footprint less 2 mb memory footprint approximately 5 mb sql ce optimized architecture applications share memory pool windows store apps windows 8 use sql server compact edition edition sql server versions sql ce databases support acid-compliance meet durability requirement default autoflush buffers changes memory including enlisted ambient transactions explicit sql ce transactions override commit call commitmode.immediate value therefore committed transaction changes lost meet durability requirement commit call transaction must specify immediate flag like microsoft sql server sql ce supports transactions referential integrity constraints locking well multiple connections database store however nested transactions supported even though parallel transactions different tables current release support stored procedures native xml data type either uses subset t-sql querying due lack xml support xquery supported either queries processed optimizing query processor sql ce databases also support indexing well support remote data replication local caching data remote databases merge replication bidirectional synchronization master databases sql ce databases created managed microsoft visual studio older versions sql server management studio well sql ce databases reside single .sdf file 4 gb size .sdf file encrypted 128-bit encryption data security sql ce runtime mediates concurrent multi-user access .sdf file .sdf file simply copied destination system deployment deployed clickonce sql ce runtime support datadirectories applications using sql ce database need specify entire path .sdf file ado.net connection string rather specified |datadirectory|\ database_name .sdf defining data directory .sdf database file resides defined assembly manifest application sql server management studio 2005 read modify ce 3.0 3.1 database files latest service pack sql server management studio 2008 later required read version 3.5 files microsoft visual studio express 2008 sp1 create modify query ce 3.5 sp1 database files sql server management studio read ce 4.0 files visual studio 2010 sp1 handle ce 4.0 database files .sdf sqlce database file naming convention optional extension used setting password database file optional database compressed repaired option compacted/repaired database placed new database file february 2013 microsoft announced sql server compact edition deprecated although new versions updates planned microsoft continue support sql compact standard lifecycle support policy support end july 2021
Databases
common indexing protocol common indexing protocol cip attempt ietf working group find mid-1990s define protocol exchanging index information directory services x.500 directory model searches scoped near root tree e.g particular country problematic implement potentially hundreds thousands directory servers would need contacted order handle query indexes contained summaries subsets information individuals organizations represented white pages schema merging subsets information multiple sources hoped index server holding subset could able process query efficiently chaining sources sources hold information would contacted example server holding base entry particular country provided list names people entries country subtree server would able process query searching person particular name chaining servers held data person protocol evolved earlier work developing whois++ intended capable interconnecting services evolving whois ldap activities protocol seen much recent deployment whois ldap environments followed separate evolution paths whois deployments typically domain name registrars data management issues addressed specifications domain name registry interconnection crisp contrast enterprises manage employee customer student identity data ldap directory looked federation protocols interconnection organizations
Internet protocols
6fusion 6fusion dataservices company headquartered raleigh north carolina enables utility approach it—standardizing economic measurement infrastructure cloud services providing economic transparency global market helping end-users make better informed infrastructure decisions 6fusion ’ uc6 platform organizations view manage total cost consumption tcc business services real time achieve higher level cost optimization forecasting accuracy business agility 6fusion uses patented single unit measure infrastructure called workload allocation cube wac provides common view consumption agnostic underlying technology vendors 6fusion enables baselining benchmarking budgeting business service consumption across execution venues supports dynamic cost optimization strategies 6fusion products metering analytics reporting tools used enterprise organizations service providers cloud brokers company raised total 10m two rounds funding intersouth partners grotech ventures 6fusion product portfolio made following
Distributed computing architecture
wardialing wardialing war dialing technique automatically scan list telephone numbers usually dialing every number local area code search modems computers bulletin board systems computer servers fax machines hackers use resulting lists various purposes hobbyists exploration crackers – malicious hackers specialize breaching computer security – guessing user accounts capturing voicemail greetings locating modems might provide entry-point computer electronic systems may also used security personnel example detect unauthorized devices modems faxes company telephone network single wardialing call would involve calling unknown number waiting one two rings since answering computers usually pick first ring phone rings twice modem hangs tries next number modem fax machine answers wardialer program makes note number human answering machine answers wardialer program hangs depending time day wardialing 10,000 numbers given area code might annoy dozens hundreds people attempt fail answer phone two rings succeed hear wardialing modem carrier tone hang repeated incoming calls especially annoying businesses many consecutively numbered lines exchange used centrex telephone system newer wardialing software warvox require modem conduct wardialing rather programs use voip connections speed number calls wardialer make sandstorm enterprises patent multi-line war dialer system method scan-dialing telephone numbers classifying equipment connected telephone lines associated therewith patented technology implemented sandstorm phonesweep war dialer popular name technique originated 1983 film wargames film protagonist programmed computer dial every telephone number sunnyvale california find computer systems prior movie release technique known hammer dialing demon dialing film introduced method many members 414s 1985 least one company advertised war games autodialer commodore computers programs became common bulletin board systems time file names often truncated wardial.exe like due length restrictions 8 characters systems eventually etymology name fell behind war dialing gained currency within computing culture popularity wardialing 1980s 1990s prompted states enact legislation prohibiting use device dial telephone numbers without intent communicating person recent phenomenon wardriving searching wireless networks wi-fi moving vehicle wardriving named wardialing since techniques involve actively scanning find computer networks aim wardriving collect information wireless access points confused piggybacking similar war dialing port scan tcp/ip dials every tcp port every ip address find services available unlike wardialing however port scan generally disturb human tries ip address regardless whether computer responding address related wardriving warchalking practice drawing chalk symbols public places advertise availability wireless networks term also used today analogy various sorts exhaustive brute force attack authentication mechanism password dictionary attack might involve trying word dictionary password wardialing password would involve trying every possible password password protection systems usually designed make impractical making process slow and/or locking account minutes hours low number wrong password entries
Computer security
zipgenius zipgenius freeware file archiver developed matteo riso m.dev software microsoft windows capable handling nearly two dozen file formats including common formats well password-protect archives work directly cd-r/rw drives presented two editions standard suite suite edition includes optional modules zipgenius project oriented experts power-users standard setup package simply includes main zipgenius application zipgenius first released mr. zip 98 strict group users renamed zipgenius march 1998 april 1999 first public release made zipgenius latest release version 6.3.2.3112 containing large number fixes majority bug fixes visible first glance zipgenius features include support twain devices scanners digital cameras file extraction cd/dvd burner windows xp ftp client ftpgenius zgalbum zgalbum allows users create slideshows pictures loaded folder imported twain device zipgenius also fully integrates windows explorer shell user interface functions placed multiple locations program functions accessed either menu buttons main toolbar drop-down menu customized suit user preferences zipgenius 6 capable opening variety formats commonly used linux rpm tar tar.gz tgz gz 7z regards data security archive history file encrypted recently used files list enabled always per-session disabled cryptozip 2.1 gives encryption algorithms lock user archives users create self-locking/self-erasing archives choose encrypt files one four algorithms czip blowfish twofish rijndael aes also czip files longer depends zipgenius users create executable czip .exe files allow user send encrypted archives people use zipgenius zipgenius reported still development claimed matteo riso main developer focusing next release whose codename miky2007 new version software still branded zipgenius clear 7 2007 beside sure news zipgenius ship developed wininizio software team marking fact zipgenius product wininizio.it wide community board matteo riso admin zipgenius hosted zipgenius.it 2008 wininizio software team put zipgenius.com online offer international website users speaking italian wininizio.it hosts also wide support section — italian english july 1 2009 website zipgenius.it totally redesigned upon modx web application july 6 2009 zipgenius 6.1.0.1010 released public zipgenius able handle open source upx executable compressor used compress zipgenius main executable upx.exe zipgenius program folder users get extra compression level creating new zip archives brutal+upx many executable files exe dll ocx distributed code compilation may larger size necessary zipgenius supports 7-zip compression format conceived igor pavlov compress files standard zip rar compression formats zipgenius supports openoffice.org/staroffice documents openoffice.org applications produce files special format .zip archives custom file extension containing xml files openoffice.org programs merge rebuild original documents zipgenius complies feature allows users manage files common zip files addition users optimize openoffice.org use maximum compression level available .zip format zipgenius users optimize openoffice.org document zipgenius gain 5 10 kb size reduction depending content openoffice.org file zipgenius recompress document brutal compression level
Computer file systems
jexus jexus web server simply jexus proprietary web server developed bing liu jexus supports asp.net stack defined microsoft integrating mono well php via fastcgi early releases announced csdn blog following releases announced primarily chinese forum jexus configured manually editing configuration files since march 2014 lextudio developing management console simplify tasks console aka jexus manager announced april 13 officially console enables local remote management jexus web server
Web technology
powerpc 5000 powerpc 5000 family series powerpc power isa microprocessors freescale previously motorola stmicroelectronics designed automotive industrial microcontroller system chip soc use mpc5000 family consists two lines 51xx/52xx 55xx/56xx really n't share common heritage mpc5200 family based e300 core mgt5100 processor also part freescale mobilegt platform based e200 core stems mpc5xx core upwards-compatible newer e500 core older powerpc book e specification focus automotive industrial control systems like robotics power train fuel injection cores basis multitude soc controllers ranging 40 600 mhz variety additional functionality like flash-rom ethernet controllers custom i/o mpc55xx processors compliant power isa v.2.03 specification mpc55xx family four slightly different cores really low end high end mpc56xx family powerpc e200 core based microcontrollers jointly developed freescale stmicroelectronics built 90 nm fabrication process microcontrollers tailor-made automotive applications like power steering fuel injection display control powertrain active suspension chassis control anti-lock braking systems radar adaptive cruise control freescale calls processors mpc56xx st names spc56x
Computer architecture
zet hardware zet clone x86 processor machine code compatible x86 processors developed effort make open-hardware processor hardware design synthesized configurable device fpga cpld custom asic considered soc project supports 16-bit able run dos-compatible windows 3.x operating systems activity zet project since 2013
Computer architecture
autolisp autolisp dialect programming language lisp built specifically use full version autocad derivatives include autocad map 3d autocad architecture autocad mechanical neither application programming interface api interpreter execute autolisp code included autocad lt product line autolisp small dynamically scoped dynamically typed lisp language dialect garbage collection immutable list structure settable symbols lacking regular lisp features macro system records definition facilities arrays functions variable number arguments let bindings aside core language primitive functions geometry accessing autocad internal dwg database manipulation graphical entities autocad properties graphical entities revealed autolisp association lists values paired autocad group codes indicate properties definitional points radii colors layers linetypes etc autocad loads autolisp code .lsp files autolisp code interact user autocad graphical editor use primitive functions allow user pick points choose objects screen input numbers data autolisp also built-in graphical user interface gui mini- domain-specific language dsl dialog control language creating modal dialog boxes automated layout within autocad autolisp derived early version xlisp created david betz language introduced autocad version 2.18 january 1986 continued enhanced successive releases release 13 february 1995 development neglected autodesk favor fashionable development environments like visual basic applications vba .net framework objectarx however remained autocad main user customizing language vital-lisp considerably enhanced version autolisp including integrated development environment ide debugger compiler activex support developed sold third party developer basis software vital lisp superset existing autolisp language added vba-like access autocad object model reactors event handling autocad objects general activex support general lisp functions autodesk purchased renamed visual lisp briefly sold add-on autocad release 14 released may 1997 incorporated autocad 2000 released march 1999 replacement autolisp since autodesk ceased major enhancements visual lisp focused effort vba .net c++ autodesk longer supports vba versions older 7.1 part long-term process changing vba .net user customizing autolisp strong following computer-aided design cad application vendors add products bricscad intellicad others autolisp functionality autolisp users consider using alternative autocad development involving autolisp since autocad 2000 performed within visual lisp since original autolisp engine replaced visual lisp engine thousands utilities applications developed using autolisp visual lisp distributed lsp fas vlx files simple hello world program autolisp would note final line inside function definition evaluated arguments codice_1 function returns null symbol displayed autocad command-line interface autocad command line functions read–eval–print loop repl would normally print hello world command line followed immediately return value call codice_1 therefore without final call codice_1 function result would codice_5 function may also used achieve result complex example might code defines new function generates autocad point object given point one-line text object displaying x coordinates beside name function includes special prefix c causes autocad recognize function regular command user upon typing 'pointlabel autocad command line would prompted pick point either typing x coordinates clicking location drawing function would place marker point create one-line text object next containing x coordinates point expressed relative active user coordinate system ucs function requires parameters contains one local variable 'pnt example could also written using built-in autocad commands achieve result however approach susceptible changes command prompts autocad releases
Programming language topics
julia programming language julia high-level general-purpose dynamic programming language designed high-performance numerical analysis computational science also useful low-level systems programming specification language web programming server web use web client programming distinctive aspects julia design include type system parametric polymorphism types fully dynamic programming language multiple dispatch core programming paradigm allows concurrent parallel distributed computing direct calling c fortran libraries without glue code just-in-time compiler referred just-ahead-of-time julia community used julia garbage-collected uses eager evaluation includes efficient libraries floating-point calculations linear algebra random number generation regular expression matching many libraries available including e.g. fast fourier transforms previously bundled julia separate tools available julia include ides integrated tools e.g linter debugger rebugger.jl package supports repeated-execution debugging work julia started 2009 jeff bezanson stefan karpinski viral b. shah alan edelman set create free language high-level fast 14 february 2012 team launched website blog post explaining language mission interview infoworld april 2012 karpinski said name julia good reason really seemed like pretty name bezanson said chose name recommendation friend since 2012 launch julia community grown 9,000,000 downloads used 1,500 universities official julia docker images docker hub seen 4,000,000 downloads january 2019 juliacon academic conference julia users developers held annually since 2014 version 0.3 released august 2014 version 0.4 october 2015 version 0.5 october 2016 julia 0.6 released june 2017 stable release version 8 august 2018 julia 0.7 useful release testing packages knowing upgrade 1.0 version 1.0 released 8 august 2018 work julia 0.7 huge undertaking e.g. entirely new optimizer changes made syntax syntax stable 1.x 0.7 semantics iteration interface simplified release candidate julia 1.0 julia 1.0.0-rc1 released 7 august 2018 final version day later julia 1.1 released 21 january 2019 e.g. new exception stack language feature bugfix releases expected roughly monthly julia 1.1.x 1.0.x 1.0.x currently long-term support least year julia 1.0.1 1.0.4 followed schedule bugfix releases pipeline 0.7-release julia 1.2 released 20 august 2019 julia 1.1.x release longer maintained 1.0.x 1.2.x e.g built-in support web browsers testing running javascript vm packages work julia 1.0.x also work 1.1.x newer enabled forward compatible syntax guarantee major exception interacting non-julia code javacall.jl package however calling languages e.g r language works package r fixed call java scala etc use languages julia e.g jdbc.jl apache spark spark.jl users choose stay lts version julia milestone set fix julia 1.4 however already workaround julia-1.3.0-rc1 julia attracted high-profile users investment manager blackrock uses time-series analytics british insurer aviva uses risk calculations 2015 federal reserve bank new york used julia make models us economy noting language made model estimation 10 times faster previous matlab implementation julia co-founders established julia computing 2015 provide paid support training consulting services clients though julia remains free use 2017 juliacon conference jeffrey regier keno fischer others announced celeste project used julia achieve peak performance 1.54 petaflops using 1.3 million threads 9300 knights landing knl nodes cori cray xc40 supercomputer 5th fastest world time november 2017 8th fastest julia thus joins c c++ fortran high-level languages petaflops computations achieved three julia co-creators recipients 2019 james h. wilkinson prize numerical software awarded every four years creation julia innovative environment creation high-performance tools enable analysis solution computational science problems julia received contributions 800 developers worldwide dr. jeremy kepner mit lincoln laboratory founding sponsor julia project early days addition funds gordon betty moore foundation alfred p. sloan foundation intel agencies nsf darpa nih nasa faa essential development julia julia computing inc. founded 2015 viral b. shah deepak vinchhi alan edelman jeff bezanson stefan karpinski keno fischer june 2017 julia computing raised 4.6m seed funding general catalyst founder collective according official website main features language multiple dispatch also termed multimethods lisp generalization single dispatch polymorphic mechanism used common object-oriented programming oop languages uses inheritance julia concrete types subtypes abstract types directly indirectly subtypes type top type hierarchy concrete types subtyped way languages composition used instead see also inheritance vs subtyping julia draws significant inspiration various dialects lisp including scheme common lisp shares many features dylan also multiple-dispatch-oriented dynamic language features algol-like free-form infix syntax rather lisp-like prefix syntax julia everything expression fortress another numerical programming language features multiple dispatch sophisticated parametric type system common lisp object system clos adds multiple dispatch common lisp functions generic functions julia dylan fortress extensibility default system built-in functions generic extensible dylan multiple dispatch fundamental julia user-defined functions even basic built-in operations like codice_1 generic dylan type system however fully support parametric types typical ml lineage languages default clos allow dispatch common lisp parametric types extended dispatch semantics added extension clos metaobject protocol convergent design fortress also features multiple dispatch parametric types unlike julia however fortress statically rather dynamically typed separate compiling executing phases language features summarized following table default julia runtime must pre-installed user-provided source code run alternatively standalone executable needs julia source code built applicationbuilder.jl packagecompiler.jl julia syntactic macros used metaprogramming like lisp macros powerful different text-substitution macros used preprocessor languages c work level abstract syntax trees asts julia macro system hygienic also supports deliberate capture desired like anaphoric macros using codice_2 construct julia official distribution includes interactive session shell called julia read–eval–print loop repl used experiment test code quickly following fragment represents sample session example strings concatenated automatically println repl gives user access system shell help mode pressing codice_3 codice_4 prompt preceding command respectively also keeps history commands including sessions code tested inside julia interactive section saved file codice_5 extension run command line typing julia supported jupyter online interactive notebooks environment julia practice interoperable many languages julia keyword used call c-exported fortran shared library functions individually julia unicode 12.0 support latest 12.1.0 support adds one letter julia 1.3 utf-8 used strings default julia source code meaning also allowing option common math symbols many operators ∈ codice_6 operator julia packages supporting markup languages html also http xml json bson databases web use general julia core implemented julia c together c++ llvm dependency parsing code-lowering implemented femtolisp scheme dialect llvm compiler infrastructure project used back end generation 64-bit 32-bit optimized machine code depending platform julia runs exceptions e.g. pcre standard library implemented julia notable aspect julia implementation speed often within factor two relative fully optimized c code thus often order magnitude faster python r development julia began 2009 open-source version publicized february 2012 julia uses jit mcjit llvm julia generates native machine code directly function first run bytecodes run virtual machine vm translated bytecode running e.g java jvm dalvik android julia four support tiers currently supports x86-64 processors 64-bit optimized latest generations ia-32 x86 processors except decades old ones i.e. 32-bit mode i686 excepting cpus pre-pentium 4-era supports lower tiers e.g. tier 2 fully supports armv8 aarch64 processors supports armv7 armv6 aarch32 caveats cuda i.e nvidia ptx tier 1 support help external package least platforms may need compiled source code e.g. original raspberry pi options changed download page otherwise executables source available julia successfully built several arm platforms e.g. armv8 data center cloud processors cavium thunderx first arm 48 cores arm v7 32-bit tier 2 support binaries first get x86 arm v8 64-bit ptx 64-bit meaning nvidia cuda gpus external support powerpc 64-bit tier 3 support may may build julia supported raspbian support better newer e.g. armv7 pis julia support promoted raspberry pi foundation also support web browsers/javascript jsexpr.jl alternative language web browsers webassembly support minimal support julia supports several upcoming external julia projects
Programming language topics
decentralized network 42 decentralized network 42 also known dn42 decentralized peer-to-peer network built using vpns software/hardware bgp routers darknets try establish anonymity participants dn42 aims network explore routing technologies used internet tries establish direct non-nat-ed connections members network fully meshed dn42 uses mostly tunnels instead physical links individual networks participant connected one participants vpn physical links bgp used inter routing ospf commonly used protocol intra routing participant free choose igp network address space ipv4 consists private subnets 172.20.0.0/14 main subnet note private address ranges may also announced dn42 network interconnected similar projects notably chaosvpn uses 172.31.0.0/16 parts 10.0.0.0/8 icvpn uses 10.0.0.0/8 ipv6 unique local address ula ipv6 equivalent private address range used participants also announce globally routable addresses announcements accepted small subset dn42 order use bgp even private environment autonomous system numbers needed dn42 uses several private reserved numbers ranges including 64512 64855 76100 76199 since june 2014 dn42 using new private range 4242420000 4242429999 part larger private range defined rfc 6996 participants use hardware routers participants use general purpose servers virtual machines lower cost commonly used bgp implementation used dn42 bird quagga participants use openbgpd xorp implementation junos cisco ios
Distributed computing architecture
renegade iii final chapter renegade iii final chapter scrolling beat'em computer game released amstrad cpc commodore 64 msx zx spectrum systems 1989 ocean software imagine label game sequel sequel arcade game renegade unlike first two games renegade iii follows character known renegade travels time rescue captured girlfriend also dropped two-player mode found previous title though game highly praised critics receiving high scores several prominent gaming publications 91 score awarded crash 84 c+vg derided fans criticised game storyline lack deep gameplay glitches poor physics lack two-player option demonstrated video created internet comedian stuart ashen reviews zx spectrum version repeatedly criticises game whilst praising spectrum versions first two games video also includes fellow youtube user ex-television presenter larry bundy jr reviewing amstrad cpc version video game journalist jon blyth reviewing commodore 64 version game criticising game well spanish magazine microhobby valued game following scores originality 30 graphics 80 motion 80 sound 80 difficulty 100 addiction 80
Computer architecture
falcon storage engine falcon transactional storage engine developed mysql relational database management system development stopped oracle purchased mysql based netfrastructure database engine falcon designed take advantage sun zfs file system architecture analysis showed interesting mixture possible performance properties low level benchmarks first alpha release 5.1.14-falcon showed falcon performed differently innodb myisam better several tests worse others inefficient support mysql limit operation limitation biggest advantage though known ease use falcon requires minimum maintenance designed reconfigure automatically handle types loads efficiently
Databases
tacl tacl tandem advanced command language scripting programming language used tandem computers tacl shell tandem computers originally designed sold tandem computers inc. based cupertino ca first commercially available parallel processing computers originally referred mini-computers tandem strategy emerging concept continuous availability relied mirrored disks controllers software well engineered operating system guardian later nonstop kernel nsk ensure continuous application availability ensuring system could survive single point hardware failure tandem computers inc. acquired compaq computer corporation 1997 compaq computer corp. subsequently purchased hewlett-packard 2001 today known hpe nonstop products hp integrity nonstop blade systems tacl continues scripting language used hewlett packard nonstop servers nonstop servers key components backbone infrastructure largest banks casinos retailers telephone companies email systems stock exchanges worldwide many computer systems produced tandem nonstop platform relied form redundancy hot backup failover scheme continue running tandem nonstop however cpu performs work may contain dormant backup process another cpu pair cpus 0 1 example share hardware ownership controllers disk drives drives redundant writes disk pair performed primary backup drives reads however take advantage head drive closer information choose drive onto perform read example cpu 0 fails cpu 1 takes ownership disk drive providing continuous availability data primary process running may given backup process receives checkpoint information primary process fails whatever reason backup process takes backup process may spawn backup earned name nonstop since application programs fault-tolerant makes attractive customers ability continuous availability nonstop systems also known handling high numbers transactions per second useful banks stock exchanges paragraph describes philosophy behind design hardware software upon nsk platform two programming languages least tal compiled language tacl interpreted language nsk compilers useful languages tal rumoured deprecated tacl remains default scripting language machines hp provide korn-based shell command interface also days offer tacl nsk sysadmins instance netstat command implemented tacl builtins reflect multi-cpu nature nsk probably n't much say fully understand tacl builtins probably well way understanding nsk tacl interpreted tacl instructions stored simple text file macros routines defines make scripts scripts often used store complex configuration instructions start-up hardware configuration sequences tacl language large number built-in utilities allow user capture output various system utilities parse captured text line line character character allows users build tacl programs monitor system events use filters monitor system application event logs create following subroutine file file1 run tacl routine alternate strategy create file named file1 add following two lines execute routine naming file tacl prompt
Programming language topics
endpoint handlespace redundancy protocol endpoint handlespace redundancy protocol used reliable server pooling rserpool framework communication pool registrars maintain synchronize handlespace allocated application layer like aggregate server access protocol work progress within ietf
Internet protocols
dod ipv6 product certification department defense dod internet protocol version 6 ipv6 product certification program began mandate dod assistant secretary defense networks information integration asd-nii 2005 program mandates joint interoperability test command jitc fort huachuca az test certify products ipv6 capability according request comments rfcs outlined dod ipv6 standards profiles ipv6 capable products products certified special interoperability added dod unified capabilities approved products list uc apl ipv6 list used procurement offices dod u.s. federal agencies ongoing purchases acquisitions equipment february 2009 dod ceased requirement ipv6-only testing certification entry unified capabilities approved products list uc apl according kris strance dod cio ipv6 lead testing ipv6 part product evaluations — much broader scope uc apl single consolidated list products completed interoperability io information assurance ia certification dod ipv6 standards profiles ipv6 capable products dod ipv6 profile singular “ ipv6 capable ” definition dod document lists six agreed upon product classes host router layer 3 switch network appliance security device advanced server corresponding standards rfcs lists standard according level requirement jitc uses publicly available ipv6 generic test plan gtp test product conformance performance interoperability ipv6 according dod ipv6 profile jitc uses combination automated testing tools manual functional test procedures conduct testing many companies organizations help develop test products vendors prior testing jitc organizations grant certification conduct pre-testing ensure vendor product pass necessary certification list organizations ipv6 forum service called ipv6 ready logo service represents qualification program assures devices tested ipv6 capable certified service grants qualified products display logo ipv6 forum present objectives ipv6 experts suggest pursuing purchase devices given phase-2 approval gold logo since given full treatment department defense dod committed ipv6 likely first federal organization completely converted ipv6 also process qualifying ipv6 equipment jitc/disa task certifying ipv6 products given joint interoperability test command jitc part defense information systems agency disa help standardize ipv6 qualification procedures jitc follows ’ called ipv6 generic test plan jitc qualifies product added unified capabilities approved products list fortunately jitc makes list available public http //www.techrepublic.com/blog/networking/ipv6-capable-devices-make-sure-they-are-ready/2522
Computer architecture
advania advania nordic information technology service corporation headquartered stockholm sweden company largest field iceland 9th largest nordic countries advania corporate clients public private sector provides wide range it-services platforms cloud solutions support multinational enterprises governments big small medium-sized businesses according swedish clients advania sweden leader creating customer value advania traces roots three nordic countries iceland norway sweden long period time country generated component eventually braided one company advania ab 2012 1939 icelandic entrepreneur einar j. skúlason founded ejs office equipment repair workshop reykjavik soon expanded business opened store started importing office machinery cash registers etc world war ii company also repaired guns lighters ejs eventually became dominant business iceland 1952 icelandic government city reykjavik founded skýrr company whose purpose take leading role computing recordkeeping iceland company privatized 1995 later became core element group companies – including ejs – merged skýrr brand 1971 company nokia elektronic ab – later renamed datapoint svenska ab – founded sweden company sold datapoint computer terminals later became network pioneer key system integrator sweden 2003 datapoint merged virtus ab it-company founded 1994 grew rapidly virtus soon became key player swedish market focusing microsoft based solutions offering storage backup services 2003 one strongest comprehensive system integrators sweden created datapoint virtus merged new company named kerfi ab 1991 merkantildata applikasjon founded norway originally business unit within merkantildata later atea company focused implementing erp solutions nordic market industry solutions retail property management logistics legal transport waste management 2000 company changed name hands listed oslo stock exchange 2005 hands unlisted acquired icelandic company kögun later merged skýrr see despite changes ownership hands kept norwegian identity acquired nett.2.3 completo 2005 2012 advania ab born skýrr iceland kerfi sweden hands norway merged became key challenger scandinavian it-market since four companies acquired merged advania listed swedish company caperio included 2018 finnish digital service provider vintor become advania finland advania finland strong roots providing ict services public private sector customers focused providing wide range services related digitalization ict infrastructure
Distributed computing architecture
norwegian ship register norwegian ship register domestic ship register norway managed norwegian maritime authority physically located bergen registry 12,000 ships include commercial non-commercial vessels ships exceeding mobile offshore installations must registered smaller vessels volunteer norwegian shipbuilding register subordinate register ship registration norway became codified 1902 task handed district courts magistrates city clerks first 50 registers reduced 27 1972 responsibility centralized taken norwegian ship registers 1992 merged maritime authority 2012 third norwegian code signed christian v 15 april 1687 dedicated shipping established principals collateral insurance well arrest procedure following accidents however register ships established 1901 process establish public ship register commenced 1881 background bank considered would purpose lend money purchase ships would require legal framework would firmly establish ownership collateral ships sea law commission appointed 1882 consider legal aspects shipping industry soon became clear commission would ship registration main purpose aspects sea law coordinated internationally reached conclusion resulted 1888 proposal parliament based single central register ships parliament decided consider law similar proposals 1892 1893 1894 1897 similarly dismissed break-through ship registration came 1900–01 parliamentary session private alternative proposal launched. latter instead involved establishing series local registers ship registration act approved parliament 4 may 1901 government commission looked detailed aspects registration council state approved 23 july 1902 resulted fifty district courts given task maintaining local ship registers covering jurisdiction known names bergen ship register first significant reform came 1972 number registers reduced 27 norwegian international ship register nis created 1 july 1987 allowed flag convenience registration ships international traffic remaining norwegian flag jurisdiction instead using local registers nis established office bergen ship register part city clerk bergen nis took march 1990 initiative centralize local ship registers jointly locate nis emphasized nis operated around-the-clock duty service joint location registers would allow economies scale cutting costs would also allow time freed magistrate offices district courts another concern recent rationalization program following introduction electronic registers given little savings due decentralized nature operations parliament looked possibility centralizing local ship registers 1990 issue postponed consider merger nis ministry justice established commission look matter concluded july 1991 registers centralized located bergen proposed new register administratively part maritime authority issue concluded march government decided create norwegian ship registers located bergen would organized government agency subordinate ministry foreign affairs city clerk bergen merged magistrate bergen 1 april 1992 nis split merged office 1 may responsibility local registries transferred new norwegian ship registries 1 july time 12,000 ships registered 880 nis staff nis office increased six eight jobs lost magistrate offices district courts able use workforce tasks norwegian ship registries became part ministry trade industry 1996 minister trade industry trond giske took initiative june 2010 investigate merger norwegian ship registers norwegian maritime authority internal ministry committee concluded 1 november merger would favorable cited common organization would uniform user-friendly competitive allowing shipping companies relate single organization handling registers would remain bergen despite maritime authority based haugesund merger took effect 1 january 2012 time eighteen employees agency register required certain types vessels vessels optional register norwegian ship exceeding length well oil platforms mobile installations required registered registered foreign registry volunteer registration available ships certain fishing vessels boats length used commercially mobile cranes hovercrafts docks drags fixed maritime installations used petroleum extraction nor-registered ships must norwegian nationality nationality european economic area ownership need norwegian entity although operations must norwegian owner norwegian representative ships construction norway may registered norwegian shipbuilding register open registration recreational vessels allows owner use boat collateral loan nor-registered boat also registered volunteer boat register recreational boats sometimes sold without proper reregistration times purchasers bought boats without checking see boat collateral tied
Databases
universe unix versions unix operating system term universe used denote variant working environment late 1980s commercial unix variants derived either system v bsd versions provided bsd system v universes allowed user switch universe typically implemented separate directory trees separate filesystems usually included different versions commands libraries man pages header files facility offered ability develop applications portable across system v bsd variants requirements disk space maintenance separate configuration files twice work patching systems gave problematic reputation systems offered facility included harris/concurrent cx/ux convex convex/os apollo domain/os version 10 pyramid dc/osx dropped svr4-based version 2 concurrent masscomp/rtu mips computer systems risc/os siemens sinix versions system v release 4 retain system similar dual universe concept bsd commands behave differently classic system v commands /usr/ucb bsd header files /usr/ucbinclude library files /usr/ucblib /usr/ucb also found nextstep openstep well solaris
Operating systems
pavel vrublevsky pavel olegovich vrublevsky born 26 december 1978 russian owner general manager processing company also founder investment company rnp russian forbes contributor matters relating blockchain cryptocurrencies cybersecurity also implicated range criminal cases related hacking pavel vrublevsky born raised moscow fifteen-year-old studied american field service student exchange program norway studied institute foreign languages named maurice thorez moved sociology department moscow state university graduated 2001 organized first company develop billing software telecommunications companies age eighteen 2003 age 23 founded company chronopay b.v 2005 chronopay entered russian market 2006 vrublevsky received prestigious runet award within three years company gained international recognition one premier processing companies cutting edge technology even though chronopay headquartered amsterdam company developed true leader processing credit card payments russia – controlling roughly 25 market share company ’ client roster boasted several russian companies well larger multinational corporations including sony microsoft russian charitable foundations non-profit organizations also use chronopay including greenpeace red cross additional clients included russia ’ second largest airline transaero country ’ largest cellphone operator mts 2011 chronopay five worldwide offices moscow amsterdam barcelona florida united states riga latvia two franchises china active business brazil 2011 company two hundred employees chronopay impact online card processing payment industry russia undeniable fact even today russia ’ internet-based payments marketplace entirely relies former chronopay personnel name largest russian bank sberbank popular e-money system russia yandex.money card associations mastercard many dozens important state banks payment providers dependent former chronopay employees unlike mckinsey company ’ impact management consulting according russian forbes today 2016 chronopay serves 25 wealthiest corporations concerning capitalization web companies russia including two four russian cell companies mts tele2 2006 vrublevsky led e-commerce commission nauet commission advocated preservation existing model collective management copyright internet vrublevsky vocal proponent one largest rights management societies time fair 2007 together good friend former producer t.a.t.u group ivan shapovalov vrublevsky purchased mp3search.ru online store actively engaged mp3 business t.a.t.u music group russia whose music chosen official russian soundtrack 2014 olympics shapovalov remained business partner vrublevsky ’ wife vera vrublevskaya russian producer long time running social network musicians along vrublevsky chronopay serving infamous online store allofmp3.com persecuted international society collective management copyrights ifpi accused infringing us negotiations russia accession wto allofmp3.com worked license roms gave organization 50 license fees 2007 appearance electronic air tickets russia vrublevsky engaged processing area organizing project e-avia chronopay e-avia processing payments major airlines largest clients transaero exception aeroflot 2010 vrublevsky proposed create national air ticket reservation system gds based e-avia ready transfer controlling stake structure aeroflot proposal find response result single russian gds never created entry force law storage personal data russians territory russian federation state-owned company rostech urgently called upon create national gds russian airline tickets kept 2009 pavel vrublevsky part working group combating spam ministry communications initiated campaign former partner igor gusev according spamhaus rating world main spammer owner largest partner spam network sale viagra glavmed experts agree commencement criminal prosecution gusev closure spamit spam 2010 global level spam fell half 2012 vrublevsky proposed redemption magazine hacker publishing house gameland also according media reports 2012 vrublevsky preparing deal buy oldest business publication country financial newspaper 1915 published jointly rf ministry finance vrublevsky also provided financial backing relaunch finansovaya gazette financial newspaper russia ’ oldest financial newspaper initially run ministry finance russia founded 1914 iconic publication published several influential voices throughout history including vladimir lenin two russia ’ well-respected financial journalists nikolai vardul raf shakirov worked vrublevsky took editorial reigns publication comeback previously vardul shakirov chief editors kommersant russia ’ known business newspaper vrublevsky chronopay ’ commitment paper survival went far housing paper time especially past economic hardships whole newspaper resided chronopay office vrublesky advocated creation national payment system long hastily created reaction sanctions vrublevsky outspoken advocacy foreign journalists brian krebs business insider falsely predicted would run system exchange cleared false allegations national booking system also something pushed eventually created russian corporation rostechnology weeks kremlin publicly embraced blockchain bitcoin pavel strongly advocated trumpeted cutting-edge technology eventually becoming russian forbes contributor ground-breaking development initially vrublevsky unsure public new industry eventually migrated become one loudest supporters 2007 pavel vrublevsky first came pressure central information security federal security service russian federation 2010 accused cis fsb russia treason promotion myth russian cyber threat 2011 arrested several times officers fsb investigating cyberattack aeroflot online payment system convicted orchestrating cyberattack sentenced 2.5 years prison 2013 granted early parole serving less year incarceration 2016 basis materials vrublevsky officers cis fsb arrested high treason led termination cooperation us russia cybercrime 2018 court sentenced colonel mikhailov cis fsb 22 years prison accomplice kaspersky lab ruslan stoyanov 14 years prison mikhailov ’ subordinate mr. dokuchaev 6 years prison accomplice mr. fomchenkov 7 years prison mr.dokuchaev separately wanted fbi usa alleged cyber attacks yahoo illicit pharmaceutical trade vrublevsky extensively targeted american journalist brian krebs fact krebs focus vrublevsky story wrote close twenty-five stories krebs enjoyed tremendous support russian fsb well written positive stories kaspersky labs major partner united states krebs scandal united states since terminated contracts kaspersky according krebs internal war corruption pavel troubled man attempted mentor igor gusev pavel taken years earlier request russian police world ’ top spammer running one top spam affiliate programs world selling fake viagra gusev became krebs primary source pavel gusev exiled russia looking settle score pavel set revelations entirely based gusevs statements stolen hacked databases chronopay vrublevsky published research origins investigations brian krebs another known cyber security researcher kimberly zenz accusing work behalf american intelligence agencies vrublevsky humorously compared krebs zenz failed world-famous russian spies boshirov petrov eventually vrublevsky central villain krebs new york times best- selling book spam nation however recent events arrests mikhailov ’ group subsequent charges dokuchaev fbi united states debunk kreb ’ narrative vrublevsky ’ role instance new york times noted arrests mikhailov ’ fsb group « amounted purge leadership cyberwing russia ’ main intelligence agency midst electoral hacking scandal issue carrying immense implications russia ’ relations united states. » interview new york times vrublevsky stated « “ guys selling fairy tales united states people business like me. ” interview cnn vrublevsky added « believe good thing countries russia us people directly responsible cyber hysteria eventually going far election meddling scandal happy since november 2016 leading column forbes electronic payments crypto-currencies particular popularization bitcoin vrublevsky ’ statements russian hackers received wide response spring summer 2017 vrublevsky conveyed number leading world media materials testifying non-involvement russian hackers attacks servers democratic party united states different years headed 2011 magazine finance included prestigious 33 pepper rating successful men age 33 2011 vrublevsky also major sponsor vtb league paying one million usd russia ’ main basketball league frequently seen along vtb league top management including mr. sergei ivanov one russia ’ influential politicians 2018 vrublevsky heads payments committee idacb.com one world ’ largest bitcoin associations founded 65 member states ultra high- rank representatives russian office idacb founded assistance mr. advisor internet president russia mr. putin frequently appears alongside vrublevsky facebook pages photos married producer vera vrublevskaya mother three children
Computer security
velaro inc. velaro inc. software-as-a-service saas provider headquartered elkridge maryland company provides live chat software click-to-call intelligent engagement features current president alex bloom velaro founded 2001 velaro live chat software provider velaro integrates following systems
Distributed computing architecture
virtual 8086 mode 80386 microprocessor later virtual 8086 mode also called virtual real mode v86-mode vm86 allows execution real mode applications incapable running directly protected mode processor running protected mode operating system hardware virtualization technique allowed multiple 8086 processors emulated 386 chip emerged painful experiences 80286 protected mode suitable run concurrent real mode applications well vm86 mode uses segmentation scheme identical real mode compatibility reasons creates 20-bit linear addresses manner 20-bit physical addresses created real mode subject protected mode memory paging mechanism virtual 8086 mode mode protected-mode task consequently processor switch vm86 non-vm86 tasks enabling multitasking legacy dos applications use virtual 8086 mode operating system sets virtual 8086 mode monitor program manages real-mode program emulates filters access system hardware software resources monitor must run privilege level 0 protected mode 8086 program runs vm86 mode privilege level 3 real-mode program attempts things like access certain i/o ports use hardware devices access certain regions memory space cpu traps events calls v86 monitor examines real mode program trying either acts proxy interface hardware emulates intended function real-mode program trying access terminates real-mode program trying something either allowed adequately supported reboot machine set video display mode supported hardware emulated write operating system code v86 monitor also deny permission gently emulating failure requested operation—for example make disk drive always appear ready fact even checked drive simply permit real-mode program access also v86 monitor things like map memory pages intercept calls interrupts preempt real-mode program allowing real-mode programs multitasked like protected-mode programs intercepting hardware software i/o real-mode program tracking state v86 program expects allow multiple programs share hardware without interfering v86 mode provides way real-mode programs designed single-tasking environment like dos run concurrently multitasking environment used execute certain dos programs flexos 386 since 1987 concurrent dos 386 since 1987 windows/386 2.10 since 1987 desqview 386 since 1988 windows 3.x since 1990 multiuser dos since 1991 windows workgroups 3.1x since 1992 os/2 2.x since 1992 4690 os since 1993 real/32 since 1995 running 386 enhanced mode well windows 95 98 98 se virtual dos machines sco unix merge linux dosemu dos programs use protected mode execute using user mode emulator ntvdm x86 windows nt-based operating systems also use vm86 mode limited direct hardware access common problem running 8086 code protected mode memory addressing totally different protected mode real mode mentioned working vm86 mode segmentation mechanism reconfigured work like real mode paging mechanism still active transparent real mode code thus memory protection still applicable isolation address space interrupts hardware software int instruction occur processor switches vm86 mode returns work full protected mode handle interrupt also servicing interrupt ds es fs gs registers pushed new stack zeroed pentium architecture added number enhancements virtual 8086 mode however documented intel starting subsequent p6 microarchitecture recent formal name virtual 8086 mode enhancements abbreviated vme older documentation may use extensions last word vme acronym expansion later intel 486 chips also support enhancements address mainly 8086 virtualization overhead particular focus virtual interrupts extensions publicly documented p6 documentation official documentation referred famed appendix h omitted public documentation shared selected partners nda activating vme done setting bit number 0 0x1 value cr4 vme interrupt speed-up enhancements found useful non-vm86 protected tasks also enabled separately setting bit number 1 0x2 value called pvi protected mode virtual interrupts detecting whether processor supports vme including pvi done using cpuid instruction testing value second bit bit number 1 0x2 value edx register set vme supported processor linux latter bit reported vme flag /proc/cpuinfo file flags section virtual 8086 mode basic idea iopl less 3 pushf/popf/sti/cli/int/iret instructions treat value vif real 32-bit eflags register value simulated 16-bit flags register 32-bit pushfd/popfd continues gp fault vip cause gp fault setting simulated directing os process pending interrupts pvi idea affects cli/sti instructions first generation amd ryzen cpus found feature broken vme implementation second generation ryzen 2000 series fixed issue support virtual 8086 mode available x86-64 long mode although still present 64-bit capable processors running legacy mode addition vt-x added back ability run virtual 8086 mode x86-64 long mode done transitioning physical processor vmx root mode launching logical virtual processor running virtual 8086 mode westmere later intel processors usually start logical processor directly real mode using unrestricted guest feature requires extended page tables method removes need resort nested virtual 8086 mode simply run legacy bios booting
Programming language topics
premake premake open-source software development utility automatically building configuration source code features system following example premake script simple software project solution mysolution project myproject number notable uses including
Operating systems
namco system 10 namco system 10 arcade system board released namco 2000 based sony playstation hardware preceded namco system 23 1997 succeeded namco system 246
Computer architecture
pool registrar computing pool registrar pr component reliable server pooling rserpool framework manages handlespace prs also denoted enrp server name server ns responsibilities pr following
Internet protocols
secureware secureware inc. founded 1986 developed software encryption technology securing unix-based operating systems secure operating system used help secure world first internet bank security first network bank s1 technologies secureware also worked closely hp federal division develop security products trusted operating system used u.s. department defense certain military information 1996 secureware internet system security division sold hewlett packard rest secureware acquired security first network bank later year
Computer security
ping death ping death type attack computer system involves sending malformed otherwise malicious ping computer correctly-formed ping packet typically 56 bytes size 64 bytes internet protocol header considered however ipv4 packet including pings may large 65,535 bytes computer systems never designed properly handle ping packet larger maximum packet size violates internet protocol documented rfc 791 like large well-formed packets ping death fragmented groups 8 octets transmission however target computer reassembles malformed packet buffer overflow occur causing system crash potentially allowing injection malicious code early implementations tcp/ip bug easy exploit affect wide variety systems including unix linux mac windows peripheral devices systems began filtering pings death firewalls detection methods different kind ping attack known ping flooding later appeared floods victim many ping requests normal traffic fails reach system basic denial-of-service attack defined rfc 791 maximum packet length ipv4 packet including ip header 65,535 2 − 1 bytes limitation presented use 16-bit wide ip header field describes total packet length underlying data link layer almost always poses limits maximum frame size see mtu ethernet typically 1500 bytes case large ip packet split across multiple ip packets also known ip fragments ip fragment match imposed limit receiver ip fragments reassemble complete ip packet continue processing usual fragmentation performed ip fragment needs carry information part original ip packet contains information kept fragment offset field ip header field 13 bits long contains offset data current ip fragment original ip packet offset given units 8 bytes allows maximum offset 65,528 2-1 *8 adding 20 bytes ip header maximum 65,548 bytes exceeds maximum frame size means ip fragment maximum offset data larger 7 bytes else would exceed limit maximum packet length malicious user send ip fragment maximum offset much data 8 bytes large physical layer allows receiver assembles ip fragments end ip packet larger 65,535 bytes may possibly overflow memory buffers receiver allocated packet cause various problems evident description problem nothing icmp used payload big enough exploit problem problem reassembly process ip fragments may contain type protocol tcp udp igmp etc. correction problem add checks reassembly process check incoming ip fragment makes sure sum fragment offset total length fields ip header ip fragment smaller equal 65,535 sum greater packet invalid ip fragment ignored check performed firewalls protect hosts bug fixed another fix problem using memory buffer larger 65,535 bytes re-assembly packet essentially breaking specification since adds support packets larger allowed 2013 ipv6 version ping death vulnerability discovered microsoft windows windows tcp/ip stack n't handle memory allocation correctly processing incoming malformed icmpv6 packets could cause remote denial service vulnerability fixed ms13-065 august 2013 cve-id vulnerability cve-2013-3183
Computer security
golfboo golfboo golf course search engine optimized towards finding golf courses online bargains co-founded 2013 antonio conde fabio peral headquartered marbella spain engine provides search tool find locations descriptions facility list reviews golf courses europe golfboo golf course search engine locates golf courses golf vacation travel packages real estate options website uses algorithms rating system search filters golfboo founded january 2013 antonio conde online marketer fabio peral former golf consultant royal troon golf club golf director la quinta lumine buenaventura located panama first version website launched june 2013 former version site focused advertised golf courses golf bargain packages later site expanded listing tee times hotels deals real estate located specific golfing spots golfboo received online exposure initial debut due fact golf-specific travel search engine comparison website first travel website curtail search optimization towards finding real estate golf recreational areas
Web technology
typeform service typeform barcelona-based online software service saas company specializes online form building online surveys main software creates dynamic forms based user needs typeform software used apple inc. airbnb uber nike inc. typeform produces millions forms every month typeform founded 2012 robert muñoz david okuniev typeform software released alpha phase invitation software launched beta april 2013 raised €550,000 seed funding company generated additional €1.2 million 2014 typeform software officially launched february 2014 august 2014 software 100,000 users october 2015 company raised 15 million series funding led london-based index ventures previous investors point nine capital connect ventures rta ventures ceo squarespace anthony casalena facebook vice president growth javier olivan jay parikh facebook also participated funding round june 27 2018 typeform engineering team became aware unknown third party gained access typeform server obtained access customer data downloaded attackers gained access data backups surveys conducted may 3rd 2018 100,000 records affected typeforms present questions slide one another showing one question time keep users engaged include images gifs videos tool includes calculator custom thank screens question groups allow questions added sections include sub-questions logic jump customizes questions user sees based selections form embedded website open pop-up accessed unique url form-builder uses freemium business model typeform i/o developer api creates forms based user data api allows users generate forms using code rather traditional typeform tool typeform.io standalone service connected typeform.com service discontinued early 2018 typeform launched developer platform september 2017 developer-oriented apis sdks similar typeform.io functionality integrated rest platform developers create forms programatically using create api retrieve form results using responses api webhooks perform advanced form embedding embedding sdk
Distributed computing architecture
ken kutaragi also designed sound processor super nes sony designed vlsi chip works conjunction ps1 risc cpu handle graphics rendering kutaragi closely watched financial analysts trace profiles losses profits sony corporation ken kutaragi born tokyo japan parents although wealthy japanese standards still managed business small printing plant city kutaragi grew childhood actively encouraged young boy explore mechanical abilities plant worked school aside duties parents factory kutaragi studious high-level student often described straight student kutaragi always desire tinker often taking apart toys child rather playing curiosity carried childhood leading teenager learn intricacies electronics eventually fact love electronics led enrolling university electro-communications acquired electronics degree 1970 immediately graduation kutaragi began working sony digital research labs mid-1970 although time considered radical decision kutaragi felt sony fast track quickly gained reputation excellent problem solver forward thinking engineer earning reputation working many successful projects including early liquid crystal displays lcds digital cameras late 1980s watching daughter play famicom realized potential existed within video games particular time sony executives interest video games thus nintendo expressed need sound chip upcoming new 16-bit system kutaragi accepted offer working secret designed chip spc700 found sony executives furious sony ceo norio ohga approval kutaragi able complete chip keep job even working nintendo within sony gaming still regarded fad despite hostile atmosphere video games kutaragi managed persuade norio ohga making two devices snes add-on snes-cd sony branded console could play snes-cd games nintendo cartridges efforts resulted device called play station console would compatible super famicom games software released new format called superdisc eventually partnership sony nintendo faltered due licensing disagreements kutaragi sony continued develop console kutaragi later recalled staying night working console design several nights row work interesting despite considered risky gamble sony executives kutaragi support norio ohga several years later company released original playstation success playstation led heading development consoles like playstation 2 successor playstation 3 commercial success playstation franchise makes sony computer entertainment profitable business division sony despite upstart console market veterans nintendo sega first playstation displaced become popular console era playstation 2 extended sony lead following generation one point holding 65 market share 100 million units shipped ken recognized many financial technological publications success notably named one 100 influential people 2004 time magazine gutenberg video games 1997 kutaragi appointed ceo sony computer entertainment america accordingly moved california since 1997 kutaragi favoured become next sony president enjoyed close relationship sony ceo norio ohga backed kutaragi sound chip playstation projects ohga successor nobuyuki idei promoted kutaragi deputy executive president sony-global chief operating officer vice-chairman 2003 november 30 2006 kutaragi replaced president sony computer entertainment kaz hirai president sce america addition management changes kutaragi promoted chairman scei retained position chief executive officer group april 26 2007 announced kutaragi would retire instead take role honorary chairman taking position would scei president ceo kaz hirai would eventually promoted president ceo sony june 29 2011 following reshuffling management sony announced june 28 2011 kutaragi stepped honorary chairman scei kutaragi relinquished active management business created built 2007 stepped executive chairman group ceo sony computer entertainment remained sony senior technology advisor ken kutaragi later became president ceo cyber ai entertainment inc also serves boards kadokawa group holdings inc. nojima corporation rakuten inc 2009 became visiting professor ritsumeikan university although kutaragi leadership consumer electronics successful analysts also suspect outgoing sony ceo nobuyuki idei set kutaragi fail given men cool working relationship idei assigned kutaragi tedious task turning around consumer division already falling behind competitors samsung lcd market kutaragi rival top position howard stringer given less difficult assignment content business success sony bmg music entertainment resulted promotion sony computer entertainment kutaragi heading since inception weaker year 2004 several years solid growth year sony ’ game sales fell 7.5 billion 8.2 billion operating income slid 650 million 1 billion losing 25 million q4 2004 attributed partially over-saturation video game market price wars caused ps2 lose top sales position time kutaragi labelled xbox 360 xbox 1.5 stated going playstation 2 however sce executive tetsuhiko yasuda consider microsoft competitor said might consider working games together september 2006 kutaragi admitted shortage playstation 3 consoles north america japan well postponing consoles debut europe put sony strength hardware decline
Computer architecture
jmp x86 instruction x86 assembly language codice_1 instruction performs unconditional jump instruction transfers flow execution changing instruction pointer register number different opcodes perform jump depending whether processor real mode protected mode override instruction used instructions may take 16-bit 32-bit segment offset pointers many different forms jumps relative conditional absolute register-indirect jumps following examples illustrate note although first second jumps relative commonly destination address shown instead relative offset encoded opcode example one load ip new value codice_2 load cs codice_3 ip codice_4 example two load eip value codice_5 protected mode unreal mode example three jump value stored eax register protected mode
Computer architecture
pool element pool element pe server reliable server pooling rserpool framework responsibilities pe following
Internet protocols
nd812 12-bit nd812 produced nuclear data inc. commercial minicomputer developed scientific computing market nuclear data introduced 1970 price 10,000 architecture simple programmed i/o bus plus dma channel programmed i/o bus typically runs low medium-speed peripherals printers teletypes paper tape punches readers dma used cathode ray tube screens light pen analog-to-digital converters digital-to-analog converters tape drives disk drives word size 12 bits large enough handle unsigned integers 0 4095 – wide enough controlling simple machinery also enough handle signed numbers -2048 +2047 higher precision slide rule analog computers twelve bits could also store two six-bit characters note six-bit n't enough two cases unlike fuller ascii character set nd code one 6-bit character encoding included upper-case alphabetic digit subset punctuation control characters nd812 basic configuration main memory 4,096 twelve-bit words 2 microsecond cycle time memory expandable 16k words 4k word increments bits within word numbered significant bit bit 11 least significant bit bit 0 programming model consists four accumulator registers two main accumulators j k two sub accumulators r s. rich set arithmetic logical operations provided main accumulators instructions provided exchange data main sub accumulators conditional execution provided skip instructions condition tested subsequent instruction either executed skipped depending result test subsequent instruction usually jump instruction one instruction needed case test fails i/o facilities include programmable interrupts 4-levels priority trap location first 4k words memory i/o transmit 12 24 bits receive 12 24 bits transmit receive 12 bits cycle i/o instructions include 4 bits creating pulses peripheral control i/o peripherals attached via 76 signal connector allows direct memory access peripherals dma accomplished cycle stealing cpu store words directly core memory system nuclear data provided interfaces following peripherals nd812 operating system front panel run halt switches i/o facility allowed peripherals directly load programs memory computer halted executing instructions another option enter short loader program would used bootstrap desired program peripheral teletype paper tape reader since core memory non-volatile shutting computer result data program loss number system programs made available nuclear data use nd812 basc-12 assembler symbolic text editor nutran interpreter disk-based symbolic text editor assembler called basc-12 provided basc-12 two-pass assembler optional third pass pass one generates symbol table pass two produces binary output tape pass three provides listing program sample assembler principles programming nd812 computer manual shown nutran conversational fortran-like language provided nutran intended general scientific programming sample nutran shown example conversational nature nutran shown codice_1 command prompt codice_2 input prompt instruction set consists single double word instructions operands immediate direct indirect immediate operands encoded directly instruction literal value direct operands encoded address operand indirect operands encode address word containing pointer operand displacement sign bit allow single word instructions address locations -63 +63 location instruction bit 4 instruction allows choice indirect direct addressing displacement used indirect address contents location +/-63 locations instruction location used pointer actual operand many single word instructions reference memory use bits 4 5 part specification operation group 1 instructions perform arithmetic logical exchange shifting functions accumulator registers includes hardware multiply divide instructions bit 4 set k register affected bit 5 set j register affected bits set registers affected group 2 format instructions test internal conditions j k accumulator registers manipulate overflow flag status bits provide complement increment negation operations j k accumulator registers bits 9 10 11 select condition tested bit 9 change fields inhibits absolute address referencing different field one containing instruction bit 8 1 upper accumulator k used instruction otherwise lower accumulator j used bit 7 1 indirect addressing used otherwise direct addressing used status register doest exist distinct register contents several groups indicators stored j register desired jps int bits hold current field contents would used jps instruction interrupt flag overflow bits set explicitly j register contents rfov instruction bits must set distinct instructions nd812 processor provides simple stack operands n't use mechanism storing subroutine return addresses instead return address stored target codice_3 instruction codice_4 register updated point location following stored return address return subroutine indirect jump initial location subroutine restores program counter instruction following codice_3 instruction
Computer architecture
transaction application language transaction application language tal originally tandem application language block-structured procedural language optimized use tandem hardware tal resembles cross c pascal original system programming language tandem cisc machines assembler design concept tal evolution hewlett packard spl intimately associated optimized microprogrammed cisc instruction set tal statement could easily compile sequence instructions manipulated data transient floating register stack register stack floated crest program memory allocation call stack language appearance algol pascal begin end statements however semantics far like c. permit indefinite levels procedure nesting pass complex structured arguments value strictly type variable references programming techniques much like c using pointers structures occasional overlays deliberate string handling casts appropriate available datatypes include 8 bit 16 bit 32 bit introduced later 64 bit integers microcode level support available null terminated character strings however commonly used originally tandem nonstop operating system written tal recently much rewritten c tal deprecated new development migration cisc risc tal updated/replaced ptal compilers allowed tal accelerated/re-compiled native risc applications current migration risc intel itanium 2 tal ptal replaced eptal compilers allow tal ptal code accelerated/re-compiled native itanium applications
Programming language topics
unix-haters handbook unix-haters handbook semi-humorous edited compilation messages unix-haters mailing list book edited simson garfinkel daniel weise steven strassmann published 1994 book made available download free electronic format 2003 book concerns frustrations users unix operating system many users come systems felt far sophisticated computer science terms tremendously frustrated worse better design philosophy felt unix much software encapsulated book based messages sent unix-haters mailing list 1988 1993 contains foreword human factors guru norman anti-foreword dennis ritchie one creators operating system many book complaints unix operating system based design decisions fact shell expands wildcards means wildcards used filenames usernames times things example large proportion complaints anomalies command line interface many complaints still valid complaints book addressed time lack journaling file system criticisms operating system graphical user interface book predates rise linux thus concerns several commercial versions unix available inconsistencies another major complaint book —most replaced inconsistencies different versions linux incompatibilities various versions linux linux macos book printed trade paperback front cover designed similar scream air sickness bag printed phrase unix barf bag inserted inside back cover every copy publisher front-matter page dedication says ken dennis without book would possible references ken thompson dennis ritchie creators unix
Operating systems
comparison start menu replacements windows 8 microsoft windows 8 operating system introduced updated start menu known start screen uses full-screen design consisting tiles represent applications replaced windows desktop primary interface operating system additionally on-screen start button replaced hidden button corner screen microsoft explained start button removed people used noting addition pinning apps taskbar windows 7 change controversial among users market ensued applications restore visible start button emulate previous start menu design allow users boot directly desktop instead start screen following list start menu replacements windows 8 received coverage third-party sources number skins table givens number built-in skins downloadable skins appended number indicate download extensions possible retroui startisback classic shell start8 pokki five notable retroui offered 33 languages also windows server 2012 adds taskbar resizable windows startisback also localized classic shell used free open source proprietary freeware major items localized installing language pack windows update makes items fully localized classic shell also available windows 7 windows server claims 25 million downloads pokki download restore start menu free january 2013 1.5 million users pokki application platform based chromium enables desktop applications built—like mobile apps—using standard web languages like html5 css3 javascript also available windows xp windows 7 pokki raised 21.5m investors like google intel o'reilly business model make commission software sold app store start8 downloaded 5 million times
Operating systems
semantic analysis computational semantic analysis computational composite semantic analysis computational components semantic analysis refers formal analysis meaning computational refers approaches principle support effective implementation digital computers
Computational linguistics
pool user pool user pu client reliable server pooling rserpool framework order use service provided pool pu proceed following steps
Internet protocols
qtweb qtweb discontinued free open-source web browser developed logicware lsoft technologies qtweb used webkit browser engine embedded qt framework qtweb described lightweight web browser offers amount customisable features speed simplicity navigate however criticised lack extensions support way run java problems work several websites
Internet protocols
nokia 5800 xpressmusic nokia 5800 xpressmusic mid-range smartphone part xpressmusic line announced nokia 2 october 2008 london started shipping november year code-named tube first touchscreen-equipped s60 device nokia essentially first device run symbian^1 also known s60 5th edition touch-specific s60-based platform created symbian foundation touchscreen features tactile feedback though use nokia haptikos technology nokia 5800 xpressmusic 3.2-inch display resolution 640x360 pixels many features standard nokia nseries gps hsdpa wi-fi support highly anticipated device 2008 went become commercial success 8 million units sold year release praised supplied stylus low price viewed negative critics camera software issues nokia 5800 xpressmusic first touchscreen device nokia range 2004 nokia 7700 announced nokia series 90 device cancelled reached market followed nokia 7710 upgraded version 7700 became available 2005 nokia also produced uiq-based nokia 6708 phone 2005 in-house development bought taiwanese manufacturer benq nokia also produced range maemo-based internet tablets touchscreen interface mobile phones one connect use phone via bluetooth 5800 however nokia first symbian s60 touchscreen device aspect ratio display first among mobile phones compatibility mode java applications touchscreen-aware works using part screen displaying essential buttons required program launch 5800 xpressmusic january 2009 followed-up release nokia n97 may june 2009 followed series 40 based nokia 6208c january 2009 device well nokia music store launched south africa 24 april 2009 market nokia 5800 xpressmusic would compete touchscreen devices sony ericsson xperia x1 sony ericsson satio iphone 3g htc touch diamond lg renoir lg arena km900 blackberry storm 9500 samsung pixon samsung i900 omnia early february 2009 website mobile-review.com initially enthusiastic handset published research concluded nokia 5800 design flaw specifically phones used daily basis earpieces produced nokia contract third party would cease function short time repairs performed warranty would temporarily fix problem defect found earpiece design nokia public relations department admitted nokia 5800 xpressmusic contained design defect according nokia switched another earpiece manufacturer 5800 produced february 2009 later free defect previously produced earpieces eligible free warranty repair new earpiece parts also supplied nokia service centres future phone repairs permanently fix defect 21 august 2009 nokia announced new variant named nokia 5800 navigation edition addition normal nokia 5800 latest version nokia maps pre-installed also comes car charger car kit inside box gps decreases battery life nokia 5800 xpressmusic 5800 navigation edition however free lifetime navigation due new version ovi maps service available nokia.com prototype handset seen 2008 batman movie dark knight number music videos christina aguilera keeps gettin better womanizer britney spears flo rida right round pitbull shut pussycat dolls jai ho hush hush katy perry waking vegas cobra starship good girls go bad phone received generally positive reviews uk phone magazine mobile choice awarding full 5 stars 7 january 2009 issue 23 january 2009 nokia announced shipped millionth 5800 xpressmusic device even though still fully released worldwide noknok reported april one fastest selling smartphones time nokia q1 report released 16 april 2009 announced company shipped 2.6 million units quarter cumulative shipments 3 million units since smartphone launch q2 results released 16 july 2009 reports 3.7 million units shipped quarter 6.8 million units total shipped since release november 2009 8 million units sold nokia 5800 xpressmusic following specifications firmware version 20.0.012 onwards 5800 cpu clock increased 369 mhz 434 mhz matching n97 specification however improved overall performance observed since firmware version 30 13 january 2010 nokia released major firmware update version 40.0.005 update includes bug fixes speed improvements new features visible kinetic scrolling menus except main applications menus improved home screen first introduced nokia 5530 software update also saw removal alphanumeric keypad landscape view text input replaced full qwerty keyboard new home screen provides contacts carousel 20 contacts program shortcuts screen time change option selecting every menus hard notice one selects holds selection white normal colours selecting option still red like v20 19 april 2010 firmware version 50.0.005 released new major update brought new features available nokia n97 upgrade existing web browser version 7.2 full kinetic scrolling auto-full screen browsing web new music player mini-album art song list album list initial letter filtering track titles music player scrolling using scroll-bar result search function removed music player new application called ovi sync installed nokia music store received revamped user interface renamed ovi music regions quick office 4.2.374 integrated full free license search application icon changed minor updates better touch sensitivity tweaks faster operation phone present little update color option select silver hold option still white like v40 also new feature one-touch dialling firmware 51.0.006 appeared august 2010 contained minor bug fixes updates various applications rds function however remains dysfunctional since version 40.0.005 web browser lost ability re-flow text page enlarged firmware 51.2.007 also released north american nokia 5800 rm-428 august 2010 following changes software release comes improved browser improved video calls new version mail exchange also general performance improvements november 2010 updated firmware nokia 5800 released nokia 5800 v52.0.007 firmware update expects still pencil select several ability gallery big disadvantage still exists pictures videos listed one gallery separate galleries pictures videos 20 october 2011 firmware version 60.0.003 released new major update brought new symbian anna browser 7.3.1.33 swipe unlock feature
Operating systems
louis w. tordella louis william tordella may 1 1911 – january 10 1996 longest serving deputy director national security agency tordella born garrett indiana may 1 1911 grew chicago environs displayed early affinity mathematics obtained bachelors masters doctoral degrees 1930s outbreak world war ii found teaching mathematics chicago loyola university joined us navy immediately made contacts service brought aboard lieutenant junior grade 1942 went directly cryptologic work navy codebreaking organization op-20-g finished war op-20-g collection stations west coast bainbridge island washington skaggs island naval communication station war tordella stayed navy 1949 joined newly created armed forces security agency afsa early attempt achieve service unity business cryptology key figure devising policy new agency successor national security agency emerged 1952 replace afsa career nsa brought front rank cryptologists early advocate use computers cryptologic work helped cement close working relationship american industry grasp computer technology associated engineering concepts coupled understanding cryptanalysis led tordella push forcefully development supercomputers cryptologic applications tordella also leader securing american communications pushing series leading-edge new encoding devices secure u.s. government communications senior official nsa tordella played central role nsa outside relationships close collaborators britain commonwealth nations built trust tordella many foreign intelligence officials regarded linchpin relationship nsa tordella became deputy director nsa 1958 remained post retirement 1974 thus became longest serving deputy director nsa history tordella received unprecedented honors years retirement 1974 received national security medal national intelligence distinguished service medal relationship british recognized 1976 became honorary knight commander excellent order british empire 1992 security affairs support association composed mainly retired intelligence officials gave william o. baker medal distinguished service american intelligence died bethesda naval hospital 1996 waldenström macroglobulinemia colon cancer autopsy done determine actually caused death following death sixteen boxes recovered nsa office safe according budiansky ... documents turned compendium every single one nsa highly classified compartmented programs post-world war ii era lew allen ensured nsa department director ever wielded untrammeled power
Computer security
oauth oauth open standard access delegation commonly used way internet users grant websites applications access information websites without giving passwords mechanism used companies amazon google facebook microsoft twitter permit users share information accounts third party applications websites generally oauth provides clients secure delegated access server resources behalf resource owner specifies process resource owners authorize third-party access server resources without sharing credentials designed specifically work hypertext transfer protocol http oauth essentially allows access tokens issued third-party clients authorization server approval resource owner third party uses access token access protected resources hosted resource server oauth service complementary distinct openid oauth unrelated oath reference architecture authentication standard authorization however oauth directly related openid connect oidc since oidc authentication layer built top oauth 2.0 oauth also unrelated xacml authorization policy standard oauth used conjunction xacml oauth used ownership consent access delegation whereas xacml used define authorization policies e.g managers view documents region oauth began november 2006 blaine cook developing twitter openid implementation meanwhile ma.gnolia needed solution allow members openids authorize dashboard widgets access service cook chris messina larry halff magnolia met david recordon discuss using openid twitter ma.gnolia apis delegate authentication concluded open standards api access delegation oauth discussion group created april 2007 small group implementers write draft proposal open protocol dewitt clinton google learned oauth project expressed interest supporting effort july 2007 team drafted initial specification eran hammer joined coordinated many oauth contributions creating formal specification 4 december 2007 oauth core 1.0 final draft released 73rd internet engineering task force ietf meeting minneapolis november 2008 oauth bof held discuss bringing protocol ietf standardization work event well attended wide support formally chartering oauth working group within ietf oauth 1.0 protocol published rfc 5849 informational request comments april 2010 since 31 august 2010 third party twitter applications required use oauth oauth 2.0 framework published rfc 6749 bearer token usage rfc 6750 standards track requests comments october 2012 oauth 2.0 backwards compatible oauth 1.0 oauth 2.0 provides specific authorization flows web applications desktop applications mobile phones smart devices specification associated rfcs developed ietf oauth wg main framework published october 2012 facebook graph api supports oauth 2.0 google supports oauth 2.0 recommended authorization mechanism apis microsoft also supports oauth 2.0 various apis azure active directory service used secure many microsoft third party apis oauth 2.0 framework bearer token usage published october 2012 23 april 2009 session fixation security flaw 1.0 protocol announced affects oauth authorization flow also known 3-legged oauth oauth core 1.0 section 6 version 1.0a oauth core protocol issued address issue oauth 2.0 support signature encryption channel binding client verification relies completely tls degree confidentiality server authentication january 2013 internet engineering task force published threat model oauth 2.0 among threats outlined one called open redirector spring 2014 variant described name covert redirect wang jing oauth 2.0 analyzed using formal web protocol analysis analysis revealed setups multiple authorization servers one behaving maliciously clients become confused authorization server use may forward secrets malicious authorization server mix-up attack prompted creation new best current practice internet draft sets define new security standard oauth 2.0 assuming fix mix-up attack place security oauth 2.0 proven strong attacker models using formal analysis implementations oauth 2.0 numerous security flaws exposed april–may 2017 one million users gmail less 0.1 users may 2017 targeted oauth-based phishing attack receiving email purporting colleague employer friend wanting share document google docs clicked link within email directed sign allow potentially malicious third-party program called google apps access email account contacts online documents within approximately one hour phishing attack stopped google advised given google apps access email revoke access change passwords oauth used authorizing mechanism consume secured rss/atom feeds consumption rss/atom feeds require authentication always issue example rss feed secured google site could consumed using google reader instead three-legged oauth would used authorize rss client access feed google site also used means login without creating account site benefits host oauth system oauth authorization protocol rather authentication protocol using oauth authentication method may referred pseudo-authentication following diagrams highlight differences using openid specifically designed authentication protocol oauth authentication communication flow processes similar crucial difference openid authentication use case response identity provider assertion identity oauth authorization use case identity provider also api provider response identity provider access token may grant application ongoing access identity provider apis user behalf access token acts kind valet key application include requests identity provider prove permission user access apis identity provider typically always authenticates user part process granting oauth access token tempting view successful oauth access token request authentication method however oauth designed use case mind making assumption lead major security flaws xacml policy-based attribute-based access control authorization framework provides xacml oauth combined together deliver comprehensive approach authorization oauth provide policy language define access control policies xacml used policy language oauth focuses delegated access user grant twitter access facebook wall identity-centric authorization xacml takes attribute-based approach consider attributes user action resource context xacml possible define policies xacml provides fine-grained access control oauth oauth limited granularity coarse functionality scopes exposed target service result often makes sense combine oauth xacml together oauth provide delegated access use case consent management xacml provide authorization policies work applications processes data lastly xacml work transparently across multiple stacks apis web sso esbs home-grown apps databases ... oauth focuses exclusively http-based apps eran hammer resigned role lead author oauth 2.0 project withdrew ietf working group removed name specification july 2012 hammer cited conflict web enterprise cultures reason leaving noting ietf community enterprise use cases capable simple offered blueprint authorization protocol noted enterprise way providing whole new frontier sell consulting services integration solutions comparing oauth 2.0 oauth 1.0 hammer points become complex less interoperable less useful incomplete importantly less secure explains architectural changes 2.0 unbound tokens clients removed signatures cryptography protocol level added expiring tokens tokens could n't revoked complicating processing authorization numerous items left unspecified unlimited specification nature working group issue small get stuck leave open implementation decide hammer later gave presentation yet elaborating views david recordon later also removed name specifications unspecified reasons dick hardt took editor role framework published october 2012
Internet protocols
microsoft-specific exception handling mechanisms microsoft windows os family employs exception handling mechanisms based operating system specifics microsoft structured exception handling native exception handling mechanism windows forerunner technology vectored exception handling veh features codice_1 mechanism present standard c++ exceptions present imperative languages introduced later seh set handled separately thread execution microsoft supports seh programming technique compiler level ms visual c++ compiler features three non-standard keywords codice_2 codice_3 codice_4 — purpose exception handling aspects backed number win32 api functions example codice_5 raise seh exceptions manually thread execution windows link undocumented _exception_registration_record list start thread information block codice_2 statement essentially calls compiler-defined codice_7 function function allocates _exception_registration_record stack pointing codice_8 function codice_9 adds record list head end codice_2 block compiler-defined codice_11 function called reverse operation either compiler-defined routines inline programmer-defined codice_3 codice_4 blocks called within codice_8 programmer-defined blocks present _exception_registration_record created codice_7 extended additional fields used codice_8 case exception user mode code operating system parses thread _exception_registration_record list calls exception handler sequence handler signals handled exception return value list exhausted last one list always codice_17 displays general protection fault error message list traversed giving handlers chance clean resources used finally execution returns kernel mode process either resumed terminated vectored exception handling introduced windows xp vectored exception handling made available windows programmers using languages c++ visual basic veh replace structured exception handling seh rather veh seh coexist veh handlers priority seh handlers compared seh veh works like traditional notification callback scheme
Operating systems
extrusion detection extrusion detection outbound intrusion detection branch intrusion detection aimed developing mechanisms identify successful unsuccessful attempts use resources computer system compromise systems extrusion detection techniques focus primarily analysis system activity outbound traffic order detect malicious users malware network traffic may pose threat security neighboring systems intrusion detection mostly concerned identification incoming attacks intrusion attempts extrusion detection systems try prevent attacks launched first place implement monitoring controls leaf nodes network—rather concentrating choke points e.g. routers—in order distribute inspection workload take advantage visibility system state ultimate goal extrusion detection identify attack attempts launched already compromised system order prevent reaching target hereby containing impact threat
Computer security