text
stringlengths
6
1.88M
source
stringclasses
13 values
movapd x86 assembly programming language movapd name specific action performable modern x86 processors 2nd-generation streaming simd extensions sse2 action involves copying pair numbers temporary space processor use computations movapd one fastest ways accomplish effect specifically movapd causes 16-byte-aligned packed-doubles source copied xmm register 16-byte memory region source operand either xmm register xmm2 memory address m128 destination operand either xmm register xmm1 memory address m128 note however source destination operands memory addresses memory address operand 16-byte-aligned general protection exception gp raised cause strange interoperability bugs ordinary code calls external code compiled assumption 16-byte-aligned stack frame boundary x86 instruction listings
Computer architecture
ecmascript ecmascript es scripting-language specification standardized ecma international ecma-262 iso/iec 16262 created standardize javascript foster multiple independent implementations javascript remained best-known implementation ecmascript since standard first published well-known implementations including jscript actionscript ecmascript commonly used client-side scripting world wide web increasingly used writing server applications services using node.js ecmascript specification standardized specification scripting language developed brendan eich netscape initially named mocha later livescript finally javascript december 1995 sun microsystems netscape announced javascript press release first edition ecma-262 adopted ecma general assembly june 1997 several editions language standard published since name ecmascript compromise organizations involved standardizing language especially netscape microsoft whose disputes dominated early standards sessions eich commented ecmascript always unwanted trade name sounds like skin disease javascript jscript aim compatible ecmascript also provide additional features described ecma specifications ten editions ecma-262 published work version 10 standard finalized june 2019 june 2004 ecma international published ecma-357 standard defining extension ecmascript known ecmascript xml e4x ecma also defined compact profile ecmascript – known es-cp ecma 327 – designed resource-constrained devices withdrawn 2015 proposed fourth edition ecma-262 ecmascript 4 es4 would first major update ecmascript since third edition published 1999 specification along reference implementation originally targeted completion october 2008 overview language released working group october 23 2007 august 2008 ecmascript 4th edition proposal scaled back project codenamed ecmascript harmony features discussion harmony time included intent features partly better support programming large allow sacrificing script ability dynamic improve performance example tamarin – virtual machine actionscript developed open sourced adobe – just-in-time compilation jit support certain classes scripts addition introducing new features es3 bugs proposed fixed edition 4 fixes others support json encoding/decoding folded ecmascript 5th edition specification work started edition 4 es-cp compact profile specification completed continued approximately 18 months slow progress made balancing theory netscape javascript 2 specification implementation experience microsoft jscript .net time focus shifted ecmascript xml e4x standard update without controversy late 2007 debate eich later mozilla foundation cto chris wilson microsoft platform architect internet explorer became public number blogs wilson cautioned proposed changes ecmascript made backwards incompatible respects earlier versions language update amounted breaking web stakeholders opposed changes hidden view eich responded stating wilson seemed repeating falsehoods blogs denied attempt suppress dissent challenged critics give specific examples incompatibility pointed microsoft silverlight adobe air rely c actionscript 3 respectively larger complex ecmascript edition 3 yahoo microsoft google 4th edition dissenters formed subcommittee design less ambitious update ecmascript 3 tentatively named ecmascript 3.1 edition would focus security library updates large emphasis compatibility aforementioned public sparring ecmascript 3.1 ecmascript 4 teams agreed compromise two editions would worked parallel coordination teams ensure ecmascript 3.1 remains strict subset ecmascript 4 semantics syntax however differing philosophies team resulted repeated breakages subset rule remained doubtful ecmascript 4 dissenters would ever support implement ecmascript 4 future year since disagreement future ecmascript within ecma technical committee 39 two teams reached new compromise july 2008 brendan eich announced ecma tc39 would focus work ecmascript 3.1 later renamed ecmascript 5th edition project full collaboration parties vendors would target least two interoperable implementations early 2009 april 2009 ecma tc39 published final draft 5th edition announced testing interoperable implementations expected completed mid-july december 3 2009 ecma-262 5th edition published 6th edition initially known ecmascript 6 es6 later renamed ecmascript 2015 finalized june 2015 update adds significant new syntax writing complex applications including class declarations class foo ... es6 modules like import modulename ... export const foo defines semantically terms ecmascript 5 strict mode new features include iterators for/of loops python-style generators arrow function expression ... codice_1 keyword local declarations codice_2 keyword constant variable declarations binary data typed arrays new collections maps sets weakmap promises number math enhancements reflection proxies metaprogramming virtual objects wrappers template literals strings complete list extensive first ecmascript harmony specification also known es6 harmony 7th edition officially known ecmascript 2016 finalized june 2016 major standard language features include block-scoping variables functions destructuring patterns variables proper tail calls exponentiation operator codice_3 numbers codice_4 codice_5 keywords asynchronous programming 8th edition officially known ecmascript 2017 finalized june 2017 includescodice_6constructions work using generators promises ecmascript 2017 es2017 eighth edition includes features concurrency atomics syntactic integration promises async/await 9th edition officially known ecmascript 2018 finalized june 2018 new features include rest/spread operators variables three dots codice_7 asynchronous iteration codice_8 additions regexp 10th edition officially known ecmascript 2019 published june 2019.. es.next dynamic name refers whatever next version time writing es.next features correctly called proposals definition specification finalized yet ecmascript language includes structured dynamic functional prototype-based features es6 brought new mode defining functions called arrow functions es5 function would defined var readwikiarticle function content whereas es6 using new concise arrow function syntax var readwikiarticle content arrow functions also improve variable binding functions since es 2015 transpiling javascript become common transpilation source source compilation newer versions javascript used user source code transpiler rewrites compliant current specification usually transpilers transpile es3 maintain compatibility versions browsers settings transpiling specific version configured according need transpiling adds extra step build process sometimes done avoid needing polyfills polyfills allow using functionalities newer ecma versions older environments lack polyfills runtime interpreter user browser server instead transpiling rewrites ecma code build phase development reaches interpreter 2010 ecma international started developing standards test ecma 262 ecmascript test262 ecmascript conformance test suite used check closely javascript implementation follows ecmascript 5th edition specification test suite contains thousands individual tests tests specific requirements ecmascript specification development test262 project ecma technical committee 39 tc39 testing framework individual tests created member organizations tc39 contributed ecma use test262 important contributions made google sputnik testsuite microsoft contributed thousands tests test262 testsuite already contains 11,000 tests developed ecmascript specifications es7 well-supported major web browsers table shows conformance rate current versions software respect recent editions ecmascript content test hosted official repository https //github.com/tc39/test262 date test suite harness web browsers accessed also https //v8.github.io/test262/website/default.html https //bakkot.github.io/test262-web-runner/ official repository also points community maintained projects using test suite test ecmascript javascript environments like node.js
Programming language topics
lga 2011 lga 2011 also called socket r cpu socket intel released november 14 2011 replaces intel lga 1366 socket b lga 1567 performance high-end desktop server platforms socket 2011 protruding pins touch contact points underside processor lga 2011 socket uses qpi connect cpu additional cpus dmi 2.0 used connect processor pch memory controller 40 pci express pcie lanes integrated cpu secondary processor extra ×4 pcie interface replaces dmi interface predecessor lga 1366 provisioning integrated graphics socket supports four ddr3 ddr4 sdram memory channels three unbuffered registered dimms per channel well 40 pci express 2.0 3.0 lanes lga 2011 also ensure platform scalability beyond eight cores 20 mb cache lga 2011 socket used sandy bridge-e/ep ivy bridge-e/ep processors corresponding x79 e enthusiast class c600-series ep xeon class chipsets lga 2011-1 socket r2 updated generation socket successor lga 1567 used ivy bridge-ex xeon e7 v2 haswell-ex xeon e7 v3 cpus released february 2014 may 2015 respectively lga 2011-v3 socket r3 also referred lga 2011-3 another updated generation socket used haswell-e haswell-ep cpus released august september 2014 respectively updated socket generations physically similar lga 2011 different electrical signals ilm keying prevent backward compatibility older cpus intel cpu sockets use so-called independent loading mechanism ilm retention device apply specific amount uniform pressure required correctly hold cpu socket interface part design ilms differently placed protrusions intended mate cutouts cpu packagings protrusions also known ilm keying purpose preventing installation incompatible cpus otherwise physically compatible sockets preventing ilms mounted 180-degree rotation relative cpu socket different variants generations lga 2011 socket associated cpus come different ilm keying makes possible install cpus generation-matching sockets cpus intended mounted lga 2011-0 r lga 2011-1 r2 lga 2011-v3 r3 sockets mechanically compatible regarding dimensions ball pattern pitches designations contacts different generations lga 2011 socket cpus makes electrically logically incompatible original lga 2011 socket used sandy bridge-e/ep ivy bridge-e/ep processors lga 2011-1 used ivy bridge-ex xeon e7 v2 haswell-ex xeon e7 v3 cpus released february 2014 may 2015 respectively lga 2011-v3 socket used haswell-e haswell-ep cpus released august september 2014 respectively two types ilm exist different shapes heatsink mounting hole patterns m4 x 0.7 threads square ilm 80×80 mm mounting pattern narrow ilm 56×94 mm mounting pattern square ilm standard type narrow one alternatively available space-constrained applications matching heatsink required ilm type information intel x79 desktop c600 series workstations servers codenamed romley chipsets table romley ep platform delayed approximately one quarter allegedly due sas controller bug x79 appears contain silicon c600 series ecs enabled sas controller one boards even though sas officially supported intel x79 desktop processors lga 2011 2011-3 socket listed table x79 chipset allows increasing base clock bclk intel calls cpu strap 1.00× 1.25× 1.66× 2.50× cpu frequency derived bclk times cpu multiplier server processors lga 2011 socket listed table server processors lga 2011 socket server processors lga 2011-v3 socket listed tables one significant changes previous generation support ddr4 memory
Computer architecture
real time audiosuite real-time audiosuite rtas format audio plug-in developed digidesign currently avid technology pro tools le pro tools m-powered systems although run pro tools hd pro tools tdm systems rtas plug-ins use processing power host computer rather dsp cards used pro tools hd systems name suggests plug-in architecture designed run real-time mimicking hardware inserts traditional mixing console contrast rendering files time effects applied directly audio pro tools facilitated audiosuite plug-ins avid aax format runs native cpu pro tools hdx dsp replacement rtas april 7 2013 avid announced pro tools 11 version forward avid made aax plug-in format supported pro tools launch many third-party plug-in developers yet port software new aax format avid sell pro tools 11 11 10 license allowing users run pro tools 10.3.8 last version support rtas plug-ins employ form copy protection notably pace ilok dongle though plug-ins available free charge accompanying source code programming documentation available general public developers must contact avid sdk terms disclosure releasing information avid development materials making official rtas development incompatible open source software fxpansion stated rtas vst converter happen technical legal reasons
Operating systems
systemrescuecd systemrescuecd linux distribution x86 64 previously x86 computers primary purpose systemrescuecd repair un-bootable otherwise damaged computer systems system crash systemrescuecd intended used permanent operating system runs live cd usb flash drive type hard drive designed team led françois dupoux based arch linux starting version 6.0 provides x86-64 images based arch linux systemd init system increased size iso image longer fits one standard 700 mib cd requires either one dvd non-standard high-capacity cd 100-min writable cd using technique called overburning bootable media like usb flash drive systemrescuecd capable graphics using linux framebuffer option tools gparted uses version 4.19.20 linux kernel options connecting internet adsl modem ethernet graphical web browsers mozilla firefox systemrescuecd many features including cd also boot customized dvd almost 4.6 gb free space backed-up files makes good storing information needed hard drive formatting burn dvd one must burn image file first add separate files folders affect general way dvd works dvd used insert files hard drive using midnight commander
Operating systems
google apps script apps script scripting framework light-weight application development g suite platform based javascript 1.6 also includes portions 1.7 1.8 subset ecmascript 5 api apps script projects run server-side google infrastructure according google apps script provides easy ways automate tasks across google products third party services apps script also tool powers add-ons google docs sheets slides following code uses apps script ui services doclist services display contents google drive folder tree format notice use javascript use google web toolkit widgets google also introduced html service june 2012 alternative gwt widgets lets serve web pages interact server-side apps script functions embedding html gas gwt widget march 2014 google introduced add-ons docs sheets soon followed forms add-on stores let users add extra features google editors mail-merging workflows diagrams builders ... add-ons either 100 built apps script simply use apps script display ui google editors relying external backend perform tasks example mailchimp mail-merging tool add-on google docs communicates mailchimp platform send emails add-ons possible publish scripts google sheets script gallery users installed scripts gallery copy apps script code installed user sheet add-ons source code visible end user everyone using latest version published developer new approach make easier support existing code helped convince several companies mailchimp lucidchart invest apps script part add-ons release google also introduced ui style guide css package help developers built add-ons integrate smoothly editors add-on also reviewed google publication developers benefit advice googlers provide better user experience possible embed ads add-ons possible monetize
Programming language topics
safelayer secure communications safelayer secure communications s.a. spanish private company founded may 1999 develops software products public key infrastructure area digital security identity management electronic signature data protection safelayer technology part three major certification digital identity projects spain fábrica nacional de moneda timbre spanish id card dni electrónico spanish e-passport safelayer technology also secures nato x400 messaging system safelayer technology common criteria certified currently safelayer company whole family products cc eal4+ certified
Computer security
apache velocity apache velocity java-based template engine provides template language reference objects defined java code aims ensure clean separation presentation tier business tiers web application model–view–controller design pattern velocity open source software project hosted apache software foundation released apache license jon scott stevens derived name altivec velocity engine powerpc g4 chip common types applications use velocity following template processed velocity produces following html syntax overall concept apache velocity templates similar syntax older webmacro template engine also open source project
Web technology
mips-x mips-x microprocessor instruction set architecture developed follow-on project mips project stanford university team developed mips project supported defense advanced research projects agency started 1984 final form described set papers released 1986–87 unlike older cousin mips-x never commercialized workstation cpu mainly seen embedded designs based chips designed integrated information technology use digital video applications mips-x designed team architecturally similar instruction-set compatible mainline mips r-series processors processor obscure enough november 20 2005 support provided specialist developers green hills software notably missing gcc mips-x become important among dvd player firmware hackers since many dvd players especially low-end devices use chips based iit design produced ess technology central processor devices ess videodrive soc also include dsp co-processor decoding mpeg audio video streams programmer manual describes hsc instruction halt spontaneously combust instruction executed protection violation detected present -nsa variant processor platforms type instruction known halt catch fire
Computer architecture
exterior gateway protocol exterior gateway protocol egp routing protocol internet originally specified 1982 eric c. rosen bolt beranek newman david l. mills exterior gateway protocol egp protocol exchanging routing information two neighbor gateway hosts router network autonomous systems egp commonly used hosts internet exchange routing table information routing table contains list known routers addresses reach cost metric associated path router best available route chosen router polls neighbor intervals 120 480 seconds neighbor responds sending complete routing table egp-2 latest version egp egp developed bolt beranek newman early 1980s first described rfc 827 formally specified rfc 904 1984 egp simple reachability protocol unlike modern distance-vector path-vector protocols limited tree-like topologies early days internet egp version 3 egp3 used interconnect autonomous systems currently bgp version 4 accepted standard internet routing essentially replaced limited egp3 https //whatis.techtarget.com/definition/exterior-gateway-protocol-egp
Internet protocols
ultrasparc t1 sun microsystems ultrasparc t1 microprocessor known 14 november 2005 announcement development codename niagara multithreading multicore cpu designed lower energy consumption server computers cpu typically uses 72 w power 1.4 ghz afara websystems pioneered radical thread-heavy sparc design company purchased sun intellectual property became foundation coolthreads line processors starting t1 t1 new-from-the-ground-up sparc microprocessor implementation conforms ultrasparc architecture 2005 specification executes full sparc v9 instruction set sun produced two previous multicore processors ultrasparc iv iv+ ultrasparc t1 first microprocessor multicore multithreaded security built-in first release silicon hardware cryptographic units t1 unlike contemporary general purpose processor competing vendors processor available four six eight cpu cores core able handle four threads concurrently thus processor capable processing 32 threads concurrently ultrasparc t1 partitioned similar way high-end sun smp systems thus several cores partitioned running single group processes and/or threads cores deal rest processes system ultrasparc t1 designed scratch multi-threaded special-purpose processor thus introduces whole new architecture obtaining high performance rather try make core intelligent optimized sun goal run many concurrent threads possible maximize utilization core pipeline t1 cores less complex current high end processors order allow 8 cores fit die cores feature out-of-order execution sizable amount cache single-thread processors depend heavily large caches performance cache misses result wait data fetched main memory making cache larger probability cache miss reduced impact miss still t1 cores largely side-step issue cache misses multithreading core barrel processor meaning switches available threads cycle long-latency event occurs cache miss thread taken rotation data fetched cache background long-latency event completes thread made available execution sharing pipeline multiple threads may make thread slower overall throughput utilization core much higher also means impact cache misses greatly reduced t1 maintain high throughput smaller amount cache cache longer needs large enough hold working set recent cache misses thread benchmarks demonstrate approach worked well commercial integer multithreaded workloads java application servers enterprise resource planning erp application servers email lotus domino servers web servers benchmarks suggest core ultrasparc t1 powerful circa 2001 single-core single-threaded ultrasparc iii chip chip comparison significantly outperforms processors multithreaded integer workloads ultrasparc t1 contained 279 million transistors area 378 mm fabricated texas instruments ti 90 nm complementary metal–oxide–semiconductor cmos process nine levels copper interconnect core l1 16kb instruction cache 8kb data cache l2 cache 3mb l3 cache t1 processor found following products sun fujitsu computer systems ultrasparc t1 microprocessor unique strength weaknesses targeted specific markets rather used high-end number-crunching ultra-high performance applications chip targeted network-facing high-demand servers high-traffic web servers mid-tier java erp crm application servers often utilize large number separate threads one limitations t1 design single floating point unit fpu shared 8 cores making t1 unsuitable applications performing lot floating point mathematics however since processor intended markets typically make much use floating-point operations sun expect problem sun provides tool analysing application level parallelism use floating point instructions determine suitable use t1 t2 platform addition web application tier processing ultrasparc t1 may well suited smaller database applications large user count one customer published results showing mysql application running ultrasparc t1 server ran 13.5 times faster amd opteron server t1 first sparc processor supports hyper-privileged execution mode sparc hypervisor runs mode partition t1 system 32 logical domains run operating system instance currently solaris linux netbsd openbsd supported traditionally commercial software suites oracle database charge customers based number processors software runs early 2006 oracle changed licensing model introducing processor factor processor factor .25 t1 8-core t2000 requires 2-cpu license oracle processor core factor table since updated regularly new cpus came market q3 2006 ibm introduced concept value unit vu pricing core t1 30 pvus t2 core 50 pvus t3 70 pvus instead default value 100 pvus per core t1 offered single floating point unit shared 8 cores limiting usage hpc environments weakness mitigated follow-on ultrasparc t2 processor included 8 floating point units well additional features t1 available uniprocessor systems limiting vertical scalability large enterprise environments weakness mitigated follow-on victoria falls commercially known ultrasparc t2 plus well next generation sparc t3 sparc t4 ultrasparc t2+ sparc t3 sparc t4 offer single dual quad socket configurations t1 outstanding throughput massive numbers threads supported processor older applications burdened single thread bottlenecks occasionally exhibited poor overall performance single threaded application weakness mitigated follow-on sparc t4 processor t4 core count reduced 8 16 t3 cores made complex clock rate nearly doubled contributing faster single thread performance 300 500 increase previous generations additional effort made add critical thread api operating system would detect bottleneck would temporarily allocate resources entire core instead 1 8 threads targeted application processes exhibiting single threaded cpu bound behavior allowed t4 uniquely mitigate single threaded bottlenecks compromise overall architecture achieve massive multi-threaded throughput coolthreads tm architecture beginning ultrasparc t1 positive negative aspects certainly influential concurrent future designs sparc processors original ultrasparc t1 designed single cpu systems capable smp rock ambitious project intended support multiple-chip server architectures targeting traditional data-facing workloads databases seen follow-on sun smp processors ultrasparc iv rather replacement ultrasparc t1 t2 canceled timeframe oracle acquisition sun formerly known codename niagara 2 follow-on ultrasparc t1 t2 provides eight cores unlike t1 core supports 8 threads per core one fpu per core one enhanced cryptographic unit per core cpu embedded 10 gigabit ethernet network controllers february 2007 sun announced annual analyst summit third-generation simultaneous multithreading design code-named victoria falls taped october 2006 two-socket server 2 ru 128 threads 16 cores 65× performance improvement ultrasparc iii hot chips 19 conference sun announced victoria falls two-way four-way servers thus single 4-way smp server support 256 concurrent hardware threads april 2008 sun released 2-way ultrasparc t2 plus servers sparc enterprise t5140 t5240 october 2008 sun released 4-way ultrasparc t2 plus sparc enterprise t5440 server october 2006 sun disclosed niagara 3 built 45 nm process register reported june 2008 microprocessor 16 cores incorrectly suggesting core would 16 threads hot chips 21 conference sun revealed chip total 16 cores 128 threads according isscc 2010 presentation 16-core sparc soc processor enables 512 threads 4-way glueless system maximize throughput 6mb l2 cache 461gb/s 308-pin serdes i/o 2.4tb/s support required bandwidth six clock four voltage domains well power management circuit techniques optimize performance power variability yield trade-offs across 377mm die t4 cpu released late 2011 new t4 cpu drop 16 cores t3 back 8 cores used t1 t2 t2+ new t4 core design named s3 feature improved per-thread performance due introduction out-of-order execution well additional improved performance single-threaded programs 2010 larry ellison announced oracle offer oracle linux ultrasparc platform port scheduled available t4 t5 timeframe john fowler executive vice president systems oracle openworld 2014 said linux able run sparc point new t5 cpu features 128 threads 16 cores manufactured 28 nanometer technology march 21 2006 sun made ultrasparc t1 processor design available gnu general public license via opensparc project published information includes
Computer architecture
internet streaming media alliance internet streaming media alliance isma non-profit corporation founded december 2000 apple computer cisco systems kasenna philips sun microsystems stated mission accelerate market adoption open standards streaming progressive download rich media types internet protocols ip alliance representatives various points streaming work-flow time isma created standards already existed audio video codecs e.g mpeg real time streaming transport ip networks e.g rtp isma worked selecting profiles describing payload formats resolving various options standards isma specifications typically adopted existing specifications however specifications exist isma could create isma also performed interoperability testing allowing members ensure products conformed isma standards interoperate isma released several specifications transport rich media ip
Internet protocols
verisign verisign inc. american company based reston virginia united states operates diverse array network infrastructure including two internet thirteen root nameservers authoritative registry generic top-level domains country-code top-level domains back-end systems top-level domains verisign also offers range security services including managed dns distributed denial-of-service ddos attack mitigation cyber-threat reporting 2010 verisign sold authentication business unit – included secure sockets layer ssl certificate public key infrastructure pki verisign trust seal verisign identity protection vip services – symantec 1.28 billion deal capped multi-year effort verisign narrow focus core infrastructure security business units symantec later sold unit digicert 2017 verisign former chief financial officer cfo brian robins announced august 2010 company would move original location mountain view california dulles northern virginia 2011 due 95 company business east coast company incorporated delaware verisign founded 1995 spin-off rsa security certification services business new company received licenses key cryptographic patents held rsa set expire 2000 time-limited non-compete agreement new company served certificate authority ca initial mission providing trust internet electronic commerce digital authentication services products prior selling certificate business symantec 2010 verisign 3 million certificates operation everything military financial services retail applications making largest ca world 2000 verisign acquired network solutions operated tlds agreements internet corporation assigned names numbers icann united states department commerce core registry functions formed basis verisign naming division company largest significant business unit 2002 verisign charged violation securities exchange act verisign divested network solutions retail domain name registrar business 2003 retaining domain name registry wholesale function core internet addressing business year ended december 31 2010 verisign reported revenue 681 million 10 616 million 2009 verisign operates two businesses naming services encompasses operation top-level domains critical internet infrastructure network intelligence availability nia services encompasses ddos mitigation managed dns threat intelligence august 9 2010 symantec completed approximately 1.28 billion acquisition verisign authentication business including secure sockets layer ssl certificate services public key infrastructure pki services verisign trust services verisign identity protection vip authentication service majority stake verisign japan deal capped multi-year effort verisign narrow focus core infrastructure security business units following ongoing controversies regarding symantec handling certificate validation culminated google untrusting symantec-issued certificates chrome web browser symantec sold unit digicert 2017 verisign share price tumbled early 2014 hastened u.s. government announcement would relinquish oversight internet domain-naming system non-government entity ultimately internet corporation assigned names numbers chose continue verisign role root zone maintainer two entered new contract 2016 verisign core business naming services division division operates authoritative domain name registries two internet important top-level domains also contracted registry operator .name .gov top-level domains well country code top-level domains cocos islands tuvalu addition verisign primary technical subcontractor top-level domains respective registry operators non-profit organizations role verisign maintains zone files particular domains hosts domains domain servers registry operators wholesalers internet domain names domain name registrars act “ retailers ” working directly consumers register domain name address verisign also operates two internet thirteen root servers identified letters a-m verisign operates “ ” “ j ” root servers root servers form top hierarchical domain name system supports modern internet communication verisign also generates globally recognized root zone file also responsible processing changes file ordered icann via iana approved u.s. department commerce changes root zone originally distributed via root server distributed thirteen servers via separate distribution system verisign maintains verisign one 12 root server operators operate one thirteen root nameservers j root servers anycasted ” longer operated company datacenters means increase redundancy availability mitigate threat single point failure 2016 department commerce ended role managing internet dns transferred full control icann initially negatively impacted verisign stock icann eventually chose contract verisign continue role root zone maintainer verisign naming services division dates back 1993 network solutions awarded contract national science foundation manage operate civilian side internet domain name registrations network solutions sole registrar internet non governmental generic top-level domains 1998 icann established new system competitive registrars implemented result new policies network solutions divided two divisions nsi registry division established manage authoritative registries company would still operate separated customer-facing registrar business would compete registrars divisions even geographically split nsi registry moving corporate headquarters herndon virginia nearby dulles virginia 2000 verisign purchased network solutions taking role internet dns nsi registry division eventually became verisign naming services division remainder network solutions later sold verisign 2003 pivotal equity group verisign also offers trust seal products e-commerce sites competing space truste bbb online webtrust following sale authentication services division 2010 verisign relocated former headquarters mountain view california headquarters naming division sterling virginia originally nsi registry headquarters verisign began shopping year new permanent home shortly moving signed lease 12061 bluemont way reston former sallie mae headquarters 2010 decided purchase building september 2011 since terminated lease current space two buildings lakeside loudoun technology center company completed move end november 2011 new headquarters located reston town center development become major commercial business hub region addition reston headquarters verisign owns three data center properties one 22340 dresden street dulles virginia far corporate headquarters within large broad run technology park one 21 boulden circle new castle delaware third fribourg switzerland three data centers mirrored disaster one data center minimal impact operations verisign also leases office suite downtown washington d.c. k street government relations office located also leased server space numerous internet data centers around world dns constellation resolution sites located mostly major internet peering facilities one facility equinix ashburn datacenter ashburn virginia one world largest datacenters internet transit hubs january 2001 verisign mistakenly issued two class 3 code signing certificates individual claiming employee microsoft mistake discovered certificates revoked two weeks later routine audit verisign code-signing certificates specify certificate revocation list distribution point way automatically detected revoked placing microsoft customers risk microsoft later release special security patch order revoke certificates mark fraudulent 2002 verisign sued domain slamming – transferring domains registrars making registrants believe merely renewing domain name although found broken law barred suggesting domain expire claim transfer actually renewal september 2003 verisign introduced service called site finder redirected web browsers search service users attempted go non-existent domain names icann asserted verisign overstepped terms contract u.s. department commerce essence grants verisign right operate dns verisign shut service subsequently verisign filed lawsuit icann february 2004 seeking gain clarity services could offer context contract icann claim moved federal california state court august 2004 late 2005 verisign icann announced proposed settlement defined process introduction new registry services registry documents concerning settlements available icann.org icann comments mailing list archive documents criticisms raised regarding settlement additionally verisign involved matter decided ninth circuit keeping icann charter introduce competition domain name marketplace verisign agreed give operation top-level domain 2003 exchange continuation contract operate time 34 million registered addresses mid-2005 existing contract operation expired five companies including verisign bid management verisign enlisted numerous telecom heavyweights including microsoft ibm sun microsystems mci others assert verisign perfect record operating proposed verisign continue manage dns due critical importance domain underlying numerous backbone network services verisign also aided fact several bidders foreign based raised concerns national security circles june 8 2005 icann announced verisign approved operate 2011 information bidding process available icann july 1 2011 icann announced verisign approval operate .net extended another six years 2017 february 2012 verisign revealed network security repeatedly breached 2010 verisign stated breach impact domain name system dns maintain would provide details loss data verisign widely criticized disclosing breach earlier apparently attempting hide news october 2011 sec filing lack details provided verisign clear whether breach impacted certificate signing business acquired symantec late 2010 according oliver lavery director security research ncircle trust site using verisign ssl certificates without clarity logical answer ” november 29 2010 u.s. immigration customs enforcement u.s. ice issued seizure orders 82 web sites internet addresses reported involved illegal sale distribution counterfeit goods registry operator verisign performed required takedowns 82 sites order law enforcement informationweek reported verisign say received sealed court orders directing certain actions taken respect specific domain names removal 82 websites cited impetus launch dot-p2p project order create decentralized dns service without centralized registry operators following disappearance wikileaks following week forced move wikileaks.ch swiss domain electronic frontier foundation warned dangers key pieces internet infrastructure dns name translation corporate control
Computer security
gold parser gold free parsing system designed support multiple programming languages system uses dfa lexical analysis lalr algorithm parsing algorithms state machines use tables determine actions gold designed around principle logically separating process generating lalr dfa parse tables actual implementation parsing algorithms allows parsers implemented different programming languages maintaining grammars development process gold system consists three logical components builder engine compiled grammar table file definition functions intermediary builder engine builder primary component main application system builder used analyze syntax language specified grammar construct lalr dfa tables process ambiguities grammar reported essentially task performed compiler-compilers yacc antlr lalr dfa parse tables successfully constructed builder save data compiled grammar table file allows information reopened later builder used one engines currently builder component available windows 32-bit operating systems features builder compiled grammar table file used store table information generated builder unlike builder runs single platform engine component written specific programming language and/or development platform engine implements lalr dfa algorithms since different programming languages use different approaches designing programs implementation engine vary result implementation engine written visual basic 6 differ greatly one written ansi c. currently engines gold implemented following programming languages platforms new engines implemented using source code existing engines starting point gold grammars based directly backus–naur form regular expressions set notation following grammar defines syntax minimal general-purpose programming language called simple first step consists writing testing grammar language parsed grammar written using text editor notepad editor built builder stage coding required grammar complete analyzed builder lalr dfa parse tables constructed ambiguities problems grammar reported afterwards tables saved compiled grammar table file used later parsing engine point gold parser builder longer needed final stage tables read engine point development process dependent selected implementation language
Programming language topics
openwall project openwall project source various software including openwall gnu/*/linux owl security-enhanced linux distribution designed servers openwall patches security extensions included many major linux distributions name implies openwall gnu/*/linux draws source code design concepts numerous sources importantly project usage linux kernel parts gnu userland others include bsds openbsd openssh suite inspiration behind blowfish-based crypt password hashing compatible openbsd implementation issues international journal proof-of-concept get fuck poc||gtfo mirrored openwall project samizdat licence first issue 00 published 2013 issue 02 featured chaos computer club issue 07 2015 homage dr. dobb journal could rendered codice_1 codice_2 codice_3 codice_4 openwall project maintains also list algorithms source code public domain software lwn.net reviewed openwall linux 3.0 wrote
Operating systems
p-code machine computer programming p-code machine portable code machine virtual machine designed execute p-code assembly language hypothetical cpu term applied generically machines java virtual machine matlab precompiled code specific implementations famous p-machine pascal-p system particularly ucsd pascal implementation among whose developers p p-code construed mean pseudo often portable pseudo-code thus meaning instructions pseudo-machine although concept first implemented circa 1966 o-code bcpl p code euler language term p-code first appeared early 1970s two early compilers generating p-code pascal-p compiler 1973 nori ammann jensen hageli jacobi pascal-s compiler 1975 niklaus wirth programs translated p-code either interpreted software program emulates behavior hypothetical cpu translated machine code cpu program run executed sufficient commercial interest hardware implementation cpu specification may built e.g. pascal microengine version java processor compared direct translation native machine code two-stage approach involving translation p-code execution interpreter just-in-time compiler offers several advantages one significant disadvantages p-code execution speed sometimes remedied use jit compiler p-code often also easier reverse-engineer native code early 1980s least two operating systems achieved machine independence extensive use p-code business operating system bos cross-platform operating system designed run p-code programs exclusively ucsd p-system developed university california san diego self-compiling self-hosted operating system based p-code optimized generation pascal programming language 1990s translation p-code became popular strategy implementations languages python microsoft p-code visual basic java bytecode java go programming language uses generic portable assembly form p-code implemented ken thompson extension work plan 9 bell labs unlike clr bytecode jvm bytecode stable specification go build tools emit bytecode format used later time go assembler uses generic assembly language intermediate representation go executables machine-specific statically linked binaries like many p-code machines ucsd p-machine stack machine means instructions take operands stack place results back stack thus add instruction replaces two topmost elements stack sum instructions take immediate argument like pascal p-code strongly typed supporting boolean b character c integer real r set pointer types natively simple instructions unlike stack-based environments forth java virtual machine similar real target cpu p-system one stack shared procedure stack frames providing return address etc arguments local instructions three machine registers point stack grows upwards also present constant area heap growing towards stack np new pointer register points top lowest used address heap ep gets greater np machine memory exhausted fifth register pc points current instruction code area stack frames look like procedure calling sequence works follows call introduced codice_1 specifies difference nesting levels remember pascal supports nested procedures instruction mark stack i.e reserve first five cells stack frame initialise previous ep dynamic static link caller computes pushes parameters procedure issues call user procedure codice_1 number parameters codice_3 procedure address save pc return address cell set procedure address new pc user procedures begin two instructions first sets sp mp codice_4 second sets ep sp codice_5 codice_4 essentially specifies space reserved locals plus number parameters plus 5 codice_5 gives number entries needed locally stack memory exhaustion checked point returning caller accomplished via codice_8 giving return type r c b p return value return value stored appropriate cell previously types except p returning leave value stack instead calling user procedure cup standard procedure codice_9 called standard procedures pascal procedures like codice_10 codice_11 codice_12 codice_13 etc peculiarly codice_14 p-code instruction instead niklaus wirth specified simple p-code machine 1976 book algorithms data structures programs machine 3 registers program counter p base register b top-of-stack register 8 instructions code machine written pascal machine used run wirth pl/0 pascal subset compiler used teach compiler development
Programming language topics
internet open trading protocol internet open trading protocol iotp protocol provides inter-operable standardized payment system independent framework internet commerce tries replicate real-world trading processes closely possible iotp systems include variety different payment systems including digital cash electronic checks debit cards within protocol various payment transaction data contained within specific iotp messages customer merchant credit checker certifier bank delivery handler
Internet protocols
android developer challenge android developer challenge adc launched google 2008 aim providing awards high-quality mobile applications built android platform november 2009 winners android developers challenge ii selected two rounds scoring thousands android users well official panel judges overall winners adc ii sweetdreams doodle wavesecure android software stack mobile devices includes operating system middleware key applications android sdk provides tools apis necessary begin developing applications run android-powered devices android developer challenge competition innovative applications android google offered us 10 million prizes distributed adc adc ii entries judged panel experts fields mobile devices cellular telecommunications software development technology innovation google selected judges member organizations open handset alliance google mobile experts android developer challenge first announced january submissions accepted 2 january 14 april 2008 participants 70 countries total 1,788 entries adc immediate success android developers blog reported submission rate 170+ submissions per hour 14 april developers united states accounted one-third total applications rest came countries germany japan china india canada france uk many others entries represented diverse range application areas including games social-networking applications utilities productivity developer tools panel 100 judges received judging packets laptops preloaded submissions consistent fair environment judge submissions three weeks rigorous analysis judges released list 50 first round winners eligible participate final round 50 promising entries announced 5 may 2008 received 25,000 award fund development finalists given deadline 30 june 2008 submit applications final round competition concluded announcement ten teams received 275,000 ten teams received 100,000 entire list 275,000 award recipients 100,000 award recipients finalists judges viewed adc ii announced 27 may 2009. calling developers submit apps one ten specially-designated adc ii categories august categories applicants allowed submit applications single category winners selected two rounds scoring thousands android users well official panel judges adc ii contest open applications made publicly available android market prior august 1 2009 additionally applications entered adc contest ineligible adc ii contest regardless whether winning apps similarly updated versions applications entered adc 1 contest ineligible adc ii september 2009 users android-powered handsets could access android market able obtain special adc ii judging application android market app could download test rank applications submitted challenge users choosing participate review process downloaded submitted apps randomly rated along number criteria resulting final score app results first round generated top 20 applications 10 categories 200 apps total went second round first round adc ii closed 6 october 2009 first-round winners announced 5 november 2009 voting second round opened day ended november 25 android users able download final top 20 applications category evaluate manner first round using adc 2 judging app end voting period applications category ranked community vote constituting 40 final judging score along public ranking team google-selected judges evaluated applications scores constituted 60 final score google announced top winners adc ii november 30 sweetdreams doodle wavesecure nominated overall winners challenge furthermore 1st 2nd 3rd prizes awarded 10 categories
Operating systems
timesten timesten in-memory relational database management system persistence recoverability originally designed implemented hewlett-packard labs palo alto california timesten spun separate startup 1996 acquired oracle corporation 2005 data within timesten database located physical memory ram means data operation requires disk i/o unlike traditional disk-optimized relational databases oracle database db2 informix sql server whose designs must contain algorithms attempt minimize disk accesses timesten provides applications short consistent response-times high throughput required applications database-intensive workloads memory operates far faster hard disk timesten used applications service-level agreements require low predictable response times telecommunications real-time financial-services trading applications network equipment large web applications also unlike memory-caching systems use key-value pairs memcached hazelcast coherence timesten accessed standard interfaces provides functionality sql query language applications data residing oracle database utilize timesten database caching option distinct oracle database in-memory timesten functions in-memory cache database front oracle database timesten runs major unix/linux platforms various windows platforms 32-bit 64-bit modes timesten in-memory database management technology provides fast data access time assumes data reside physical memory ram run time result low response times enable high throughput even commodity hardware timesten functionality contained set shared libraries application developers link application allowing timesten execute part application process shared library approach different conventional rdbms systems database essentially set distinct processes applications connect via form inter-process communication communication may take form client/server connection spanning network may form intra-system ipc unix domain socket connection shared memory based connection mechanism data active timesten database stored shared memory segment allowing multiple timesten databases active concurrently also allowing application simultaneously access several timesten databases system 64-bit platforms size timesten database practically limited amount ram available host computer one customer production timesten database approaching two terabytes size utilized on-line transaction processing starting timesten requires starting background process called timesten main daemon starts multiple timesten subdaemon processes manage database created system subdaemon processes perform database operations client applications connect traditional disk-based relational databases typically use tcp/ip another ipc mechanism communicate database server process timesten applications reside server timesten database connect directly in-memory image database using timesten direct driver eliminating need inter-process communication kind thus providing extremely fast performance application resides remote server application also connect timesten database using traditional client/server model data access timesten data exists ram however timesten utilize non-volatile storage hard disk database persistence recoverability timesten database stores transactional data modifications in-memory log buffer eventually persisted disk form transaction log files addition timesten also persists snapshots in-memory database called checkpoint files disk combination checkpoint files transaction log files allow timesten provide recoverability event system failure timesten implements parallel log manager order maximize throughput large smp systems default timesten operates non-durable commit mode mode commit operation occurs purely memory writing log records transaction disk occurs asynchronously commit provides low response times high throughput cost potential small amount data loss event system failure true synchronous commit mode durable commit mode also provided mode avoids possibility data loss cost reduced performance operating synchronous commit mode timesten provides automatic group commit optimization timesten allows architect developer balance performance versus data safety providing control commit mode three different levels database connection transaction another option data protection high-availability use timesten replication timesten replication mechanism enables highly available system sending database updates two hosts timesten replication master host sends updates one subscriber hosts timesten recommends active-standby pair configuration highest availability active-standby pair consists two master databases active standby database addition active standby databases multiple subscriber databases configured serve disaster recovery copies read-only farms replication timesten implemented replication agent daemon process aims every timesten database involved replication replication agent sends receives updates databases communicating replication agents databases involved replication scheme change capture via log-mining in-memory optimization normal operating conditions change records captured in-memory log buffer need disk i/o communication replication agents via efficient stream-oriented protocol built top regular tcp/ip connections replication agent multi-threaded 11.2.2 release timesten supports parallel replication increased throughput replication workload automatically parallelized maximize throughput still maintaining correctness timesten provides capability cache data oracle database source used fashion timesten referred oracle in-memory database cache imdb cache oracle database product option utilize oracle database caching one defines one sql objects known cache groups cache group set one related database tables allows subsets rows and/or columns database tables cache group must defined primary key unique index declared across set non-nullable columns must related parent-child hierarchy via primary key-foreign key constraints sql predicates used control data cached cache group defined cache group loaded allowing oracle database data cached timesten applications read write cache groups data modifications synchronized corresponding oracle database tables either automatically manually timesten provides event notification mechanism transaction log api xla xla provides functions allow applications notified data changes occurring timesten tables also ddl occurring timesten database xla also used conjunction materialized views simplify process monitoring changes made rows spanning multiple tables xla works mining timesten transaction log stream similar manner replication agent database application deployments include oracle database want use timesten in-memory cache database use xla capture updates via custom application code apply updates backend database timesten founded hp labs marie-anne neimat sherry listgarten kurt shoens name smallbase hp jean-rené bouvier decided embed smallbase hp opencall made first commercial use product 1995 1996 product spun separate venture capital funded startup company based mountain view california leadership ceo jim groff product became popular telecommunications equipment response times milliseconds even microseconds required applications like packet switching company 90 employees profitable acquired oracle corporation 2005 acquisition neimat remained director timesten development oracle adding many oracle database features product support pl/sql integration oracle sql developer oracle enterprise manager
Databases
global resource serialization global resource serialization grs component within ibm z/os operating system responsible enabling fair access serially reusable computing resources datasets tape drives virtual resources lists queues control blocks programs request exclusive access resource means program subsequent requesting programs blocked program given access resource usually requested program needs update resource shared access means multiple programs given access resource usually requested program needs query state resource grs manages requests fifo first in/first order grs manages resources three different levels scoping order grs serialize resources multiple systems systems must clustered several options enable clustering ca inc. licenses product called multi-image manager ca-mim contains component called multi-image integrity mii used implement similar functions grs
Operating systems
snmptt snmptt snmp trap handler written perl use net-snmp/ucd-snmp snmptrapd program received traps translated user friendly messages using variable substitution output stdout text log file syslog nt event log mysql linux/windows postgresql odbc database user defined programs also executed snmptt downloaded sourceforge project page project web page information snmptt available following books
Computer security
translation unit programming c c++ programming language terminology translation unit ultimate input c c++ compiler object file generated casual usage sometimes referred compilation unit translation unit roughly consists source file processed c preprocessor meaning header files listed codice_1 directives literally included sections code within codice_2 may included macros expanded c program consists units called source files preprocessing files addition source code includes directives c preprocessor translation unit output c preprocessor – source file preprocessed preprocessing notably consists expanding source file recursively replace codice_1 directives literal file declared directive usually header files possibly source files result step preprocessing translation unit steps include macro expansion codice_4 directives conditional compilation codice_5 directives among others translates preprocessing translation unit translation unit translation unit compiler generates object file processed linked possibly object files form executable program note preprocessor principle language agnostic lexical preprocessor working lexical analysis level – parsing thus unable processing specific c syntax input compiler translation unit thus see preprocessor directives processed compiling starts given translation unit fundamentally based file actual source code fed compiler may appear substantially different source file programmer views particularly due recursive inclusion headers translation units define scope roughly file scope functioning similarly module scope c terminology referred internal linkage one two forms linkage c. names functions variables declared outside function block may visible either within given translation unit case said internal linkage – visible linker – may visible object files case said external linkage visible linker c notion modules however separate object files hence also translation units used produce object files function similarly separate modules source file include source files internal linkage translation unit scope may thought file scope including header files bulk project code typically held files codice_6 suffix codice_7 codice_8 codice_9 c++ codice_7 used conventionally files intended included typically codice_11 suffix codice_12 codice_13 also used c++ codice_11 common even c++ generally contain function variable definitions avoid name conflicts headers included multiple source files often case header files often included header files standard practice codice_6 files project include least one codice_11 file
Programming language topics
zetta cloud backup zetta american company specializing cloud-based backup disaster recovery small mid-sized businesses enterprises msps zetta provides cloud backup disaster recovery services on-premises backup archiving notable network efficient data transfer uses lightweight agent software replicate customer data creating second copy zetta bi-coastal enterprise-grade data centers available recovery data loss event server crash natural disaster zetta end-to-end disaster recovery service provides deployment-to-failback coverage features upfront network firewall vpn connectivity configuration automated disaster recovery testing software supports windows linux mac plug-ins sql ms exchange hyper-v vmware netapp filers zetta awarded several patents backup disaster recovery technology including minimizing network bandwidth replication/backup ensuring data replicated bit bit source system able scale internet volumes data zetta agent eliminates network round trips client side cache server state extensive parallelism wan optimization zetta also provides mountable backup zetta founded 2008 sunnyvale california jeff whitehead lou montulli jason harrison current ceo mike grossman investors zetta include sigma partners foundation capital industry ventures
Distributed computing architecture
os/8 os/8 primary operating system used digital equipment corporation pdp-8 minicomputer pre-os/8 earlier pdp-8 operating systems other/related dec operating systems os/78 os/278 os/12 latter virtually identical version os/8 used digital pdp-12 computer digital released os/8 images non-commercial purposes emulated simh os/8 provided simple operating environment commensurate complexity scale pdp-8 computers ran i/o supported via series supplied drivers used polled interrupt-driven techniques device drivers cleverly written could occupy one two memory pages 128 12-bit words able run page field 0 often required considerable cleverness use opr instruction 7xxx small negative constants memory-resident footprint os/8 256 words 128 words top field 0 128 words top field 1 rest operating system usr user service routines swapped memory transparently regard user program needed early versions os/8 rudimentary command line interpreter basic commands get save run assign deassign odt version 3 added sophisticated overlay called ccl concise command language implemented many commands os/8 ccl directly patterned ccl found digital pdp-10 systems running tops-10 fact much os/8 software system deliberately designed mimic closely possible tops-10 operating environment ccl command language later used pdp-11 computers running rt-11 rsx-11 rsts/e providing similar user operating environment across three architectures pdp-8s pdp-10s pdp-11s basic os ccl implemented many rather sophisticated commands many still exist modern command languages even ms-dos windows unix-like operating systems example compile command would automatically find right compiler given source file start compile/assemble/link cycle assign deassign commands allowed one use logical device names program instead physical names required ms-dos example program could write device flop aaa.txt first assign flop rxa2 file would created physical device rxa2 second floppy disk drive vax/vms commodore amiga operating system amigaos oses built around tripos made considerable use flexible feature set command capable setting many system options albeit crude method patching locations system binary code one command os-78 set sys os8 re-enabled monitor commands part os-78 build command could reconfigure os fly even adding device drivers often without reboot os os boot hard disk present command prompt half second os/8 supported simple flat file system variety mass storage devices including filenames pdp-8 took form ffffff.xx f represents uppercase alphanumeric character filename x represents upper-case alphanumeric character extension filetype contents given file stored contiguously single extent pip included option compress squeeze filesystem unallocated space moved single extent end disk could invoked squish ccl command much mung could used run teco macro os/8 volumes limited maximum storage size 4096 blocks 256 12-bit words rk05 2.4mb moving-head disk exceeded size 1.6 million words storage rk05 cartridges divided two partitions example first rk05 system would known rka0 sy rkb0 division commonly thought mean upper surface lower surface incorrect fact outer cylinders inner cylinders ascii files stored 3 8-bit characters per pair 12-bit words characters 1 2 right words 1 2 bits 0-3 4-7 3rd character stored leftmost bits pair words os/8 allocated pdp-8 12 bit words storing dates per y3b recognized cos-310 developed cusps commonly-used system programs utilities supplied os/8 included single-user basic two multi-user versions basic available options single-user basic used several overlays provide full functionality language os/8 booted dectape noticeable delay occurred time basic required switch overlays needed read tape multi-user versions basic edu20 edu25 differed whether supported block-replaceable devices dectape disk due cost constraints many pdp-8s punched paper tape readers mass-storage i/o device edu20 loaded paper tape could output paper tape writer machine one whereas edu25 understood structure filesystem could load dectape disk could create files dectape disk could run multiple basic programs simultaneously using primitive task-scheduler round-robined among attached terminals memory always tight pdp-8 used core memory extremely expensive compared ram technology came along years later mere 8k 12-bit words edu20 could support 4 terminals although memory recommended edu25 required additional 4k memory bank minimum 12k code contained disk device driver filesystem handler running edu20 edu25 self-contained programs n't use os/8 system calls immediately upon invoked os/8 command interpreter would overwrite os/8 entire resident portion 256 words upon startup edu25 would save contents memory dectape disk restore exited edu20 could targeted hardware configurations without block-replaceable device also rather complete fortran iv compiler available extra cost compiler generated code optional fpp-8 floating-point processor essentially separate cpu sharing memory pdp-8 cpu fpp-8 option installed fortran runtime code would detect use fpp-8 run main program code pdp-8 cpu would run i/o processor fpp-8 runtime code would instead call fpp-8 interpreter running pdp-8 cpu program would still run considerably reduced speed fortran iv compiler version 1 interesting bug loops counted incorrectly loops would count 1,2,3,5,6,7 … skipping 4 quick patch released fix
Operating systems
launchd launchd init operating system service management daemon created apple computer part macos efforts port launchd freebsd derived systems two main programs launchd system launchd launchctl launchd manages daemons system user level similar xinetd launchd start daemons demand similar watchdogd launchd monitor daemons make sure keep running launchd also replaced init pid 1 macos result responsible starting system boot time configuration files define parameters services run launchd stored launchagents launchdaemons subdirectories library folders property list-based files approximately thirty different keys set launchd knowledge configuration files ability read responsibility launchctl launchctl command line application talks launchd using ipc knows parse property list files used describe launchd jobs serializing using specialized dictionary protocol launchd understands launchctl used load unload daemons start stop launchd controlled jobs get system utilization statistics launchd child processes set environment settings launchd two main tasks first boot system second load maintain services simplified view mac os x tiger system startup powerpc mac intel mac efi replaces open firmware codice_1 replaces bootx step 4 startup scripts scan different directories jobs run two different directories scanned directories kept typical library directories mac os x. launchd different systemstarter may actually launch daemons boot time key launchd similar xinetd idea launch demand daemons launchd scans job plists boot time reserves listens ports requested jobs indicated plist ondemand key daemon actually loaded time rather launchd listen port start daemon needed shut daemon loaded launchd keep track make sure running needed way like watchdogd shares watchdogd requirement processes attempt fork daemonize process goes background launchd lose track attempt relaunch consequently mac os x tiger boots much faster previous releases system register daemons run actually launch fact progress bar appears boot time placebo application named waitingforloginwindow really show anything passage time hardest part manage launchd boot dependencies systemstarter simple system dependencies used uses requires provides keys plist startup item two main strategies creating launch dependencies tiger using ipc allow daemons talk amongst work watch files paths changes using ipc much subtle systemstarter keys requires work developer may lead cleaner quicker startups systemstarter still supported os x mountain lion removed os x yosemite launchd control services centralized launchctl application launchctl take commands command line standard operate interactive mode superuser privileges launchctl used make changes global scale set launchctl commands made permanent stored /etc/launchd.conf per-user ~/.launchd.conf file appears considered supported existing version macos launchctl communicates launchd via mach-specific ipc mechanism property list plist type file launchd uses program configuration launchd scans folder job submitted launchctl reads plist file describes program run list often used keys follows keys optional unless otherwise noted full list see apple manpage codice_5 name key sockets placed environment job run file descriptor socket available environment variable differs systemd socket activation name socket definition inside job configuration hardcoded application protocol less flexible although systemd require daemon hardcode starting file descriptor 2014 3 software designed coded dave zarzycki apple company planned following superseded os x environments – – things superseded launchd introduced mac os x v10.4 tiger 2005 r. tyler croy ported launchd freebsd part google summer code project could run pid 1 session init commonly used platform 2006 ubuntu linux distribution considered using launchd option rejected source code subject apple public source license – described inescapable licence problem ubuntu instead developed switched service management tool upstart august 2006 apple relicensed launchd apache license version 2.0 effort make adoption open source developers easier linux distributions use systemd upstart continue init bsds also continue init december 2013 r. tyler croy announced intent resume work port launchd freebsd openlaunchd github repo subsequently rose activity last wayback machine capture mac os forge area launchd june 2012 recent open source version apple 842.92.1 code os x 10.9.5 2014 os x 10.10 ios 8 apple moved code launchd closed source libxpc august 2015 jordan hubbard kip macy announced nextbsd based freebsd-current kernel adding mach ipc libdispatch notifyd asld launchd components derived darwin apple open-source code os x. apple developer apple developer retired documents library links
Operating systems
bulk copy program bulk copy program bcp command-line tool used import export data microsoft sql server sybase database tool often efficient recent gui-based applications dts import extract data common uses bcp
Databases
compatible time-sharing system compatible time-sharing system ctss one first time-sharing operating systems developed mit computation center ctss first demonstrated mit ibm 709 november 1961 service mit users began summer 1963 operated 1973 part time mit influential project mac also ran ctss service system spread beyond two sites ctss described paper presented 1962 spring joint computer conference greatly influenced design early time-sharing systems john backus said 1954 summer session mit time sharing big computer could used several small ones would need reading station user computers time like ibm 704 powerful enough implement system end 1958 mit computation center nevertheless added typewriter input 704 intent programmer operator could obtain additional answers machine time-sharing basis programs using machine simultaneously june 1959 christopher strachey published paper time sharing large fast computers unesco information processing conference paris envisaged programmer debugging program console like teletype connected computer another program running computer time debugging programs important problem time batch processing often took day submitting changed code getting results john mccarthy wrote memo mit preliminary study committee working committee established mit develop time sharing committees envisaged many users using computer time decided details implementing system mit started development system july 1961 time sharing commands become operational computation center ibm 709 november 1961 fernando j. corbató demonstrated mit called experimental time-sharing system may 3 1962 f. j. corbató m. m. daggett r. c. daley published paper system spring joint computer conference robert c. daley peter r. bos least 6 programmers implemented operating system partly based fortran monitor system system used ibm 7090 modified herbert m. teager added 3 flexowriters user consoles maybe timer 3 users two tape units one user file directory one dumping core program memory also one tape unit system commands disk drives memory 27 k words 36-bit words users 5 k words supervisor operating system input consoles written buffers supervisor interrupts return character received control given supervisor dumped running code tape decided run next console commands implemented time login logout input edit fap mad madtrn load use start skippm listf printf xdump xundump became initial version compatible time-sharing system apparently first ever public demonstration time-sharing claims refer special-purpose systems known papers published compatibility ctss background jobs run computer generally used compute resources time-sharing functions ctss used modified ibm 7090 mainframe computer two 32,768 32k 36-bit-word banks core memory instead normal one one bank reserved time-sharing supervisory program user programs ctss protected-mode kernel supervisor functions a-core memory bank could called software interrupts like modern operating systems causing memory-protection interrupts used software interrupts processor allocation scheduling quantum time unit 200 ms controlled multilevel feedback queue also special memory-management hardware clock interrupt ability trap certain instructions ctss first assembler fap compiler mad also fortran ii code could translated mad code later half system written mad later programming languages like lisp version algol every user one directory also directories groups people problem number file two names second name similar extension today first file could one four modes temporary permanent read-only class 1 read-only class 2 read-only class 2 differed user could change mode files files could also linked directories user directory directory listing listf input-output hardware mostly standard ibm peripherals included six data channels connecting multics also developed project mac started 1960s successor ctss – turn inspired development unix 1969 one technical terms inherited systems ctss daemon incompatible timesharing system another early revolutionary influential mit time-sharing system produced people disagreed direction taken ctss later multics name parody ctss later name unix parody multics
Operating systems
connected device configuration connected device configuration cdc specification framework java applications describing basic set libraries virtual-machine features must present implementation cdc combined one profiles give developers platform building applications embedded devices ranging pagers set-top boxes cdc developed java community process jsr 36 cdc 1.0.2 jsr 218 cdc 1.1.2 devices support cdc typically include 32-bit cpu 2 mb ram 2.5 mb rom available java application environment reference implementations cdc profiles based linux running intel-compatible pc optimized implementations available variety cpus operating systems profile set apis support devices different capabilities resources within cdc framework provide complete java application environment three profiles available build incrementally allow application developers choose appropriate programming model particular device basic cdc family profiles hackedis set java apis tuned low-footprint devices limited resources need graphical user interface system provides complete java application environment consumer products embedded devices without standards-based gui system version 1.1.2 specified jsr 219 implements subset java se 1.4.2 including set security-related optional packages java authentication authorization service jaas java secure socket extension jsse java cryptography extension jce personal basis profile provides superset foundation profile apis supports similar set devices lightweight graphical user interface requirements framework building lightweight graphical user interface components provided support awt classes heavyweight gui components provided components assume availability pointing device mouse specification described jsr 217 used products require standards-based graphical user interface without full awt compatibility xlet application programming model used application development within profile including advanced content blu-ray discs conforming bd-j specification personal profile extends personal basis profile gui toolkit based awt provides complete java application environment full awt support intended higher end devices pdas smart communicators set-top boxes game consoles automobile dashboard electronics recommended profile porting legacy personaljava-based applications specification described jsr 62 uses applet programming model application development cdc supports number optional packages allow developers access specific pieces extra functionality within restricted resource constraints java device
Programming language topics
security controls security controls safeguards countermeasures avoid detect counteract minimize security risks physical property information computer systems assets classified several criteria example according time act relative security incident according nature example similar categorization distinguishes control involving people technology operations/processes field information security controls protect confidentiality integrity and/or availability information so-called cia triad systems controls referred frameworks standards frameworks enable organization manage security controls across different types assets consistency numerous information security standards promote good security practices define frameworks systems structure analysis design managing information security controls well known outlined iso/iec 27001 specifies 114 controls 14 groups federal information processing standards fips apply us government agencies however certain national security systems purview committee national security systems managed outside standards federal information processing standard 200 fips 200 minimum security requirements federal information information systems specifies minimum security controls federal information systems processes risk-based selection security controls occurs catalog minimum security controls found nist special publication sp 800-53 fips 200 identifies 17 broad control families starting revision 3 800-53 program management controls identified controls independent system controls necessary effective security program starting revision 4 800-53 eight families privacy controls identified align security controls privacy expectations federal law telecommunications security controls defined security services part osi reference model technically aligned model widely recognized wide range frameworks standards looking internal business inter-business controls including
Computer security
connected limited device configuration connected limited device configuration cldc specification framework java applications describing basic set libraries virtual-machine features must present implementation cldc combined one profiles give developers platform building applications embedded devices limited resources pagers mobile phones cldc developed java community process jsr 30 cldc 1.0 jsr 139 cldc 1.1 cldc designed devices limited processing power memory graphical capability devices typically following features compared java se environment several apis absent entirely apis altered code requires explicit changes support cldc particular certain changes n't absence classes interfaces actually change signatures existing classes base class library example absence codice_1 interface appear base class library due restrictions reflection usage codice_2 classes normally implement codice_1 therefore implement tagging interface examples limitations depend version used features re-introduced version 1.1 cldc profile set apis support devices different capabilities resources within cldc framework provide complete java application environment specific profiles devices ranging vending machines set-top boxes mobile phone profile midp prevalent mobile information device profile profile designed cell phones two versions midp available specified jsr 37 midp 1.0 jsr 118 midp 2.0 versions provide lcd oriented gui api midp 2.0 including basic 2d gaming api applications written use profile called midlets many cell phones come midp implementation popular platform downloadable cell phone games information module profile specified jsr 195 designed vending machines network cards routers telephone boxes systems either simple display form limited two way network access apis application creation storage network access defined subset javax.microedition.io rms midlet packages midp siemens mobile nokia put forward specification jcp doja profile designed docomo i-mode mobile phone ntt docomo digital set top box profile specified jsr 242 designed cable market also referred onramp profile based subset opencable application platform ocap defines set apis development applications set-top boxes similar devices profile consists subsets cdc personal basis profile including support awt xlet file access network apis well several media-related interfaces ocap whole profile encompassed 31 java packages approximately 1500 apis pda optional packages specified jsr-75 designed pdas palm windows ce devices specification defines two independent packages represent important features found many pdas mobile devices packages
Programming language topics
weblocks weblocks advanced web framework common lisp web pages built simple widgets analogous gui widgets used application toolkits widgets written lisp using cl-who meta-language framework supports delimited continuations control flow full-stack framework since comes built-in database persistence systems programming weblocks similar continuation-passing style frameworks like seaside html http level details abstracted especially regard ajax form parameters although access easily available weblocks active development user community major lisp web-framework uncommon web extensions lisp lines built atop
Programming language topics
mathscinet mathscinet searchable online bibliographic database created american mathematical society 1996 contains contents journal mathematical reviews mr since 1940 along extensive author database links mr entries citations full journal entries links original articles contains almost 3 million items 1.7 million links original articles along parent publication mathematical reviews mathscinet become essential tool researchers mathematical sciences access database subscription generally available individual researchers affiliated larger subscribing institution first 40 years existence traditional typesetting used produce mathematical reviews journal starting 1980 bibliographic information reviews produced print electronic form formed basis first purely electronic version called mathfile launched 1982 enhancements added next 18 years current version known mathscinet went online 1996 unlike abstracting databases mathscinet takes care uniquely identify authors author search allows user find publications associated given author record even multiple authors exactly name person publishes multiple names name variants mathematical reviews personnel sometimes even contact authors ensure mathscinet correctly attributed papers mathscinet contains information 3 million articles eight hundred thousand authors indexed 1800 mathematical journals many abstracted cover-to-cover addition reviews bibliographical information selected articles included many engineering computer science applied journals abstracted mathscinet selection done editors mathematical reviews editors accept suggestions cover additional journals reconsider missing articles inclusion
Databases
table costs operations elliptic curves elliptic curve cryptography popular form public key encryption based mathematical theory elliptic curves points elliptic curve added form group addition operation article describes computational costs group addition certain related operations used elliptic curve cryptography algorithms next section presents table time-costs possible operations elliptic curves columns table labelled various computational operations rows table different models elliptic curves operations considered poem dbl doubling add addition madd mixed addition addition input scaled z -coordinate 1. mdbl mixed doubling doubling input scaled z coordinate 1 tpl tripling dbl+add combined double add step /poem see adding add doubling dbl points elliptic curves defined see group law importance doubling speed scaler multiplication discussed table information possible operations elliptic curves see http //hyperelliptic.org/efd/g1p/index.html different assumptions multiplication addition inversion elements fixed field time-cost operations varies table assumed means 100 multiplications required invert element one multiplication required compute square element multiplication needed multiply element parameter *param constant *const add two elements information results obtained different assumptions see http //hyperelliptic.org/efd/g1p/index.html applications elliptic curve cryptography elliptic curve method factorization ecm necessary consider scalar multiplication n p one way compute successively faster use double-and-add method e.g 5 p 2 2 p p general compute k p write formula_2 k 0,1 formula_3 k 1 formula_4 note simple algorithm takes 2l steps step consists doubling k ≠ 0 adding two points one reasons addition doubling formulas defined furthermore method applicable group group law written multiplicatively double-and-add algorithm instead called square-and-multiply algorithm
Computer security
blueborne security vulnerability blueborne type security vulnerability bluetooth implementations android ios linux windows affects many electronic devices laptops smart cars smartphones wearable gadgets one example vulnerabilities first reported armis iot security firm 12 september 2017 according armis blueborne attack vector potentially affect devices bluetooth capabilities estimated 8.2 billion devices today 2017 blueborne security vulnerabilities first reported armis iot security firm 12 september 2017 2017 blueborne estimated potentially affect 8.2 billion devices worldwide many devices affected including laptops smart cars smartphones wearable gadgets google provides blueborne vulnerability scanner armis android procedures help protect devices blueborne security vulnerabilities reported september 2017
Computer security
antarctic adventure gameplay similar sega turbo plays much slower pace features platform game elements penguin later named penta must reach next station time runs avoiding sea lions breaks ice throughout levels fish jump ice holes caught bonus points game like many early video games ending – player reaches last station game starts first level increased difficulty antarctic adventure followed sequel msx computer 1986 entitled penguin adventure addition penguin character penta son pentarou became mascot konami 1980s made appearances 10 games particularly note appearances parodius series shoot 'em games penta son pentarou appeared medal games like tsurikko penta balloon penta imo hori penta following 2002 released mobile 2001 released three mobiles like may 6 2003 titled part konami taisen colosseum following fishing game penta tsuri boken released i-revo screen game briefly seen introduction gradius rebirth released 2008 wii virtual console 2014 wii u virtual console msx version re-released windows store egg project november 25 2014 japan rumored coin-operated arcade version released konami 1984 existence actual example yet confirmed 1990 konami released japan handheld electronic game antarctic adventure although usually listed south pole literal translation japanese title 2014 antarctic adventure released special version colecovision flashback atgames available dollar general stores games pentarou makes fisherman
Computer architecture
p.t.o p.t.o pacific theater operations released japan console strategy video game released koei originally released pc-8801 1989 ported various platforms x68000 1990 msx2 1991 fm towns sega genesis super nes three 1992 players could assume one side pacific theater operations world war ii acting naval commander organizing fleets building new ships appropriating supplies fuel even engaging diplomacy countries player choose one several world war two battles simulate could control entire pacific campaign well japanese attack pearl harbor sequel p.t.o ii released koei 1993 teitoku ketsudan iii never released outside japan p.t.o iv released playstation 2 us europe players must choose one nine scenarios starting game first scenario negotiations breakdown long-term campaign player must win war mid-1941 war declared victory obtained controlling ports eliminating enemy ships scenarios begin midst certain major pacific conflict goal capture defend certain port sink protect number enemy ships scenario goal achieved player continue full campaign player option playing one two major world war ii pacific maritime powers united states allies japan axis countries begin allies two nations whatever point war gameplay begins time non-allied nations convinced ally side significant gifts diplomacy nations also break alliances poor diplomacy lead departure ships loaned navy instance united kingdom breaks allied forces us lose british ships fleet hermes countries behave historically example italy cease member axis 1943 due allied invasion countries available allies power starts control number pacific bases depending scenario begins focus long-term campaign capture enemy territories defending one reducing number ports enemy control zero territories produce fuel materials power controls fuel refers oil ships supplies soldiers materials refer ores metals used base repair ship repair construction new warships money used fund construction aircraft transports fund improvement technologies capturing territories thus increases resources available player denying use enemy power one home port newly manufactured ships aircraft stationed upon completion turn aircraft fuel materials assigned base however depending safety distance trade route resources may arrive certain ports capable 'urgent repair meaning affect small repairs ships docked ports capability control key regions crucial order maintain fighting capabilities one fleet sea less turnaround time ship repair ships damaged combat p.t.o faithfully recreates many actual battleships available pacific war displays ship icon relative ships ships given several attributes fortitude speed anti-air capability anti-ship capability ships also fitted radar search gunnery rockets scouts marines land invasion ships also given overall 'luck rating 1 99 ships survived many conflicts history like enterprise luck rating 99 several types warship available dreadnought battleships battleships cruisers fleet aircraft carriers light carriers destroyers submarines power starts certain number ships type number ships construction usually launching around historical commission date additional ships constructed replace ships previously lost battle either player prior scenario start date ship construction scheduled 6–24 months closer launch date industrial power expended construction materials consumed well dependent type hull built ship ratings chosen design ship class chosen construction cosmetic affect actual ship limitations attributes like actual hull type ships organized fleets comprise 16 ships 16 fleets arranged inactive ships home port one fleet side engage battle one time fleets must attack enemy succession rather fleets rating morale fatigue 0 99 morale goes victories shore leave defeats flagship lost also raised emergency banquet sea fatigue goes every battle crew infected plague ships also individual levels crew experience value starts high japanese low us experience levels gradually increase combat conducting training drills another type ship constructed transports used carrying additional fuel extend fleet range transporting resources territories home ports additional non-controlled shipping fleets constantly active game though displayed tactical maps transport fleets supplying bases protected unlisted destroyers cruisers engage enemy fleet following types aircraft immediately available fighters bombers scouts later game technology levels advanced jet fighters long-range bombers become available aircraft carriers fitted allow jets technology levels sufficient modified carrier carry jet fighters normal fighters long-range bombers launched land bases aircraft deployed bases aircraft carriers although ship types allow scouts launched via catapult aircraft placed bases take defensive role attacking fleet aircraft used scout enemy fleets day enemy fleets found land-based aircraft sortie attack naval fleet begins certain number fictional fleet commanders depending scenario chosen commanders placed command 16 fleets player arranges player creates commanders set rolled scores certain attributes – air command ability sea command ability bravery overall war ability scores range 01 99 total four scores 102 air sea abilities affect actual combat performance ships planes commander control bravery affects commander decision making fleet ai control war overall rating useful comes convincing army military officials agree submissions objectives budgeting industrial production computer gaming world 1993 approved genesis version p.t.o suitable core group strategy wargamers normally play videogames criticizing inadequate documentation reported game randomized campaigns provided 200-300 hours play time—more comparatively priced cartridge magazine favorably concluded p.t.o establishes new trend video gaming
Computer architecture
time sharing operating system time sharing operating system tsos discontinued operating system rca mainframe computers spectra 70 series tsos originally designed 1968 spectra 70/46 modified version 70/45 tsos quickly evolved virtual memory operating system vmos 1970 vmos continued supported later rca 3 rca 7 computer systems rca computer business 1971 sold computer business sperry corporation sperry renamed tsos vs/9 continued market early 1980s mid seventies enhanced version tsos called bs2000 offered german company siemens sperry – unisys – discontinued vs/9 bs2000 variant called bs2000/osd still offered fujitsu siemens computers used mainframe customers primarily europe name suggests tsos provided time sharing features beyond provided common user interface time sharing batch big advantage ibm os/360 successors mvs os/390 z/os
Operating systems
single-core single-core processor microprocessor single core chip running single thread one time term became common emergence multi-core processors several independent processors single chip distinguish non-multi-core designs example intel released core 2 solo core 2 duo one would refer former 'single-core variant microprocessors prior multi-core era single-core class many-core processors follows multi-core progression showing increasing parallelism time processors remained single-core impossible achieve performance gains increased clock speed transistor count allowed moore law diminishing returns increasing depth pipeline increasing cpu cache sizes adding execution units
Computer architecture
workboard workboard inc. enterprise saas company whose strategy results platform helps large organizations align quickly results workboard pioneered active strategy management category leveraging powerful okr technique distinctive enterprise-class technology workboard based redwood city california founded 2013 deidre paknad daryoush paknad deidre paknad history founding companies workboard including pss systems acquired ibm 2010 working ibm thought idea workboard dealing inefficiency tenure starting founding 2013 paknad co-founder daryoush paknad focused vq velocity quotient define speed organization able accomplish goal 2014 workboard secured seed money several venture capital firms including opus capital granite ventures crosslink capital announced series round december 2017 led floodgate microsoft ventures arjun chopra priya sapraisad joined board hundreds organizations use workboard including microsoft reliance industries transamerica samsung workboard also provides world okr coach certification program certified 300+ coaches to-date certified coaches experts implementing okrs organization
Distributed computing architecture
cddlm cddlm configuration description deployment lifecycle management specification global grid forum standard management deployment configuration grid service lifecycles inter-organization resources specification based component documents development api done global grid forum open standard model ietf standard development originally edited d. bell t. kojo p. goldsack s. loughran d. milojicic s. schaefer j. tatemura p. toft system administration distributed environment diverse hardware software patch level imposed user requirements makes ability deploy manage describe services software configuration difficult within grid difficulty complicated need similar service end points possibly heterogeneous architectures grid service requests may require configuration changes standard provided framework described language methods ability describe system configuration move system services software towards desired configuration endpoints furthermore served first real attempt address system administration issues within grid cddlm grids cfengine servers
Distributed computing architecture
powerbook duo powerbook duo line small subnotebooks manufactured sold apple computer 1992 1997 compact companion powerbook line improving upon powerbook 100 portability immediate predecessor apple third-smallest laptop duo came seven different models duo 210 230 250 270c 280 280c 2300c 210 230 earliest 2300c final incarnation entire line dropped early 1997 weighing mere slightly smaller sheet paper thick lightest smallest apple powerbooks time remains one apple smallest notebooks ever produced macbook air retina macbook pro retina macbook weigh less though wider deeper considerably thinner duo common original macbook air included one usb 2.0 port one video port requiring adapter one speaker port ability expansion powerbook duo line replaced powerbook 2400 slightly larger size duos still fifth-smallest behind 12-inch powerbook g4 succeeded fourth-smallest although featured much onboard functionality lacked docking ability duo line offered ultraportable design light functional travel expandable via unique docking connector however certain compromises made achieve level portability duo series used 88 standard desktop-sized keyboard criticized difficult type likewise trackball reduced size even used powerbook 100 usable port came standard duo dual printer/modem eia-422 serial port slot expensive optional internal 14.4 express modem provision built-in ethernet somewhat limited configuration meant way move data laptop stock configuration without purchasing additional accessories via relatively slow appletalk connection practical event hard drive problems compensating limitations initial duo offering provided considerably higher ram limit 24 mb compared 100 series 14 mb standard 80 mb hard drive versus 100 40 mb drive debut year duo offered passive matrix display mid-level high-end models contrast high end 100-series line duos shared processors powerbook 170 180 crisp active matrix displays already great demand lower-powered models passive matrix displays following year apple replaced earlier models active matrix display color active matrix display latter becoming de facto standard powerbook line respective duo models easily differentiated display method processor features identical 2xx duos powered either motorola 68030 68lc040 processors ranging 25-33 mhz apple debuted next-generation powerpc processors 1994 took nearly two years first powerpc duo 2300c debut original powerpc 601 like original 68040 produced much heat consumed much power apple use laptop end 1995 efficient powerpc 603e developed featured duo 2300c full-size companion powerbook 5300 series powerpc 603e designed 64-bit bus engineered apple run older 32-bit bus maintain compatibility duo docks led poor system video performance powerbook duos lacked common ports featuring one internal printer/modem serial port optional fax/modem card port place docking ability accomplished via unique 156-pin processor direct slot pds giving docks full access duo central processing unit cpu data buses several dock options offered apple third parties largest expensive dock powerbook duo form factor offered exclusively apple unlike docks port replicators plugged back laptops duo dock pulled laptop inside dock metal plastic case via internal sliding mechanism similar vhs player dock turned powerbook duo full-size ac-powered fully functional desktop computer standard ports like desktop computer dock could physically support heavy high-resolution crt display top duo dock included floppy drive side two nubus expansion slots optional floating-point unit fpu level 2 cache slot vram enable colors higher resolutions space second hard drive original duo dock replaced duo dock ii added aaui networking compatibility newer color-screen powerbook duos replacement lid offered allow use thicker color duos original duo dock dock ii followed duo dock plus identical duo dock ii lacked fpu level 2 cache—which compatible 68lc040-processor duo 280 powerpc-processor duo 2300c laptop lcd display obviously could opened inside dock additional nubus video cards could installed drive three monitors mini dock port expander powerbook duo popularly offered many third-party manufacturers apple attached powerbook duo could plugged various standard desktop devices including scsi apple desktop bus adb serial floppy disk external speakers external display type dock also allowed duo internal lcd battery used third-party contributions mini dock added variety specialized custom options including ethernet connectivity ntsc pal video ports significant difference docks full desktop configuration lack custom pds nubus expansion slots included standard desktop macs shortfall made task-specific third-party dock offerings type dock manufactured apple many third parties gave powerbook duo three extra ports minimal configuration examples include floppy scsi video ethernet docks typically included one adb port well least expensive basic docks type dock allowed duo internal lcd used well could run duo internal battery reduced amount time popular due minimal impact accessories must carried duo offered practical alternative emergency hard disk software situations task-specific needs 2300 last apple product carry vestige snow white design language apple phasing since 1990 drawing heavily upon improvements made original powerbook 140 design duo series continues many styling traits powerbook 100 approximately equivalent size weight addition snow white features duo takes 100 radius curves step along display top front sides also heavily mirrored various docks penlite early tablet computer prototyped apple computer 1993 around time apple newton pda rather complete computer project canceled 1994 due similarity newton penlite based powerbook duo meant tablet-style addition stylus input device designed compatible powerbook duo docks accessories ran standard classic mac os one stylish iconic laptops available time duo widely used advertising film television
Computer architecture
raster document object .rdo raster document object file format native format used xerox docutech range hardware software underpins company xerox document demand xdod systems therefore significant file format print demand market sector along postscript pdf rdo metafile format based open document architecture oda specifications xerox rdo implementation description control information stored within rdo file raster images stored separately usually separate folder tiff files rdo file dictates bitmap images used page document placed approach advantages disadvantages monolithic approach used pdf disadvantages rdo largely proprietary format multi-file approach means file management orphan control issue one tell computer file system whether files required document print present correct rdo favor multi-file approach allows networked device load small rdo file request larger bitmap files necessary allows full job specification loaded installed network almost immediately larger bitmap files transferred needed allowing flexibility managing network traffic loading tiff file format highly portable xerox makeready software supplied xdod systems readily imports export postscript files however xerox demand systems typically require document library stored rdo tiff files non-xerox applications read rdo structures directly
Programming language topics
csr classics csr classics free-to-play drag-racing game boss alien collaboration mad atom games published naturalmotion games game player takes role new racer looking make name city resembling las vegas ruled five racing crews story line consists racer agent trying prove seemingly corrupt mr. baladin guilt worked way business magnate behind scenes csr classics follow-up title successful csr racing released october 2013 ios end march 2014 gradually released android via google play csr classics features game mechanics similar sister title features classic race cars ranging 1950s 1980s late march 2018 announced online features csr classics would discontinued may 1 2018 online features later discontinued update may 21 2018 player starts found agent recruits player player goes tutorial game player receives sum money sufficient purchase first vehicle afterwards meeting race official csr classics universe player guided various events throughout game starts challenging first crew authentics led marco player starts challenge marco personally defeating crew members agent approaches player explains suspicion mr. baledin recently became top crew leader purchased valentine massive casino agent suspicion mr. baledin corrupt crew leaders involvement reign power agent reveals marco tearaway child thief also romantic affair another crew leader kandy however ties mr. baledin yet known player proceeds defeat marco authentics progressing tier 2 tier 2 player proceeds challenge thrillers commandeered olivia player continues challenge olivia agent tells player olivia background olivia runs car show name experienced severe financial troubles came mr. baledin loan however loan little help financial situation olivia car show became debt mr. baledin olivia associates agreed race mr. baledin make loss player defeats olivia thrillers moving onto tier 3 player starts challenging lord aziz high rollers tier 3 crew beaten lord aziz crew starting challenge lord aziz agent informs player lord aziz lord aziz inherited wealth father recently passed large gambler lord aziz lost father wealth playing baccarat blamed mr. baledin rigged baccarat games despite working mr. baledin rule lord aziz highly despises mr. baledin player defeats lord aziz high rollers made tier 4 player next crew defeat tier 4 crew lucky 7 kandy ringleader player defeats kandy crew members proceeds challenge agent shines light upon kandy despite romantic relationship marco kandy seen multiple times flirting mr. baledin later revealed marco kandy performed heist valentine mr. baledin caught duo instead alerting authorities mr. baledin blackmailed kandy marco working player defeats kandy last time proceeds tier 5 tier 5 player starts challenging house mr. baledin rule player defeats mr. baledin crew starts challenge leader csr classics universe agent informs player plan arrest mr. baledin player would distract baledin continuously racing allowing authorities prepare trap valentine mr. baledin allowing easy arrest defeating mr. baledin third final time mr. baledin shown custody agent talks player informing csr classics league unanimously elected marco become new leader league vowing ameliorate player also congratulated former crew leaders victory secretly despised mr. baledin however player shown discussion jailed mr. baledin formerly unknown client discuss plan executed perfectly revealed marco end line actually behind business csr classics single-player component split five tiers tier introducing progressively faster opposition vehicles player gets challenge boss level player must first beat boss crew move new tier player must race beat crew boss level beating boss level three times player challenged high-stakes rematch player wins race awarded boss car car one tier tier however player loses must give back prize gold previous boss race unlike traditional racing game csr classics feature steering braking acceleration controls instead game focuses timing gear changes use nitrous upgrade tapping screen similar fashion rhythm game player comes buy car choose unloved loved cars unloved cars upgrades usually able purchased via main form in-game currency whereas loved cars come equipped several upgrades always mandate usage valuable in-game currency loved cars also multiplayer via prize cars building car pieces purchasing loved version reduced price races take place across track extending quarter mile events split several categories
Operating systems
macintosh color classic macintosh color classic sold macintosh colour classic markets personal computer designed manufactured sold apple computer inc. february 1993 may 1995 all-in-one design integrated 10″ sony trinitron display supporting thousands colors video memory upgrade 512×384 pixel resolution color classic final model original compact family macintosh computers replaced larger-display macintosh lc 500 series power macintosh 5200 lc color classic motorola 68030 cpu running 16 mhz logic board similar macintosh lc ii like macintosh se se/30 color classic single expansion slot lc-type processor direct slot pds incompatible se slots primarily intended apple iie card primary reason color classic switchable 560x384 display essentially quadruple iie 280x192 high-resolution graphics offered education models lcs card allowed lcs emulate apple iie combination low-cost color macintosh apple iie compatibility intended encourage education market transition apple ii models macintoshes cards cpu accelerators ethernet video cards also made available color classic pds slot color classic shipped apple keyboard known apple keyboard ii m0487 featured soft power switch keyboard mouse supplied apple mouse known apple desktop bus mouse ii m2706 slightly updated model color classic ii featuring macintosh lc 550 logicboard 33 mhz processor released japan canada international markets 1993 sometimes performa 275 versions color classic 256 kb onboard vram expandable 512 kb plugging 256 kb vram simm onboard 68-pin vram slot name color classic printed directly front panel separate plastic insert enabled alternative spelling colour classic colour classic ii used appropriate markets color classic users upgraded machines motherboards performa/lc 575 units mystic upgrade others put entire performa/lc/quadra 630 successor innards takky upgrade based takky way upgrade color classic g3 cpu another common modification unit change display allow 640 × 480 resolution common requirement many programs especially games run introduced february 1 1993 introduced february 10 1993 introduced october 1 1993 introduced october 21 1993
Computer architecture
dmailer backup dmailer backup developed dmailer backup software microsoft windows os x operating systems provisory could back restore data computer two modes application automatic mode launched backup user data documents video music custom mode choose data would backed software included online service called dmailer online 2 gb free lifetime allowed user send online existing backup app service suspended data retrieved anymore version 3.0 application free use without license costs
Computer security
canon cat canon cat task-dedicated desktop computer released canon inc. 1987 price surface unlike dedicated word processors popular late 1970s early 1980s far powerful incorporates many unique ideas data manipulation canon cat primarily creation jef raskin originator macintosh project apple leaving company 1982 began designing new computer closer original vision inexpensive utilitarian people computer byte 1987 described cat spiritual heir macintosh features text user interface making use mouse icons graphics data seen long stream text broken several pages instead using traditional command line interface menu system cat makes use special keyboard commands activated holding use front key pressing another key cat also uses special leap keys held allows user incrementally search strings characters machine hardware consists 9-inch 229 mm black-and-white monitor single 3½-inch 256 kb floppy disk drive ibm selectric–compatible keyboard uses motorola 68000 cpu like macintosh lisa atari st amiga running 5 mhz 256 kb ram internal 300/1200 bit/s modem setup user preference data stored 8 kb non-volatile battery backed-up ram cat array i/o interfaces encompasses one centronics parallel port one rs-232c serial port db-25 two rj11 telephone jacks modem loop total weight system 17 pounds 7.7 kg extensive range application software built 256 kb rom standard office suite programs communications 90,000 word spelling dictionary user programming toolchains forth assembly language text-only machine cat includes graphics routines rom well connectors mouse pointing device never used defunct software project called archy initiated raskin develop similar yet even capable system current computing systems project designed eventually replace current software user interfaces
Computer architecture
powerpc applications microprocessors belonging powerpc architecture family used numerous applications apple computer dominant player market personal computers based powerpc processors 2006 switched intel-based processors apple used powerpc processors power mac imac emac powerbook ibook mac mini xserve classic macintosh accelerator boards using powerpcs made daystar digital newer technology sonnet technologies totalimpact several attempts create powerpc reference platforms computers ibm others ibm prep powerpc reference platform system standard intended ensure compatibility among powerpc-based systems built different companies ibm pop powerpc open platform open free standard design powerpc motherboards pegasos open desktop workstation odw open free standard design powerpc motherboards based marvell discovery ii mv64361 chipset prep standard specifies pci bus also support isa microchannel pcmcia prep-compliant systems able run os/2 aix solaris taligent windows nt chrp common hardware reference platform open platform agreed apple ibm motorola chrp systems able run mac os os/2-ppc windows nt aix solaris novell netware chrp superset prep powermac platforms power.org defined power architecture platform reference papr provides foundation development computers based linux operating system list computers based powerpc ibm apple cray sony ibm released personal digital assistant pda reference platform arctic based powerpc 405lp low power project discontinued ibm sold powerpc 4xx design amcc three major seventh-generation game consoles contain powerpc-based processors sony playstation 3 console released november 2006 contains cell processor including 3.2 ghz powerpc control processor eight closely threaded dsp-like accelerator processors seven active one spare microsoft xbox 360 console released 2005 includes 3.2 ghz custom ibm powerpc chip three symmetrical cores core smp-capable two threads nintendo wii console also released november 2006 contains extension powerpc architecture found previous system gamecube ibm sony zarlink semiconductor released several set top box stb reference platforms based ibm powerpc 405 cores ibm set top box stb system-on-chip soc
Computer architecture
hitachi hitachi listed tokyo stock exchange constituent nikkei 225 topix indices ranked 38th 2012 fortune global 500 129th 2012 forbes global 2000 hitachi founded 1910 electrical engineer namihei odaira ibaraki prefecture company first product japan first induction motor initially developed use copper mining company began in-house venture fusanosuke kuhara mining company hitachi ibaraki odaira moved headquarters tokyo 1918 odaira coined company toponymic name superimposing two kanji characters hi meaning “ sun ” tachi meaning “ rise. ” world war ii significant impact company many factories destroyed allied bombing raids discord war founder odaira removed company hitachi reconstruction efforts war hindered labor strike 1950 company saw increase business korean war due defense contracts offered american military meanwhile hitachi went public 1949 hitachi america ltd. established 1959 hitachi europe ltd. established 1982 march 2011 hitachi agreed sell hard disk drive subsidiary hgst western digital wd combination cash shares worth us 4.3 billion due concerns duopoly wd seagate technology eu commission federal trade commission hitachi 3.5 hdd division sold toshiba transaction completed march 2012 january 2012 hitachi announced would stop producing televisions japan september 2012 hitachi announced invented long-term data solution quartz glass capable preserving information millions years october 2012 hitachi agreed acquire united kingdom-based nuclear energy company horizon nuclear power plans construct six nuclear power plants uk e.on rwe £700 million november 2012 hitachi mitsubishi heavy industries agreed merge thermal power generation businesses joint venture owned 65 mitsubishi heavy industries 35 hitachi joint venture began operations february 2014 october 2015 hitachi completed deal johnson controls form joint-venture would takeover hitachi hvac business hitachi maintained 40 stake resulting company johnson controls-hitachi air conditioning may 2016 hitachi announced investing 2.8 billion iot interests february 2017 hitachi honda announced partnership develop produce sell motors electric vehicles march 14 2018 zoomdata announced partnership hitachi ins software help develop big data analytics market japan december 2018 hitachi ltd. announced would take abb ltd. power grid division 6.4 billion note new product hitachi called memory glass introduced 2015 high density information storage medium utilizing laser etched/readable fused quartz following fukushima daiichi nuclear disaster 2011 extended temporary closure japanese nuclear plants hitachi nuclear business became unprofitable 2016 hitachi ceo toshiaki higashihara argued japan consider merger various competing nuclear businesses hitachi taking 2016 estimated ¥65 billion write-off value silex technology laser uranium enrichment joint venture general electric 2019 hitachi suspended abwr development british subsidiary horizon nuclear power provide adequate economic rationality private enterprise proceed hitachi communication technologies america provides communications products services telecommunications cable tv utility enterprise industrial markets hitachi consulting international management technology consulting firm headquarters dallas texas founded 2000 currently employs approximately 6,500 people across united states japan united kingdom netherlands india spain portugal germany china brazil vietnam hitachi vantara wholly owned subsidiary hitachi provides hardware software services help companies manage digital data flagship products virtual storage platform enterprise storage hitachi unified storage vm large sized companies hitachi unified storage small mid-sized companies hitachi content platform archiving cloud architecture hitachi command suite storage management hitachi truecopy hitachi universal replicator remote replication hitachi nas platform since september 19 2017 hitachi data systems hds become part hitachi vantara new company unifies operations pentaho hitachi data systems hitachi insight group company name hitachi data systems hds logo longer used market hitachi manufactures many types electronic products including tvs camcorders projectors recording media brand name hitachi provides various defense related/derived products services among things hitachi metals supplies materials aircraft engines fuselage components e.g landing gear along finished components aerospace applications also provides materials components tools automotive electronics industries hitachi koki manufactures many types tools including chainsaws drills woodworking power tools branded koki tanaka march 1 2016 hitachi koki acquired german power tools manufacturer metabo chequers capital hitachi plant technologies ltd. along subsidiaries engages design development manufacture sale servicing execution social industrial infrastructure machinery mechatronics air-conditioning systems industrial plants energy plant equipment asia internationally hitachi rail rolling stock manufacturing division hitachi mitsubishi heavy industries agreed cooperate field international intra-city railway systems 2010 hitachi markets general-purpose train known a-train uses double-skin friction-stir-welded aluminium body construction a-train concept customised form different types trains ranging high-capacity commuter metro trains automated 3000 series train nanakuma line fukuoka city subway limited express e257 series jointly produced tokyu corporation high-speed trains class 395 trains southeastern uk made trains domestic international operators alike among significant orders winning tender uk department transport intercity express programme june 2008 hitachi many products include designing manufacturing many shinkansen models including n700 series shinkansen exported thsr 700t taiwan high speed rail company also markets driverless metro system developed hitachi rail italy pioneered copenhagen metro straddle beam monorail technology known hitachi monorail form basis trains operating world longest monorail system currently part chongqing rail transit network february 24 2015 hitachi agreed purchase italian rolling stock manufacturer ansaldobreda acquire finmeccanica stake ansaldo sts railway signaling division finmeccanica purchase completed later year point company renamed hitachi rail italy since hitachi obtained majority stake ansaldo sts hitachi solutions america consulting firm systems integrator focusing primarily microsoft dynamics firm utilizes ax crm dynamics family provide customers broad base solutions company international subsidiaries residing united kingdom canada philippines thailand japan india hitachi solutions america acquired ignify – another leading microsoft dynamics solution providers december 2015 hitachi solutions 2000 microsoft dynamics consultants worldwide acquisition ignify hitachi works oldest member hitachi group consists three factories kaigan works yamate works rinkai works yamate works oldest three factories founded 1910 namihei odaira electrical equipment repair manufacturing facility facility named hitachi hitachi mine near hitachi ibaraki regarded ancestral home hitachi ltd many management trainees intern hitachi works permanently assigned hitachi divisions senior management personnel often participants rotations hitachi works years career develops towards eventual head office stature result many senior managers hitachi ltd passed hitachi works spin-off entities hitachi works include hitachi cable 1956 hitachi canadian industries 1988 hitachi global storage technologies hitachi gst manufactures computer hard drives 3 main ranges hitachi travelstar hitachi deskstar hitachi ultrastar march 7 2011 hitachi global storage technologies purchased western digital corporation 3.5 billion cash 750 million western digital common stock hitachi printing systems established 1980 acquired ricoh 2004 becoming ricoh printing systems ltd. hitachi joint venture kerala public sector company telk 1963 1989 production electrical equipment collaboration hitachi telk first company manufacture 400kv transformers india telk transformers well known quality great demand indian power system august 2011 announced hitachi would donate electron microscope five universities indonesia university north sumatra medan indonesian christian university jakarta padjadjaran university bandung general soedirman university purwokerto muhammadiyah university malang hitachi group
Computer security
mosix mosix proprietary distributed operating system although early versions based older unix systems since 1999 focuses linux clusters grids mosix cluster/grid need modify link applications library copy files login remote nodes even assign processes different nodes – done automatically like smp mosix researched developed since 1977 hebrew university jerusalem research team prof. amnon barak far ten major versions developed first version called mos multicomputer os 1981–83 based bell lab seventh edition unix ran cluster pdp-11 computers later versions based unix system v release 2 1987–89 ran cluster vax ns32332-based computers followed bsd/os-derived version 1991–93 cluster 486/pentium computers since 1999 mosix tuned linux x86 platforms second version mosix called mosix2 compatible linux-2.6 3.0 kernels mosix2 implemented os virtualization layer provides users applications single system image linux run-time environment allows applications run remote nodes run locally users run regular sequential parallel applications mosix transparently automatically seek resources migrate processes among nodes improve overall performance mosix2 manage cluster multicluster grid well workstations shared resources flexible management grid allows owners clusters share computational resources still preserving autonomy clusters ability disconnect nodes grid time without disrupting already running programs mosix grid extend indefinitely long trust cluster owners must include guarantees guest applications modified running remote clusters hostile computers connected local network nowadays requirements standard within clusters organizational grids mosix2 run native mode virtual machine vm native mode performance better requires modifications base linux kernel whereas vm run top unmodified operating system supports virtualization including microsoft windows linux mac os x. mosix2 suitable running compute intensive applications low moderate amount input/output i/o tests mosix2 show performance several applications 1 gbit/s campus grid nearly identical single cluster mosix suitable running hpc applications low moderate amount i/o tests mosix show performance several applications 1 gbit/s campus grid nearly identical single cluster particularly suitable examples mosix4 released july 2014 version 4 mosix n't require kernel patching mosix became proprietary software late 2001 moshe bar forked last free version started openmosix project february 10 2002 july 15 2007 bar decided end openmosix project effective march 1 2008 claiming increasing power availability low cost multi-core processors rapidly making single-system image ssi clustering less factor computing plans reconfirmed march 2008 linuxpmi project continuing development former openmosix code
Distributed computing architecture
data general rdos data general rdos real-time disk operating system real-time operating system released 1970 software sold bundled company popular nova eclipse minicomputers rdos capable multitasking ability run 32 called tasks similar current term threads simultaneously two grounds foreground background within 64 kb memory space later versions rdos compatible data general 16-bit eclipse minicomputer line cut-down version rdos without real-time background foreground capability still capable running multiple threads multi-user data general business basic called data general diskette operating system dg-dos somewhat confusingly simply dos another related operating system rtos real-time operating system diskless environments rdos micronova-based micro products micro-minicomputers sometimes called dg/rdos rdos superseded early 1980s data general aos family operating systems including aos/vs mp/aos mp/os smaller systems following list commands supported rdos/dos cli late 1970s data general sued sherman clayton antitrust acts competitors practice bundling rdos data general nova eclipse minicomputer data general introduced data general nova company called digidyne wanted use rdos operating system hardware clone data general refused license software claimed bundling rights 1985 courts including united states court appeals ninth circuit ruled data general case called digidyne v. data general supreme court united states declined hear data general appeal although justices white blackmun would heard precedent set lower courts eventually forced data general license operating system restricting software data general hardware illegal tying arrangement 1999 data general taken emc corporation
Operating systems
keyword tool software keyword tool free saas product uses google autocomplete search engines generate relevant long-tail keywords related keywords topic keyword tool launched middle 2014. created artem galimov leow kah thong started providing keywords 83 languages autocomplete 194 google domains 2015 keyword tool participated startup chile 13th generation program keywordtool helps user locate long-tail related keywords relies google autocomplete feature giving quick access popular search terms scrapes keyword suggest ideas google youtube bing amazon ebay app store
Web technology
common criteria common criteria information technology security evaluation referred common criteria cc international standard iso/iec 15408 computer security certification currently version 3.1 revision 5 common criteria framework computer system users specify security functional assurance requirements sfrs sars respectively security target st may taken protection profiles pps vendors implement make claims security attributes products testing laboratories evaluate products determine actually meet claims words common criteria provides assurance process specification implementation evaluation computer security product conducted rigorous standard repeatable manner level commensurate target environment use common criteria evaluations performed computer security products systems evaluation process also tries establish level confidence may placed product security features quality assurance processes far pps evaluated sts/certified products components e.g. firewalls operating systems smart cards common criteria certification sometimes specified procurement standards containing e.g. interoperation system management user training supplement cc product standards examples include iso/iec 17799 properly bs 7799-1 iso/iec 27002 german details cryptographic implementation within toe outside scope cc instead national standards like fips 140-2 give specifications cryptographic modules various standards specify cryptographic algorithms use recently pp authors including cryptographic requirements cc evaluations would typically covered fips 140-2 evaluations broadening bounds cc scheme-specific interpretations national evaluation schemes phasing eal-based evaluations accept products evaluation claim strict conformance approved pp united states currently allows pp-based evaluations canada process phasing eal-based evaluations cc originated three standards cc produced unifying pre-existing standards predominantly companies selling computer products government market mainly defence intelligence use would need evaluated one set standards cc developed governments canada france germany netherlands uk u.s. testing laboratories must comply iso/iec 17025 certification bodies normally approved iso/iec 17065 compliance iso/iec 17025 typically demonstrated national approval authority characteristics organizations examined presented iccc 10 well common criteria standard also sub-treaty level common criteria mra mutual recognition arrangement whereby party thereto recognizes evaluations common criteria standard done parties originally signed 1998 canada france germany united kingdom united states australia new zealand joined 1999 followed finland greece israel italy netherlands norway spain 2000 arrangement since renamed common criteria recognition arrangement ccra membership continues expand within ccra evaluations eal 2 mutually recognized including augmentation flaw remediation european countries within former itsec agreement typically recognize higher eals well evaluations eal5 tend involve security requirements host nation government september 2012 majority members ccra produced vision statement whereby mutual recognition cc evaluated products lowered eal 2 including augmentation flaw remediation vision indicates move away assurance levels altogether evaluations confined conformance protection profiles stated assurance level achieved technical working groups developing worldwide pps yet transition period fully determined july 2 2014 new ccra ratified per goals outlined within 2012 vision statement major changes arrangement include common criteria generic directly provide list product security requirements features specific classes products follows approach taken itsec source debate used prescriptive approach earlier standards tcsec fips 140-2 common criteria certification guarantee security ensure claims security attributes evaluated product independently verified words products evaluated common criteria standard exhibit clear chain evidence process specification implementation evaluation conducted rigorous standard manner various microsoft windows versions including windows server 2003 windows xp certified security patches address security vulnerabilities still getting published microsoft windows systems possible process obtaining common criteria certification allows vendor restrict analysis certain security features make certain assumptions operating environment strength threats faced product environment additionally cc recognizes need limit scope evaluation order provide cost-effective useful security certifications evaluated products examined level detail specified assurance level pp evaluations activities therefore performed certain depth use time resources offer reasonable assurance intended environment microsoft case assumptions include a.peer systems toe communicates assumed management control operate security policy constraints toe applicable networked distributed environments entire network operates constraints resides within single management domain security requirements address need trust external systems communications links systems assumption contained controlled access protection profile capp products adhere based assumptions may realistic common use general-purpose operating systems claimed security functions windows products evaluated thus considered secure assumed specified circumstances also known evaluated configuration whether run microsoft windows precise evaluated configuration apply microsoft security patches vulnerabilities windows continue appear security vulnerabilities exploitable product evaluated configuration product common criteria certification voluntarily withdrawn vendor alternatively vendor re-evaluate product include application patches fix security vulnerabilities within evaluated configuration failure vendor take either steps would result involuntary withdrawal product certification certification body country product evaluated certified microsoft windows versions remain eal4+ without including application microsoft security vulnerability patches evaluated configuration shows limitation strength evaluated configuration august 2007 government computing news gcn columnist william jackson critically examined common criteria methodology us implementation common criteria evaluation validation scheme ccevs column executives security industry researchers representatives national information assurance partnership niap interviewed objections outlined article include 2006 research paper computer specialist david a. wheeler suggested common criteria process discriminates free open-source software foss -centric organizations development models common criteria assurance requirements tend inspired traditional waterfall software development methodology contrast much foss software produced using modern agile paradigms although argued paradigms align well others attempted reconcile paradigms political scientist jan kallberg raised concerns lack control actual production products certified absence permanently staffed organizational body monitors compliance idea trust common criteria it-security certifications maintained across geopolitical boundaries throughout lifetime cc universally adopted even creator nations particular cryptographic approvals handled separately canadian us implementation fips-140 cesg assisted products scheme caps uk uk also produced number alternative schemes timescales costs overheads mutual recognition found impeding operation market early 2011 nsa/css published paper chris salter proposed protection profile oriented approach towards evaluation approach communities interest form around technology types turn develop protection profiles define evaluation methodology technology type objective robust evaluation concern may negative impact mutual recognition sept 2012 common criteria published vision statement implementing large extent chris salter thoughts previous year key elements vision included
Computer security
fast secure protocol fast secure protocol fasp proprietary data transfer protocol fasp network-optimized network protocol developed aspera owned ibm associated client/server software packages also commonly called aspera technology patented us patent 20090063698 method system aggregate bandwidth control similar connectionless udp protocol fasp expect feedback every packet sent packets marked really lost must requested recipient result suffer much loss throughput tcp networks high latency high packet loss large organizations like ibm european nucleotide archive us national institutes health national center biotechnology information others use protocol different areas amazon also wants use protocol uploading data centers fasp built-in security mechanisms affect transmission speed encryption algorithms used based exclusively open standards transfer ssh used key exchange authentication randomly generated one-way keys discarded end transmission data encrypted decrypted immediately sending receiving aes-128 counteract attacks monitoring encrypted information long transfers aes operated cipher feedback mode secret initialization vector block addition integrity check data block takes place case example man-in-the-middle attack would noticed fasp control port tcp port 33001 port ssh uses data transfer begins udp port 33001 increments additional connection thread
Internet protocols
linuxpae64 linuxpae64 port linux kernel running compatibility mode x86-64 processor kernel capable loading i386 modules device drivers supports 64-bit linux applications user mode
Operating systems
remix os remix os now-discontinued computer operating system personal computers x86 arm architectures prior discontinuation development shipped number 1st- 3rd-party devices remix os allowed pc users run android mobile apps compatible intel-based pc january 2016 jide announced beta version operating system called remix os pc based android-x86 — x86-port android operating system — available download free website beta version remix os pc brings hard drive installation 32-bit support uefi support ota updates except free software licensed parts available github unlike android-x86 source code remix os available public google mobile services gms removed remix mini remix os update 3.0.207 jide claimed ensure consistent experience across android devices later comments suggest compatibility issue apps resulted google requesting gms pre-loaded july 17 2017 jide announced development remix os pc well related consumer products development discontinued stating company would restructuring approach remix os transitioning away consumer space april 2019 os succeeded continued numerous forks intending continue improve project prominently phoenixos primeos three versions remix os remix os pc remix os remix ultratablet remix os remix mini remix os pc remix ultratablet remix mini remix os 3.0 device remix pro 2-in-1 tablet announced 2016 however longer made due popularity affordability os asia numerous forks/clones project made various firms notably phoenixos chinese-based chaozhuo technology primeos indian-based floydwiz technologies private limited like remixos pre-dominantly closed source lot improved features intended improve optimise os newer applications pc projects like openthos blissos intend release project open source mind openthos restricted chinese markets moment blissos based slightly modified version android
Operating systems
mocl mocl programming language dialect implementation language lisp named common lisp focused mobile device platforms includes compiler runtime system currently runs ios android macos mocl first announced november 14 2012 first release timed occur lisp universal time 3581000000 june 23 2013 recent release mocl named paren mage released may 6 2014 adding support macos application creation remote read–eval–print loop repl runs mobile device
Programming language topics
comparison open-source wireless drivers wireless network cards computers require control software make function firmware device drivers list status open-source drivers 802.11 wireless network cards following incomplete list supported wireless devices
Operating systems
focal-69 focal-69 landmark version focal programming language widely publicized original version language created 1968 focal-69 created richard merrill important variable names may start letter except f f reserved functions may contain sequence letters numbers however first two characters significant instance following code sample focal new conversational language refers variable destination des variable may treated array taking subscripts -2048 2047 focal-69 contained five mathematical operators focal-69 unusual mathematical expressions could use interchangeably matched pairs establish precedence language support relative operators e.g. greater .gt. etc. language contained following built-in functions every line focal-69 program must start line number joss unlike basic line numbers real numbers focal-69 integers allowed line numbers may range 1.01 31.99 whole number referred group number group number 1 31 used command editor also allows programmer print statements group e.g. write 2 delete group e.g. erase 2 multiple statements placed single line usually behavior different statements separate lines except case loops ask command abbreviation take list strings variables echo strings store user input variables user n't enter number enters text system convert initial character unique number comment command abbreviation c creates remark command abbreviation branches execution subroutine subroutine referenced either group number line number execution resumed next statement return encountered command abbreviation f provides loop three arguments specified first initial value loop variable second increment assumed 1 omitted third value terminating value loop sample loop go command abbreviation g jumps program execution specified line number editor go command also used start program beginning specified line number command abbreviation provides conditional branch based sign expression numeric expression command take one three line numbers expression less zero execution branches first line number equal zero second line number greater zero third line number language lacked relative operators greater equal less branch x 5 one must compare x 5 quit command abbreviation q terminates execution program returns control editing environment return command abbreviation r branches execution subroutine back calling location following sample subroutine converting yes/no prompt value set command abbreviation assigns results expression specified variable type command abbreviation provides output displaying item series item consists exclamation mark group exclamation marks output carriage return line feed item consists hash mark output carriage return without line feed new lines entered program simply beginning command line number editing commands erase abbreviation e modify abbreviation write abbreviation w file command open abbreviation unusual interactive system size focal-69 supported ability chain programs use library commands program names could six characters long library command abbreviation l focal-71 added since interpreter lacked sufficient memory space store error messages richard merrill used work-around focal reported address error-detecting code pseudo floating-point number example division zero error detected code address 4333 error message 28.73 01.10 01.10 referred line number merrill clearly derived focal-69 joss focal-69 concise simplification joss simplicity required pdp-8 minicomputer opposed mainframe joss developed
Programming language topics
basic direct access method basic direct access method bdam access method ibm os/360 successors computer operating systems system/360 later mainframes bdam consists routines used retrieving data storing data onto direct access devices bdam available os/360 os/vs2 mvs z/os related high-end operating systems basic ibm terminology indicates lower-level access method deals data sets terms physical blocks provide either read-ahead called anticipatory buffering synchronization — user program explicitly wait completion input/output event bdam programmer directly store retrieve block specifying either actual device address relative position within data set relative block number relative track within data set system begin search bdam provides index structure file except programmed application many applications hashing randomizing function may used assign block address based key data physical keys used key last record within block must written key block bdam application program interface compared interface offered open read write close calls using file handles operating systems unix windows bdam still supported ibm 2012 dependence physical device geometry new ibm direct-access devices used z/os emulate ibm 3390 devices regardless real physical characteristics programmer specifies codice_1 data control block dcb indicate use bdam space 16 extents volume data set equivalent file reside 255 extents across multiple volumes application dependency space contiguous tracks allocate space direct data set contiguous tracks coding codice_2 dd statement direct data sets must preformatted use opening output writing blocks sequentially load dummy records load initial data basic access method bdam reads writes member data blocks i/o operation proceeds asynchronously must tested completion using codice_3 macro bdam uses standard system macros codice_4 codice_5 codice_6 codice_7 codice_3 codice_6 codice_7 macro instructions must provide block address key desired record codice_3 macro used wait completion specific operation data accessed data buffer reused possible start multiple input/output operations run concurrently records direct data set contain user-specified recorded keys 255 bytes—all keys file must length reads writes specify key addition disk address bdam search starting requested block entire area file record matching key allows multiple keys hashing track handled automatically i/o subsystem bdam accepts disk addresses either actual device addresses relative track addresses relative block numbers device addresses eight byte fields form mbbcchhr subfields binary numbers specifying device addresses makes dataset unmovable relative track addresses three byte fields form ttr subfields binary numbers relative block numbers four byte fullword binary numbers indicating block number file first block block 0 form addressing used fixed length blocks codice_12
Operating systems
shiwa project shiwa sharing interoperable workflows large-scale scientific simulations available dcis project led lpds laboratory parallel distributed systems mta computer automation research institute project coordinator prof. dr. peter kacsuk started 1 july 2010 lasted two years shiwa project number 261585 supported grant european commission fp7 infrastructures-2010-2 call grant agreement n°261585 shiwa project developed deployed shiwa simulation platform ssp enable infrastructure workflow interoperability two levels project ended shiwa technology overtaken er-flow support action project provide sustainability extend user community base scientists disciplines invested tremendous effort exploitation distributed computing infrastructures dcis ability support compute-intensive in-silico experiments virtual organizations many dcis large user communities emerged last decade distributed european infrastructure supercomputing applications deisa niederberger mextorf 2005 egee grid enabling grids e-science egee n.d. german d-grid initiative d-grid gentzsch 2006 uk national grid service ngs ngs n.d. north american teragrid tg teragrid n.d. based different middleware stacks provide abstraction layer computer resources applications example ngs teragrid built globus toolkit foster 2006 egee glite glite n.d. deisa relies globus toolkit unicore erwin snelling 2002 d-grid executed glite globus toolkit unicore europe momentum climaxing 2010 emergence european grid initiative egi federate major european organizations related distributed-computing national grid initiatives ngis effort create next generation pan-europe dci egi face unprecedented challenges related heterogeneity national grid infrastructures resources operating middleware production dcis commonly built large number components data resources metadata catalogues authentication authorisation methods software repositories managing execution applications dcis consequently complex task moreover solutions developed one particular grid difficult port infrastructures order shield complexity researchers facilitate design in-silico experiments workflow systems widely used virtualization layer top underlying infrastructures become essential integrate expertise application user domain dci infrastructure domain order optimize support research scientific computing community current multi-dci panorama users need access different infrastructures order enlarge widen variety resources usable well share reuse domain specific resources interoperability among dcis hardly achieved middleware level though shiwa considers egi production infrastructure major dci great interest european scientists design simulate experiments in-silico directly addresses challenges related scientific experiments design simulation workflows description ii middleware heterogeneities encountered among many existing dcis workflow interoperability techniques shiwa aimed improving experience virtual research communities heavily using dcis scientific experimentation recent multiplication efforts dedicated e-infrastructures scientific simulation benefit availability massive computing data storage facilities sustain multi-disciplinary scientific challenges side effect variety non-interoperable technologies coexist enable exploitation computing infrastructures in-silico experiments europe momentum climaxing emergence egi federate major european organizations related distributed computing ngis consequently european research simulation currently hampered several interoperability issues reduce efficiency limiting knowledge expertise sharing among scientific communities shiwa designed user-centred project aiming lowering barriers among scientific communities providing services tackling interoperability issues particular shiwa work program focuses improving efficiency workflow-based in-silico experiments targeting following three objectives workflow interoperability enables execution workflows different workflow systems may span multiple heterogeneous infrastructures dcis facilitate application migration due infrastructure services workflow system evolution workflow interoperability allows workflow sharing support foster adoption common research methodologies improve efficiency reliability research reusing common methodologies increase lifetime workflows reduction development time new workflows interoperability among workflow systems permit development enactment large-scale comprehensive workflows also reduces existing gap different dcis consequently promotes cooperation among research communities exploiting dcis workflow systems enable researchers build comprehensive workflow applications dcis project consortium identified workflow interoperability promising approach bridge existing gaps among dcis workflow dci interoperability paramount importance advance quality impact scientific applications target dcis enables advanced features previously available shiwa developed workflow interoperability solutions several workflow systems namely askalon fahringer et al 2005 moteur glatard et al 2008 pegasus deelman 2005 pgrade kacsuk et al 2003 galaxy gwes kepler loni pipeline taverna proactive triana majithia et al 2004 provide access grids built glite globus middleware create production-level services run workflow-based large-scale simulations targeted middleware workflow systems depicted components bold borders figure 1.1.1 project use existing grid middleware interoperability solutions enabling access glite globus based grids austrian grid d-grid egee ngs project consortium also consider support emi-supported nordugrid advanced resource connector arc m.ellert 2007 unicore
Distributed computing architecture
mainsoft mainsoft software company founded 1993 develops interoperability software products microsoft windows linux/unix platforms mainsoft founded 1993 mainly propose integration products windows systems mainsoft one main providers microsoft windows interface source environment wise program licensing program microsoft allowed developers recompile run windows-based applications unix macintosh platforms wise software development kits sdks directly provided microsoft instead microsoft established partnerships several software providers turn sold wise sdks end-users wise program microsoft extended agreements mainsoft port windows media player 6.3 internet explorer unix since mainsoft activity shifted integration microsoft sharepoint ibm products ibm lotus notes ibm websphere rational jazz products focusing .net framework javaee according linkedin profile mainsoft corporation changed name harmon.ie www.harmon.ie 2010 able develop wise sdks software providers needed access windows internals source code 2004 30000 source files windows 2000 windows nt 4.0 leaked internet later discovered source leak originated mainsoft
Distributed computing architecture
pageview pageview page view abbreviated business pv occasionally called page impression request load single html file web page internet site world wide web page request would result web surfer clicking link another page pointing page question contrast hit refers request file web server therefore may many hits per page view since html page contain multiple files—images css etc balance page views refer number pages viewed clicked site given time page views may counted part web analytics owner site information useful see change page information way presented results visits advertisements page publishers would also interested number page views determine expected revenue ads reason term used widely internet marketing advertising page impression long measure user activity website however activity necessarily associated loading complete html page modern programming techniques serve pages means n't show http requests since page views help estimate popularity sites helps determine value advertising revenue common metric cpm stands 'cost per thousand roman numeral 1,000 commonly used metrics measure page views divided thousands cost per 1000 views used ad rates thus less cpm better deal offers advertisers however growing concern cpm trustworthy looks advertising market although cpm arrangement everyone visits site makes publishers ’ money advertiser ’ view cpm challenged comparison cpc cpa terms adverts ’ efficiency visiting mean clicking ads preferred way count page views using web analytics software measure number pages site therefore helps people receive rough estimate page views web sites also many page view measurement tools available including open source ones well licensed products despite wide range use page view come criticisms page view manipulated boosted specific purposes example recent incident called 'page view fraud compromised accuracy measurement page view boosting page view perpetrators used tool called bot buy fake page-views attention recognition feedback increasing site value result people already started building alternatives measure audiences ophan saying page view becoming passe fake page views reflect bots instead humans wikipedia provides tools allow one see many people visited wikipedia article given time period used tools instance display popular articles day wikipedia pageviews certain types articles correlate changes stock market prices box office success movies spread disease among applications datamining since search engines directly influence popular wikipedia statistics may provide unfiltered real-time view people searching web societal interests instance used gain insights public anxiety information seeking events identification concepts significant increase interest public 2015 study examines influence reddit posts wikipedia pageviews
Web technology
linotte linotte interpreted 4th generation programming language linotte syntax french language goal allow french-speaking children francophones little computer science experience easily learn programming slogan french know read book write computer program linotte uses non-technical vocabulary entirely french terms closer used film literature program book variable actor screen cloth instead executing book read function body starts début french start keywords languages might named things print log linotte named things like affiche french display similarly program demande ask prompt user enter value linotte also supports things like networking graphics even contains web templating engine allows mixing html linotte file much like php jsp
Programming language topics
stellar payment network stellar open source decentralized protocol digital currency fiat money transfers allows cross-border transactions pair currencies stellar protocol supported 501 c 3 nonprofit stellar development foundation 2014 jed mccaleb founder mt gox co-founder ripple launched network system stellar former lawyer joyce kim official launch mccaleb formed website called secret bitcoin project seeking alpha testers nonprofit stellar development foundation created collaboration stripe ceo patrick collison project officially launched july stellar received 3 million seed funding stripe stellar released decentralized payment network protocol native currency stellar launch network 100 billion stellars 25 percent would given non-profits working toward financial inclusion stripe received 2 percent 2 billion initial stellars return seed investment cryptocurrency originally known stellar later called lumens xlm august 2014 mercado bitcoin first brazilian bitcoin exchange announced would using stellar network january 2015 stellar approximately 3 million registered user accounts platform market cap almost 15 million stellar development foundation released upgraded protocol new consensus algorithm april 2015 went live november 2015 new algorithm used scp cryptocurrency protocol created stanford professor david mazières lightyear.io for-profit entity stellar launched may 2017 commercial arm company september 2017 stellar announced benefits program part stellar partnership grant program would award partners 2 million worth lumens project development september 2018 lightyear corporation acquired chain inc combined company named interstellar 2015 announced stellar releasing integration vumi open-sourced messaging platform praekelt foundation vumi uses cellphone talk time currency using stellar protocol stellar partnered cloud-based banking software company oradian april 2015 integrate stellar oradian banking platform add microfinance institutions mfis nigeria deloitte announced integration stellar 2016 build cross-border payments application deloitte digital bank december 2016 announced stellar payment network expanded include coins.ph mobile payments startup philippines icici bank india african mobile payments firm flutterwave french remittances company tempo money transfer october 2017 stellar partnered ibm klickex facilitate cross-border transactions south pacific region cross-border payment system developed ibm includes partnerships banks area december 2017 techcrunch announced stellar partnership sureremit nigerian based non-cash remittances platform stellar open-source protocol exchanging money tokens using stellar consensus protocol platform source code hosted github servers run software implementation protocol use internet connect communicate stellar servers server stores ledger accounts network transactions among accounts occur mining rather consensus process among accounts quorum slice
Internet protocols
philips cd-i philips cd-i abbreviation compact disc interactive interactive multimedia cd player developed marketed dutch company philips supported december 1991 late 1998 created provide functionality audio cd player game console lower price personal computer cd-rom drive cost savings due lack floppy drive keyboard mouse monitor standard television used less operating system software cd-i also refers multimedia compact disc standard used cd-i console also known green book co-developed philips sony addition games educational multimedia reference titles produced interactive encyclopedias museum tours popular public internet access widespread cd-i also one earliest game systems implement internet features including subscriptions web browsing downloading e-mail online play facilitated use additional hardware modem cd-online disc renamed web-i us philips initially released britain 1995 150 us development cd-i format began 1984 first publicly announced 1986 first philips cd-i player released 1991 initially priced around us 1,000 capable playing interactive cd-i discs audio cds cd+g cd+graphics karaoke cds photo cds video cds vcds though latter required optional digital video card provide mpeg-1 decoding philips also licensed cd-i format manufacturers use also cd-i players sony intelligent discman brand philips marketed cd-i home entertainment system europe games educational machine u.s cd-i abandoned 1996 commercial failure estimated lost philips much one billion u.s. dollars american market philips first marketed cd-i family entertainment product avoided mentioning video games compete game consoles early software releases focused heavily educational music self-improvement titles games many adaptations board games connect four however system handily beaten market multimedia devices cheap low-end pcs games best-selling software 1993 philips encouraged ms-dos console developers create games introduced 250 peripheral memory support full-motion video added new consoles second controller port multiplayer games attempts develop foothold games market unsuccessful system designed strictly multimedia player thus under-powered compared gaming platforms market respects earlier cd-i games included entries popular nintendo franchises although games developed nintendo specifically mario game titled hotel mario three legend zelda games released zelda adventure nintendo philips established agreement co-develop cd-rom enhancement super nintendo entertainment system due licensing disagreements nintendo previous partner sony agreement produced prototype console called snes-cd philips nintendo never released cd-rom add-on philips still contractually allowed continue using nintendo characters applications developed using authoring software produced optimage included optimage balboa runtime libraries mediamogul second company produced authoring software script systems produced abcd-i philips also released several versions popular tv game shows cd-i including versions jeopardy hosted alex trebek name tune hosted bob goen two versions joker wild one adults hosted wink martindale one kids hosted marc summers cd-i games north america exception name tune charlie o'donnell announcer netherlands also released version lingo cd-i 1994 1993 american musician todd rundgren created first music-only fully interactive cd world order cd-i application allows user completely arrange whole album personal way 15,000 points customization cd-i series learning games edutainment targeted children infancy adolescence intended younger audience included busytown berenstain bears various others usually vivid cartoon-like settings accompanied music logic puzzles although extensively marketed philips notably via infomercial consumer interest cd-i titles remained low 1994 sales cd-i systems begun slow 1998 product line dropped plans cd-i 2 certainly present argonaut software even designated design chip sets successor cd-i however president con boonstra saw interest media area philips philips sold everything including media subsidiary polygram dutch half philips media sold softmachine released lost ride cd-i last product philips also sold french half gaming subsidiary philips media bv french publisher infogrames 1997 dutch eurodance duo 2 unlimited released cd-i compilation album 1994 called beyond limits contains standard cd tracks well cd-i-exclusive media disc large number full motion video titles dragon lair mad dog mccree appeared system one considered one stronger cd-i titles later ported pc february 1994 issue electronic gaming monthly remarked cd-i full motion video capabilities strongest point nearly best software required mpeg upgrade card mid-1996 u.s. market cd-i software dried philips given releasing titles continued publish cd-i games europe console still held popularity home market exhausted philips tried success position technology solution kiosk applications industrial multimedia addition consumer models professional development players sold philips interactive media systems vars philips marketed several cd-i player models also exist number hard-to-categorize models fw380i integrated mini-stereo cd-i player 21tcdi30 television built-in cd-i device cd-i 180/181/182 modular system first cd-i system produced collaboration kyocera 1988 actual debut cd-i addition philips several manufacturers produced cd-i players including philips subsidiary magnavox goldstar lg electronics digital video systems memorex grundig saab electric sony intelligent discman hybrid home/portable cd-i player kyocera nbs highscreen bang olufsen produced television built-in cd-i device beocenter av5 recognizing growing need among marketers networked multimedia philips partnered 1992 amsterdam-based cdmatics develop telecd-i also telecd concept cd-i player connected network pstn internet enabling data-communication rich media presentation dutch grocery chain albert heijn mail-order company early adopters introduced award-winning telecd-i applications home-shopping home-delivery services cdmatics also developed special philips telecd-i assistant set software tools help worldwide multimedia industry develop implement telecd-i telecd-i world first networked multimedia application time introduction 1996 philips acquired source code rights cdmatics 1995 philips introduced cd-online service provided cd-i full internet access 14.4k modem including online shopping email support networked multiplayer gaming select cd-i games service required cd-i player dv cartridge internet starter kit initially retailed £99.99 andy stout writer official cd-i magazine explained cd-online cd-online service went live uk october 25 1995 march 1996 netherlands 399 guilders system reportedly scheduled launch us web-i august 1996 although philips aggressively promoted cd-i august 1993 computer gaming world reported skepticism persists long-term prospects compared platforms like ibm pc compatibles apple macintosh sega genesis magazine stated january 1994 despite philips new emphasis games cd-i still answer hardcore gamers console may yet surprise us future recommended cd-i video cartridge needing buy new console price right software support 3do probably better could wait months early 1995 review system gamepro stated inconsistent game quality puts cd-i disadvantage high-powered game producers late 1995 review next generation criticized philips approach marketing cd-i hardware unit excels practically nothing except fmv addition 200 digital video cartridge magazine noted philips yet officially discontinued cd-i dead intents purposes citing evidence fact though philips large booth 1995 electronic entertainment expo cd-i hardware software display next generation scored console one five stars discontinuation retrospectively cd-i overwhelmingly panned critics blasted graphics games controls microsoft ceo bill gates admitted initially worried cd-i due philips heavy support device two-pronged attack games console pc markets retrospect device kind basically got caught middle terrible game machine terrible pc cd-i various controllers ranked fifth worst video game controller ign editor craig harris pc world ranked fourth list 10 worst video game systems time gamepro.com listed number four list 10 worst-selling consoles time 2008 cnet listed system list worst game console ever 2007 gametrailers ranked philips cd-i fourth worst console time top 10 worst console lineup games heavily criticized include hotel mario zelda adventure egm seanbaby rated wand gamelon one worst video games time however positively received critics often held standout title cd-i october 1994 philips claimed installed base one million units cd-i 1996 wall street journal reported total us sales amounted 400,000 units
Computer architecture
purplera1n purplera1n utility jailbreaks version 3.0 iphone os achieved patching firmware device fly meaning edits firmware located device whilst dfu device firmware upgrade mode allowed users install either cydia rock app cydia alternative allowed user gain access root directory file system gaining access users could install themes tweaks homebrew applications purplera1n superseded blackra1n
Computer security
geeksphone peak geeksphone peak low-end smartphone released geeksphone april 2013 intended software developers wanting build test mobile applications new firefox os general consumers peak entry-level keon first commercially available mobile devices running firefox os geeksphone keon peak initially became available 23 april 2013 first batch sold hours unlike lower-end geeksphone keon peak fully open source contains requires proprietary qualcomm code geeksphone peak+ improved version original peak first announced 16 july 2013 unlike original peak peak+ customer-oriented device features twice ram original peak added compass sensor peak+ also features exterior dimensions peak geeksphone estimates shipping peak+ devices start november 2013 've issues material providers n't complying given dates mozilla allow geeksphone peak+ called firefox os device insists described device based boot gecko technology said mozilla yet make mind regarding firefox os certification entails favors carrier supports start-ups geeksphone geeksphone assures despite mozilla wanting support peak/peak+ display resolution internals peak+ exactly original peak without mozilla logos peak running certified copy firefox os 1.1 geeksphone peak+ cancelled 28 november 2013
Operating systems
laplink laplink proprietary piece software used synchronize laptops desktops using parallel port serial port laplink cable laplink typically shipped serial parallel cables serial cables much lower data transfer rate parallel cables later laplink iterations shipped ethernet cables port port traffic
Computer security
amazon company amazon.com inc. american multinational technology company based seattle washington focuses e-commerce cloud computing digital streaming artificial intelligence considered one big four technology companies along google apple facebook amazon known disruption well-established industries technological innovation mass scale world largest e-commerce marketplace ai assistant provider cloud computing platform measured revenue market capitalization amazon largest internet company revenue world second largest private employer united states one world valuable companies amazon second largest technology company revenue amazon founded jeff bezos july 5 1994 bellevue washington company initially started online marketplace books later expanded sell electronics software video games apparel furniture food toys jewelry 2015 amazon surpassed walmart valuable retailer united states market capitalization 2017 amazon acquired whole foods market 13.4 billion vastly increased amazon presence brick-and-mortar retailer 2018 bezos announced two-day delivery service amazon prime surpassed 100 million subscribers worldwide amazon distributes downloads streaming video music audiobook amazon prime video amazon music audible subsidiaries amazon also publishing arm amazon publishing film television studio amazon studios cloud computing subsidiary amazon web services produces consumer electronics including kindle e-readers fire tablets fire tv echo devices addition amazon subsidiaries also include ring twitch.tv whole foods market imdb among various controversies company criticized technological surveillance overreach hyper-competitive demanding work culture tax avoidance anti-competitive practices 1994 jeff bezos incorporated amazon chose location seattle technical talent microsoft located may 1997 organization went public company began selling music videos 1998 time began operations internationally acquiring online sellers books united kingdom germany following year organization also sold video games consumer electronics home-improvement items software games toys addition items 2002 corporation started amazon web services aws provided data web site popularity internet traffic patterns statistics marketers developers 2006 organization grew aws portfolio elastic compute cloud ec2 rents computer processing power well simple storage service s3 rents data storage via internet made available year company started fulfillment amazon managed inventory individuals small companies selling belongings company internet site 2012 amazon bought kiva systems automate inventory-management business purchasing whole foods market supermarket chain five years later 2017. board directors 2000 u.s. toy retailer toys r us entered 10-year agreement amazon valued 50 million per year plus cut sales toys r us would exclusive supplier toys baby products service chain website would redirect amazon toys games category 2004 toys r us sued amazon claiming perceived lack variety toys r us stock amazon knowingly allowed third-party sellers offer items service categories toys r us granted exclusivity 2006 court ruled favor toys r us giving right unwind agreement amazon establish independent e-commerce website company later awarded 51 million damages 2001 amazon entered similar agreement borders group amazon would co-manage borders.com co-branded service borders pulled arrangement 2007 plans also launch online store october 18 2011 amazon.com announced partnership dc comics exclusive digital rights many popular comics including superman batman green lantern sandman watchmen partnership caused well-known bookstores like barnes noble remove titles shelves november 2013 amazon announced partnership united states postal service begin delivering orders sundays service included amazon standard shipping rates initiated metropolitan areas los angeles new york high-volume inability deliver timely way plans expand dallas houston new orleans phoenix 2014 june 2017 nike confirmed pilot partnership amazon sell goods directly platform amazonfresh sold range booths branded products home delivery selected areas september 2017 amazon ventured one sellers jv appario retail owned patni group recorded total income us 104.44 million ₹ 759 crore financial year 2017–18 november 2018 amazon reached agreement apple inc. sell selected products service via company selected apple authorized resellers result partnership apple authorized resellers may sell apple products amazon effective january 4 2019 amazon.com product lines available website include several media books dvds music cds videotapes software apparel baby products consumer electronics beauty products gourmet food groceries health personal-care items industrial scientific supplies kitchen items jewelry watches lawn garden items musical instruments sporting goods tools automotive items toys games amazon separate retail websites countries also offers international shipping products certain countries amazon.com number products services available including amazon owns 40 subsidiaries including zappos shopbop diapers.com kiva systems amazon robotics audible goodreads teachstreet twitch imdb a9.com company focused researching building innovative technology subsidiary since 2003 amazon maritime inc. holds federal maritime commission license operate non-vessel-owning common carrier nvocc enables company manage shipments china united states audible.com seller producer spoken audio entertainment information educational programming internet audible sells digital audiobooks radio tv programs audio versions magazines newspapers production arm audible studios audible also become world largest producer downloadable audiobooks january 31 2008 amazon announced would buy audible 300 million deal closed march 2008 audible became subsidiary amazon beijing century joyo courier services subsidiary amazon applied freight forwarding license us maritime commission amazon also building logistics trucking air freight potentially compete ups fedex brilliance audio audiobook publisher founded 1984 michael snodgrass grand michigan company produced first 8 audio titles 1985 company purchased amazon 2007 undisclosed amount time acquisition brilliance producing 12–15 new titles month operates independent company within amazon 1984 brilliance audio invented technique recording twice much cassette technique involved recording two channels stereo track credited revolutionizing burgeoning audiobook market mid-1980s since made unabridged books affordable comixology cloud-based digital comics platform 200 million comic downloads offers selection 40,000 comic books graphic novels across android ios fire os windows 8 devices web browser amazon bought company april 2014 createspace offers self-publishing services independent content creators publishers film studios music labels became subsidiary 2009 eero company manufactures mesh-capable routers company founded 2015 based san francisco amazon announced would buy eero 2019 goodreads social cataloging website founded december 2006 launched january 2007 otis chandler software engineer entrepreneur elizabeth chandler website allows individuals freely search goodreads extensive user-populated database books annotations reviews users sign register books generate library catalogs reading lists also create groups book suggestions discussions december 2007 site 650,000 members 10 million books added amazon bought company march 2013 lab126 developers integrated consumer electronics kindle became subsidiary 2004 amazon announced would fund deploy large broadband satellite internet constellation called project kuiper april 2019 expected take decade fully deploy 3,236 satellites planned full constellation order provide internet tens millions people lack basic access broadband internet amazon announced intend sell broadband service directly consumers offer broadband service partnerships companies satellites use orbit height kuiper work concert amazon previously announced large network 12 satellite ground station facilities aws ground station unit announced november 2018 amazon filed communications license documents us regulatory authorities july 2019 included information wholly owned amazon subsidiary intended deploy satellite constellation kuiper systems llc based seattle washington kuiper system consist 3,236 satellites operating 98 orbital planes altitudes kuiper system includes high-performance satellites terrestrial gateways internetworking technologies range customer terminals president kuiper systems rajeev badyal former vice president spacex satellite internet constellation business unit ring home automation company founded jamie siminoff 2013 primarily known wifi powered smart doorbells manufactures devices security cameras amazon bought ring 1 billion usd 2018 shelfari social cataloging website books shelfari users built virtual bookshelves titles owned read could rate review tag discuss books users could also create groups members could join create discussions talk books topics recommendations could sent friends site books read amazon bought company august 2008 shelfari continued function independent book social network within amazon january 2016 amazon announced would merging shelfari goodreads closing shelfari souq.com largest e-commerce platform middle east based dubai united arab emirates march 28 2017 amazon confirmed would acquiring souq.com 580 million souq.com subsidiary amazon acts amazon arm middle east region twitch live streaming platform video primarily oriented towards video gaming content service first established spin-off general-interest streaming service known justin.tv prominence eclipsed twitch justin.tv eventually shut parent company august 2014 order focus exclusively twitch later month twitch acquired amazon 970 million twitch amazon also owns curse inc. operator video gaming communities provider voip services gaming since acquisition twitch began sell games directly platform began offering special features amazon prime subscribers site rapid growth boosted primarily prominence major esports competitions service leading gamespot senior esports editor rod breslau described service espn esports service 1.5 million broadcasters 100 million monthly viewers whole foods market american supermarket chain exclusively featuring foods without artificial preservatives colors flavors sweeteners hydrogenated fats august 23 2017 reported federal trade commission approved merger amazon.com whole foods market following day announced deal would closed august 28 2017 junglee former online shopping service provided amazon enabled customers search products online offline retailers india junglee started virtual database used extract information internet deliver enterprise applications progressed junglee started use database technology create single window marketplace internet making every item every supplier available purchase web shoppers could locate compare transact millions products across internet shopping mall one window amazon acquired junglee 1998 website junglee.com launched india february 2012 comparison-shopping website curated enabled searching diverse variety products clothing electronics toys jewelry video games among others across thousands online offline sellers millions products browse-able whereby client selects price directed seller november 2017 amazon closed junglee.com former domain currently redirects amazon india amazon first launched distribution network 1997 two fulfillment centers seattle new castle delaware amazon several types distribution facilities consisting crossdock centers fulfillment centers sortation centers delivery stations prime hubs prime air hubs 75 fulfillment centers 25 sortation centers 125,000 employees employees responsible five basic tasks unpacking inspecting incoming goods placing goods storage recording location picking goods computer recorded locations make individual shipment sorting packing orders shipping computer records location goods maps routes pickers plays key role employees carry hand-held computers communicate central computer monitor rate progress domain amazon.com attracted least 615 million visitors annually 2008 amazon attracts 130 million customers us website per month start 2016 company also invested heavily massive amount server capacity website especially handle excessive traffic december christmas holiday season results generated amazon search engine partly determined promotional fees amazon localized storefronts differ selection prices differentiated top-level domain country code amazon allows users submit reviews web page product reviewers must rate product rating scale one five stars amazon provides badging option reviewers indicate real name reviewer based confirmation credit card account indicate reviewer one top reviewers popularity customers may comment vote reviews indicating whether found review helpful review given enough helpful hits appears front page product 2010 amazon reported largest single source internet consumer reviews publishers asked bezos amazon would publish negative reviews defended practice claiming amazon.com taking different approach ... want make every book available—the good bad ugly ... let truth loose cases positive reviews written posted public relations companies behalf clients instances writers using pseudonyms leave negative reviews rivals works search inside book feature allows customers search keywords full text many books catalog feature started 120,000 titles 33 million pages text october 23 2003 300,000 books program amazon cooperated around 130 publishers allow users perform searches avoid copyright violations amazon return computer-readable text book instead returns picture matching page instructs web browser disable printing puts limits number pages book single user access additionally customers purchase online access books via amazon upgrade program amazon derives many sales around 40 2008 third-party sellers sell products amazon associates receive commission referring customers amazon placing links amazon websites referral results sale worldwide amazon 900,000 members affiliate programs middle 2014 amazon affiliate program used 1.2 websites second popular advertising network google ads frequently used websites non-profits provide way supporters earn commission amazon reported 1.3 million sellers sold products amazon websites 2007 unlike ebay amazon sellers maintain separate payment accounts payments handled amazon associates access amazon catalog directly websites using amazon web services aws xml service new affiliate product astore allows associates embed subset amazon products within another website linked another website june 2010 amazon seller product suggestions launched rumored internally called project genesis provide transparency sellers recommending specific products third-party sellers sell amazon products suggested based customers browsing history amazon sales rank asr provides indication popularity product sold amazon locale relative indicator popularity updated hourly effectively best sellers list millions products stocked amazon asr direct effect sales product used amazon determine products include bestsellers lists products appear lists enjoy additional exposure amazon website may lead increase sales particular products experience large jumps sales ranks may included within amazon lists movers shakers listing provides additional exposure might lead increase sales competitive reasons amazon release actual sales figures public however amazon begun release point sale data via nielsen bookscan service verified authors asr source much speculation publishers manufacturers marketers amazon release details sales rank calculation algorithm companies analyzed amazon sales data generate sales estimates based asr though amazon states amazon employs multi-level e-commerce strategy amazon started focusing business-to-consumer relationships customers business-to-business relationships suppliers moved facilitate customer-to-customer amazon marketplace acts intermediary facilitate transactions company lets anyone sell nearly anything using platform addition affiliate program lets anyone post-amazon links earn commission click-through sales program lets affiliates build entire websites based amazon platform large e-commerce sellers use amazon sell products addition selling websites sales processed amazon.com end individual sellers processing order fulfillment amazon leases space retailers small sellers used new goods go amazon marketplace offer goods fixed price amazon also employs use drop shippers meta sellers members entities advertise goods amazon order goods direct competing websites usually amazon members meta sellers may millions products listed large transaction numbers grouped alongside less prolific members giving credibility someone business long time markup anywhere 50 100 sometimes sellers maintain items stock opposite true amazon increases dominance marketplace drop shippers become commonplace recent years november 2015 amazon opened physical amazon books store university village seattle store 5,500 square feet prices products match website amazon open tenth physical book store 2017 media speculation suggests amazon plans eventually roll 300 400 bookstores around country amazon plans open brick mortar bookstores germany amazon.com primarily retail site sales revenue model amazon takes small percentage sale price item sold website also allowing companies advertise products paying listed featured products amazon.com ranked 8th fortune 500 rankings largest united states corporations total revenue fiscal year 2018 amazon reported earnings us 10.07 billion annual revenue us 232.887 billion increase 30.9 previous fiscal cycle since 2007 sales increased 14.835 billion 232.887 billion thanks continued business expansion amazon market capitalization valued us 803 billion early november 2018 since founding company attracted criticism controversy actions including supplying law enforcement facial recognition surveillance tools forming cloud computing partnerships cia leading customers away bookshops adversely impacting environment placing low priority warehouse conditions workers actively opposing unionization efforts remotely deleting content purchased amazon kindle users taking public subsidies seeking patent 1-click technology engaging anti-competitive actions price discrimination reclassifying lgbt books adult content criticism also concerned various decisions whether censor publish content wikileaks website works containing libel material facilitating dogfight cockfight pedophile activities december 2011 amazon faced backlash small businesses running one-day deal promote new price check app shoppers used app check prices brick-and-mortar store offered 5 discount purchase item amazon companies like groupon ebay taap.it countered amazon promotion offering 10 products company also faced accusations putting undue pressure suppliers maintain extend profitability one effort squeeze vulnerable book publishers known within company gazelle project bezos suggested according brad stone amazon approach small publishers way cheetah would pursue sickly gazelle july 2014 federal trade commission launched lawsuit company alleging promoting in-app purchases children transacted without parental consent november 2018 community action group opposed construction permit delivered goodman group construction logisitics platform amazon operate lyon–saint-exupéry airport february 2019 filed request behalf second regional community action group asking administrative court decide whether platform served sufficiently important public interest justify environmental impact construction suspended matters decided october 16 2016 apple filed trademark infringement case mobile star llc selling counterfeit apple products amazon suit apple provided evidence amazon selling counterfeit apple products advertising genuine purchasing apple found able identify counterfeit products success rate 90 amazon sourcing selling items without properly determining genuine mobile star llc settled apple undisclosed amount april 27 2017 amazon state sales tax collection policy changed years since collect sales taxes early years u.s. state local sales taxes levied state local governments federal level countries amazon operates sales tax value added tax uniform throughout country amazon obliged collect customers proponents forcing amazon.com collect sales tax—at least states maintains physical presence—argue corporation wields anti-competitive advantage storefront businesses forced collect sales tax. ref name= bloomberg/businessweek /ref many u.s. states 21st century passed online shopping sales tax laws designed compel amazon.com e-commerce retailers collect state local sales taxes customers amazon.com originally collected sales tax five states amazon collects sales taxes customers 45 states state sales tax washington d.c. amazon paid federal income taxes u.s. 2017 2018 actually got tax refunds worth millions dollars despite recording several billion dollars profits year cnn reported amazon tax bill zero took advantage provisions years losing money allowed offset future taxes profits well various tax credits amazon criticized political figures paying federal income taxes early 2018 president donald trump repeatedly criticized amazon use united states postal service prices delivery packages stating right amazon costing united states post office massive amounts money delivery boy trump tweeted amazon pay costs plus bourne sic american taxpayer amazon shares fell 6 percent result trump comments shepard smith fox news disputed trump claims pointed evidence usps offering below-market prices customers advantage amazon however analyst tom forte pointed fact amazon payments usps made public contract reputation sweetheart deal throughout summer 2018 vermont senator bernie sanders criticized amazon wages working conditions series youtube videos media appearances also pointed fact amazon paid federal income tax previous year sanders solicited stories amazon warehouse workers felt exploited company one story james bloodworth described environment akin low-security prison stated company culture used orwellian newspeak reports cited finding new food economy one third fulfilment center workers arizona supplemental nutrition assistance program snap responses amazon included incentives employees tweet positive stories statement called salary figures used sanders inaccurate misleading statement also charged inappropriate refer snap food stamps september 5 2018 sanders along ro khanna introduced stop bad employers zeroing subsidies stop bezos act aimed amazon alleged beneficiaries corporate welfare walmart mcdonald uber among bill supporters tucker carlson fox news matt taibbi criticized journalists covering amazon contribution wealth inequality earlier october 2 amazon announced minimum wage american employees would raised 15 per hour sanders congratulated company making decision former employees current employees media politicians criticized amazon poor working conditions company 2011 publicized workers carry tasks heat breinigsville pennsylvania warehouse result inhumane conditions employees became extremely uncomfortable suffered dehydration collapse loading-bay doors opened allow fresh air concerns theft amazon initial response pay ambulance sit outside call cart away overheated employees company eventually installed air conditioning warehouse workers pickers travel building trolley handheld scanner picking customer orders walk 15 miles workday fall behind targets reprimanded handheld scanners give real-time information employee quickly slowly working scanners also serve allow team leads area managers track specific locations employees much idle time gain working german television report broadcast february 2013 journalists diana löbl peter onneken conducted covert investigation distribution center amazon town bad hersfeld german state hessen report highlights behavior security guards employed third party company apparently either neo-nazi background deliberately dressed neo-nazi apparel intimidating foreign temporary female workers distribution centers third party security company involved delisted amazon business contact shortly report march 2015 reported verge amazon removing non-compete clauses 18 months length us employment contracts hourly-paid workers criticism acting unreasonably preventing employees finding work even short-term temporary workers sign contracts prohibit working company would directly indirectly support good service competes helped support amazon 18 months leaving amazon even fired made redundant 2015 front-page article new york times profiled several former amazon employees together described bruising workplace culture workers illness personal crises pushed unfairly evaluated bezos responded writing sunday memo employees disputed times account shockingly callous management practices said would never tolerated company effort boost employee morale november 2 2015 amazon announced would extending six weeks paid leave new mothers fathers change includes birth parents adoptive parents applied conjunction existing maternity leave medical leave new mothers mid-2018 investigations journalists media outlets guardian reported poor working conditions amazon fulfillment centers later 2018 another article exposed poor working conditions amazon delivery drivers response criticism amazon n't pay workers livable wage jeff bezos announced beginning november 1 2018 us uk amazon employees earn 15 hour minimum wage amazon also lobby make 15 hour federal minimum wage time amazon also eliminated stock awards bonuses hourly employees black friday 2018 amazon warehouse workers several european countries including italy germany spain united kingdom went strike protest inhumane working conditions low pay daily beast reported march 2019 emergency services responded 189 calls 46 amazon warehouses 17 states years 2013 2018 relating suicidal employees workers attributed mental breakdowns employer-imposed social isolation aggressive surveillance hurried dangerous working conditions fulfillment centers one former employee told daily beast isolating colony hell people breakdowns regular occurrence july 15 2019 onset amazon prime day sale event amazon employees working united states germany went strike protest unfair wages poor working conditions 2013 amazon secured contract cia poses potential conflict interest involving bezos-owned washington post newspaper coverage cia kate martin director center national security studies said serious potential conflict interest major newspaper like washington post contractual relationship government secret part government later followed contract department defence may 2018 amazon threatened seattle city council employee head tax proposal would funded houselessness services low-income housing tax would cost amazon 800 per employee 0.7 average salary retaliation amazon paused construction new building threatened limit investment city funded repeal campaign although originally passed measure soon repealed expensive repeal campaign spearheaded amazon incentives given metropolitan council nashville davidson county amazon new operations center excellence nashville yards site owned developer southwest value partners controversial including decision tennessee department economic community development keep full extent agreement secret incentives include 102 million combined grants tax credits scaled-down amazon office building well 65 million cash grant capital expenditures exchange creation 5,000 jobs seven years tennessee coalition open government called transparency another local organization known people alliance transit housing employment pathe suggested public money given amazon instead spent building public housing working poor homeless investing public transportation nashvillians others suggested incentives big corporations n't improve local economy november 2018 proposal give amazon 15 million incentives criticized nashville firefighters union nashville chapter fraternal order police called corporate welfare february 2019 another 15.2 million infrastructure approved council although voted three council members including councilwoman angie henderson dismissed cronyism amazon publicly opposed secret government surveillance revealed freedom information act requests supplied facial recognition support law enforcement form rekognition technology consulting services initial testing included city orlando florida washington county oregon amazon offered connect washington county amazon government customers interested rekognition body camera manufacturer ventures opposed coalition civil rights groups concern could lead expansion surveillance prone abuse specifically could automate identification tracking anyone particularly context potential police body camera integration backlash city orlando publicly stated longer use technology amazon lobbies united states federal government state governments issues enforcement sales taxes online sales transportation safety privacy data protection intellectual property according regulatory filings amazon.com focuses lobbying united states congress federal communications commission federal reserve amazon.com spent roughly 3.5 million 5 million 9.5 million lobbying 2013 2014 2015 respectively amazon.com corporate member american legislative exchange council alec dropped membership following protests shareholders meeting may 24 2012 2014 amazon expanded lobbying practices prepared lobby federal aviation administration approve drone delivery program hiring akin gump strauss hauer feld lobbying firm june amazon lobbyists visited federal aviation administration officials aviation committees washington d.c. explain plans deliver packages
Distributed computing architecture
kismet software kismet network detector packet sniffer intrusion detection system 802.11 wireless lans kismet work wireless card supports raw monitoring mode sniff 802.11a 802.11b 802.11g 802.11n traffic program runs linux freebsd netbsd openbsd mac os x client also run microsoft windows although aside external drones see one supported wireless hardware available packet source distributed gnu general public license kismet free software kismet differs wireless network detectors working passively namely without sending loggable packets able detect presence wireless access points wireless clients associate also widely used date open source wireless monitoring tool kismet also includes basic wireless ids features detecting active wireless sniffing programs including netstumbler well number wireless network attacks kismet features ability log sniffed packets save tcpdump/wireshark airsnort compatible file format kismet also capture per-packet information headers kismet also features ability detect default configured networks probe requests determine level wireless encryption used given access point order find many networks possible kismet supports channel hopping means constantly changes channel channel non-sequentially user-defined sequence default value leaves big holes channels example 1-6-11-2-7-12-3-8-13-4-9-14-5-10 advantage method capture packets adjacent channels overlap kismet also supports logging geographical coordinates network input gps receiver additionally available kismet three separate parts drone used collect packets pass server interpretation server either used conjunction drone interpreting packet data extrapolating wireless information organizing client communicates server displays information server collects updating kismet -ng kismet supports wide variety scanning plugins including dect bluetooth others kismet used number commercial open source projects distributed kali linux used wireless reconnaissance used packages inexpensive wireless intrusion detection system used number peer reviewed studies detecting rogue access points using kismet
Computer security
cascading style sheets cascading style sheets css style sheet language used describing presentation document written markup language like html css cornerstone technology world wide web alongside html javascript css designed enable separation presentation content including layout colors fonts separation improve content accessibility provide flexibility control specification presentation characteristics enable multiple web pages share formatting specifying relevant css separate .css file reduce complexity repetition structural content separation formatting content also makes feasible present markup page different styles different rendering methods on-screen print voice via speech-based browser screen reader braille-based tactile devices css also rules alternate formatting content accessed mobile device name cascading comes specified priority scheme determine style rule applies one rule matches particular element cascading priority scheme predictable css specifications maintained world wide web consortium w3c internet media type mime type codice_1 registered use css rfc 2318 march 1998 w3c operates free css validation service css documents addition html markup languages support use css including xhtml plain xml svg xul css simple syntax uses number english keywords specify names various style properties style sheet consists list rules rule rule-set consists one selectors declaration block css selectors declare part markup style applies matching tags attributes markup selectors may apply following classes ids case-sensitive start letters include alphanumeric characters hyphens underscores class may apply number instances elements id may applied single element pseudo-classes used css selectors permit formatting based information contained document tree one example widely used pseudo-class identifies content user points visible element usually holding mouse cursor appended selector pseudo-class classifies document elements whereas pseudo-element makes selection may consist partial elements selectors may combined many ways achieve great specificity flexibility multiple selectors may joined spaced list specify elements location element type id class combination thereof order selectors important example applies elements class myclass inside div elements whereas applies div elements elements class myclass following table provides summary selector syntax indicating usage version css introduced declaration block consists list declarations braces declaration consists property colon codice_2 value multiple declarations block semi-colon codice_3 must inserted separate declaration properties specified css standard property set possible values properties affect type element others apply particular groups elements values may keywords center inherit numerical values 200 pixels 50 percent viewport width 80 percent parent element width color values specified keywords e.g hexadecimal values e.g also abbreviated rgb values 0 255 scale e.g codice_4 rgba values specify color alpha transparency e.g hsl hsla values e.g non-zero numeric values representing linear measures must include length unit either alphabetic code abbreviation codice_5 codice_6 percentage sign codice_7 units – codice_8 centimetre codice_9 inch codice_10 millimetre codice_11 pica codice_12 point – absolute means rendered dimension depend upon structure page others – codice_13 em codice_14 ex codice_15 pixel – relative means factors font size parent element affect rendered measurement eight units feature css 1 retained subsequent revisions proposed css values units module level 3 adopted w3c recommendation provide seven length units codice_16 codice_17 codice_18 codice_19 codice_20 codice_21 codice_22 css nearly presentational attributes html documents contained within html markup font colors background styles element alignments borders sizes explicitly described often repeatedly within html css lets authors move much information another file style sheet resulting considerably simpler html example headings codice_23 elements sub-headings codice_24 sub-sub-headings codice_25 etc. defined structurally using html print screen choice font size color emphasis elements presentational css document authors wanted assign typographic characteristics say codice_24 headings repeat html presentational markup occurrence heading type made documents complex larger error-prone difficult maintain css allows separation presentation structure css define color font text alignment size borders spacing layout many typographic characteristics independently on-screen printed views css also defines non-visual styles reading speed emphasis aural text readers w3c deprecated use presentational html markup example pre-css html heading element defined red text would written using css element coded using style properties instead html presentational attributes advantages may immediately clear since second form actually verbose power css becomes apparent style properties placed internal style element even better external css file example suppose document contains style element codice_23 elements document automatically become red without requiring explicit code author later wanted make codice_23 elements blue instead could done changing style element rather laboriously going document changing color individual codice_23 element styles also placed external css file described loaded using syntax similar decouples styling html document makes possible restyle multiple documents simply editing shared external css file css information provided various sources sources web browser user author information author classified inline media type importance selector specificity rule order inheritance property definition css style information separate document embedded html document multiple style sheets imported different styles applied depending output device used example screen version quite different printed version authors tailor presentation appropriately medium style sheet highest priority controls content display declarations set highest priority source passed source lower priority user agent style process called cascading one goals css allow users greater control presentation someone finds red italic headings difficult read may apply different style sheet depending browser web site user may choose various style sheets provided designers may remove added styles view site using browser default styling may override red italic heading style without altering attributes specificity refers relative weights various rules determines styles apply element one rule could apply based specification simple selector e.g h1 specificity 1 class selectors specificity 1,0 id selectors specificity 1,0,0 specificity values carry decimal system commas used separate digits css rule 11 elements 11 classes would specificity 11,11 121 thus following rules selectors result indicated specificity consider html fragment example declaration codice_30 attribute overrides one codice_31 element higher specificity thus paragraph appears green inheritance key feature css relies ancestor-descendant relationship operate inheritance mechanism properties applied specified element also descendants inheritance relies document tree hierarchy xhtml elements page based nesting descendant elements may inherit css property values ancestor element enclosing general descendant elements inherit text-related properties box-related properties inherited properties inherited color font letter-spacing line-height list-style text-align text-indent text-transform visibility white-space word-spacing properties inherited background border display float clear height width margin min- max-height -width outline overflow padding position text-decoration vertical-align z-index inheritance used avoid declaring certain properties style sheet allowing shorter css inheritance css inheritance class-based programming languages possible define class b like class modifications css possible style element class modifications however possible define css class b like could used style multiple elements without repeat modifications given following style sheet suppose h1 element emphasizing element em inside color assigned em element emphasized word illustrate inherits color parent element h1 style sheet h1 color pink hence em element likewise pink whitespace properties selectors ignored code snippet functionally equivalent one one common way format css readability indent property give line addition formatting css readability shorthand properties used write code faster also gets processed quickly rendered css 2.1 defines three positioning schemes four possible values position property item positioned way static properties top bottom left right used specify offsets positions codice_32 property may one three values absolutely positioned fixed items floated elements normally flow around floated items unless prevented codice_33 property css first proposed håkon wium lie october 10 1994 time lie working tim berners-lee cern several style sheet languages web proposed around time discussions public mailing lists inside world wide web consortium resulted first w3c css recommendation css1 released 1996 particular proposal bert bos influential became co-author css1 regarded co-creator css style sheets existed one form another since beginnings standard generalized markup language sgml 1980s css developed provide style sheets web one requirement web style sheet language style sheets come different sources web therefore existing style sheet languages like dsssl fosi suitable css hand let document style influenced multiple style sheets way cascading styles html grew came encompass wider variety stylistic capabilities meet demands web developers evolution gave designer control site appearance cost complex html variations web browser implementations violawww worldwideweb made consistent site appearance difficult users less control web content displayed browser/editor developed tim berners-lee style sheets hard-coded program style sheets could therefore linked documents web robert cailliau also cern wanted separate structure presentation different style sheets could describe different presentation printing screen-based presentations editors improving web presentation capabilities topic interest many web community nine different style sheet languages proposed www-style mailing list nine proposals two especially influential became css cascading html style sheets stream-based style sheet proposal ssp two browsers served testbeds initial proposals lie worked yves lafon implement css dave raggett arena browser bert bos implemented ssp proposal argo browser thereafter lie bos worked together develop css standard h removed name style sheets could also applied markup languages besides html lie proposal presented mosaic web conference later called www2 chicago illinois 1994 bert bos 1995 around time w3c already established took interest development css organized workshop toward end chaired steven pemberton resulted w3c adding work css deliverables html editorial review board erb lie bos primary technical staff aspect project additional members including thomas reardon microsoft participating well august 1996 netscape communication corporation presented alternative style sheet language called javascript style sheets jsss spec never finished deprecated end 1996 css ready become official css level 1 recommendation published december development html css dom taking place one group html editorial review board erb early 1997 erb split three working groups html working group chaired dan connolly w3c dom working group chaired lauren wood softquad css working group chaired chris lilley w3c css working group began tackling issues addressed css level 1 resulting creation css level 2 november 4 1997 published w3c recommendation may 12 1998 css level 3 started 1998 still development 2014 2005 css working groups decided enforce requirements standards strictly meant already published standards like css 2.1 css 3 selectors css 3 text pulled back candidate recommendation working draft level css 1 specification completed 1996 microsoft internet explorer 3 released year featuring limited support css ie 4 netscape 4.x added support typically incomplete many bugs prevented css usefully adopted three years web browser achieved near-full implementation specification internet explorer 5.0 macintosh shipped march 2000 first browser full better 99 percent css 1 support surpassing opera leader since introduction css support fifteen months earlier browsers followed soon afterwards many additionally implemented parts css 2 however even later 'version 5 web browsers began offer fairly full implementation css still incorrect certain areas fraught inconsistencies bugs quirks microsoft internet explorer 5.x windows opposed different ie macintosh flawed implementation 'css box model compared css standards inconsistencies variation feature support made difficult designers achieve consistent appearance across browsers platforms without use workarounds termed css hacks filters ie/windows box model bugs serious internet explorer 6 released microsoft introduced backwards-compatible mode css interpretation 'quirks mode alongside alternative corrected 'standards mode non-microsoft browsers also provided 'mode'-switch behavior capability therefore became necessary authors html files ensure contained special distinctive 'standards-compliant css intended marker show authors intended css interpreted correctly compliance standards opposed intended long-obsolete ie5/windows browser without marker web browsers 'quirks mode'-switching capability size objects web pages ie5/windows would rather following css standards problems patchy adoption css along errata original specification led w3c revise css 2 standard css 2.1 moved nearer working snapshot current css support html browsers css 2 properties browser successfully implemented dropped cases defined behaviors changed bring standard line predominant existing implementations css 2.1 became candidate recommendation february 25 2004 css 2.1 pulled back working draft status june 13 2005 returned candidate recommendation status july 19 2007 addition problems codice_34 extension used software product used convert powerpoint files compact slide show files web servers served codice_34 mime type codice_36 rather codice_1 css various levels profiles level css builds upon last typically adding new features typically denoted css 1 css 2 css 3 css 4 profiles typically subset one levels css built particular device user interface currently profiles mobile devices printers television sets profiles confused media types added css 2 first css specification become official w3c recommendation css level 1 published december 17 1996 håkon wium lie bert bos credited original developers among capabilities support w3c longer maintains css 1 recommendation css level 2 specification developed w3c published recommendation may 1998 superset css 1 css 2 includes number new capabilities like absolute relative fixed positioning elements z-index concept media types support aural style sheets later replaced css 3 speech modules bidirectional text new font properties shadows w3c longer maintains css 2 recommendation css level 2 revision 1 often referred css 2.1 fixes errors css 2 removes poorly supported fully interoperable features adds already implemented browser extensions specification comply w3c process standardizing technical specifications css 2.1 went back forth working draft status candidate recommendation status many years css 2.1 first became candidate recommendation february 25 2004 reverted working draft june 13 2005 review returned candidate recommendation 19 july 2007 updated twice 2009 however changes clarifications made went back last call working draft 7 december 2010 css 2.1 went proposed recommendation 12 april 2011 reviewed w3c advisory committee finally published w3c recommendation 7 june 2011 css 2.1 planned first final revision level 2—but low priority work css 2.2 began 2015 unlike css 2 large single specification defining various features css 3 divided several separate documents called modules module adds new capabilities extends features defined css 2 preserving backward compatibility work css level 3 started around time publication original css 2 recommendation earliest css 3 drafts published june 1999 due modularization different modules different stability statuses modules candidate recommendation cr status considered moderately stable cr stage implementations advised drop vendor prefixes single integrated css4 specification split separate level 4 modules css3 split css language definition modules modules allowed level independently modules level 3—they build things css 2.1 level-4 modules exist image values backgrounds borders selectors build functionality preceding level-3 module modules defining entirely new functionality flexbox designated level 1 css working group sometimes publishes snapshots collection whole modules parts drafts considered stable interoperably implemented hence ready use far five best current practices documents published notes 2007 2010 2015 2017 2018 web browser uses layout engine render web pages support css functionality consistent browsers parse css perfectly multiple coding techniques developed target specific browsers workarounds commonly known css hacks css filters adoption new functionality css hindered lack support major browsers example internet explorer slow add support many css 3 features slowed adoption features damaged browser reputation among developers order ensure consistent experience users web developers often test sites across multiple operating systems browsers browser versions increasing development time complexity tools browserstack built reduce complexity maintaining environments addition testing tools many sites maintain lists browser support specific css properties including caniuse mozilla developer network additionally css 3 defines feature queries provide codice_38 directive allow developers target browsers support certain functionality directly within css css supported older browsers also sometimes patched using javascript polyfills pieces javascript code designed make browsers behave consistently workarounds—and need support fallback functionality—can add complexity development projects consequently companies frequently define list browser versions support websites adopt newer code standards incompatible older browsers browsers cut accessing many resources web sometimes intentionally many popular sites internet visually degraded older browsers due poor css support work large part due evolution javascript web technologies noted limitations current capabilities css include additionally several issues present prior versions css standard alleviated css frameworks pre-prepared libraries meant allow easier standards-compliant styling web pages using cascading style sheets language css frameworks include foundation blueprint bootstrap cascade framework materialize like programming scripting language libraries css frameworks usually incorporated external .css sheets referenced html provide number ready-made options designing laying web page although many frameworks published authors use mostly rapid prototyping learning prefer 'handcraft css appropriate published site without design maintenance download overhead many unused features site styling size css resources used project increases development team often needs decide common design methodology keep organized goals ease development ease collaboration development performance deployed stylesheets browser popular methodologies include oocss object oriented css acss atomic css ocss organic cascade style sheet smacss scalable modular architecture css bem block element modifier
Programming language topics
coq computer science coq interactive theorem prover allows expression mathematical assertions mechanically checks proofs assertions helps find formal proofs extracts certified program constructive proof formal specification coq works within theory calculus inductive constructions derivative calculus constructions coq automated theorem prover includes automatic theorem proving tactics various decision procedures association computing machinery rewarded thierry coquand gérard pierre huet christine paulin-mohring bruno barras jean-christophe filliâtre hugo herbelin chetan murthy yves bertot pierre castéran 2013 acm software system award coq seen programming language coq implements dependently typed functional programming language seen logical system implements higher-order type theory development coq supported since 1984 inria collaboration école polytechnique university paris-sud paris diderot university cnrs 1990s ens lyon also part project development coq initiated gérard pierre huet thierry coquand 40 people mainly researchers contributed features core system implementation team successively coordinated gérard huet christine paulin-mohring hugo herbelin matthieu sozeau coq part implemented ocaml bit c. core system extended due mechanism plug-ins word coq means rooster french stems local tradition naming french research development tools animal names 1991 coquand implementing language called calculus constructions simply called coc time 1991 new implementation based extended calculus inductive constructions started name changed coc coq also indirect reference thierry coquand developed calculus constructions along gérard pierre huet calculus inductive constructions along christine paulin-mohring coq provides specification language called gallina meaning hen latin spanish italian catalan programs written gallina weak normalization property – always terminate one way avoid halting problem may surprising since infinite loops non-termination common programming languages georges gonthier microsoft research cambridge england benjamin werner inria used coq create surveyable proof four color theorem completed 2005 based work significant extension coq developed called ssreflect stands small scale reflection despite name new features added coq ssreflect general-purpose features useful merely computational reflection style proof include ssreflect 1.4 freely available dual-licensed open source cecill-b cecill-2.0 license compatible coq 8.4
Programming language topics
robowarrior robowarrior known japan english language action/puzzle video game developed hudson soft co-developed aicom making first nes game worked published jaleco nintendo entertainment system msx robowarrior takes place alien planet called altile created scientists solution overpopulation problem earth peaceful period altitle robowarriors decommissioned earth xantho empire invades altitle try transform personal gain player operates cyborg named zed z-type earth defence game zed raids altile fight xantho empire destroy leader xur zed deploys bombs clear path rocks walls forests killing enemies collecting items gameplay elements resemble bomberman 1983 robowarrior comprises five level formats 27 levels game one player must obtain key time limit expires another key unavailable player acquires crystal chalice levels cast darkness rendering obstructions invisible unless player lit lamp still levels mazes player must find blast-through weak points walls proceed periodically player engages boss level multiple bombs required bomb certain unconventional areas robowarrior also features water stages enemies respawn stage allowing player stock bombs zed controlled via overhead viewpoint player move four directions like hudson soft games hudson bee game lot stage work robowarrior features 4 11 horizontal hudson bees 1991 sunsoft published sequel bomber king game boy titled bomber king scenario 2
Computer architecture
curry–howard correspondence programming language theory proof theory curry–howard correspondence also known curry–howard isomorphism equivalence proofs-as-programs propositions- formulae-as-types interpretation direct relationship computer programs mathematical proofs generalization syntactic analogy systems formal logic computational calculi first discovered american mathematician haskell curry logician william alvin howard link logic computation usually attributed curry howard although idea related operational interpretation intuitionistic logic given various formulations l. e. j. brouwer arend heyting andrey kolmogorov see brouwer–heyting–kolmogorov interpretation stephen kleene see realizability relationship extended include category theory three-way curry–howard–lambek correspondence beginnings curry–howard correspondence lie several observations words curry–howard correspondence observation two families seemingly unrelated formalisms—namely proof systems one hand models computation other—are fact kind mathematical objects one abstracts peculiarities either formalism following generalization arises proof program formula proves type program informally seen analogy states return type function i.e. type values returned function analogous logical theorem subject hypotheses corresponding types argument values passed function program compute function analogous proof theorem sets form logic programming rigorous foundation proofs represented programs especially lambda terms proofs run correspondence starting point large spectrum new research discovery leading particular new class formal systems designed act proof system typed functional programming language includes martin-löf intuitionistic type theory coquand calculus constructions two calculi proofs regular objects discourse one state properties proofs way program field research usually referred modern type theory typed lambda calculi derived curry–howard paradigm led software like coq proofs seen programs formalized checked run converse direction use program extract proof given correctness—an area research closely related proof-carrying code feasible programming language program written richly typed development type systems partly motivated wish make curry–howard correspondence practically relevant curry–howard correspondence also raised new questions regarding computational content proof concepts covered original works curry howard particular classical logic shown correspond ability manipulate continuation programs symmetry sequent calculus express duality two evaluation strategies known call-by-name call-by-value speculatively curry–howard correspondence might expected lead substantial unification mathematical logic foundational computer science hilbert-style logic natural deduction two kinds proof systems among large family formalisms alternative syntaxes include sequent calculus proof nets calculus structures etc one admits curry–howard correspondence general principle proof system hides model computation theory underlying untyped computational structure kinds proof system possible natural question whether something mathematically interesting said underlying computational calculi conversely combinatory logic simply typed lambda calculus models computation either girard linear logic developed fine analysis use resources models lambda calculus typed version turing machine would behave proof system typed assembly languages instance low-level models computation carry types possibility writing non-terminating programs turing-complete models computation languages arbitrary recursive functions must interpreted care naive application correspondence leads inconsistent logic best way dealing arbitrary computation logical point view still actively debated research question one popular approach based using monads segregate provably terminating potentially non-terminating code approach also generalizes much richer models computation related modal logic natural extension curry–howard isomorphism radical approach advocated total functional programming eliminate unrestricted recursion forgo turing completeness although still retaining high computational complexity using controlled corecursion wherever non-terminating behavior actually desired general formulation curry–howard correspondence correspondence formal proof calculi type systems models computation particular splits two correspondences one level formulas types independent particular proof system model computation considered one level proofs programs time specific particular choice proof system model computation considered level formulas types correspondence says implication behaves function type conjunction product type may called tuple struct list term depending language disjunction sum type type may called union false formula empty type true formula singleton type whose sole member null object quantifiers correspond dependent function space products appropriate summarized following table level proof systems models computations correspondence mainly shows identity structure first particular formulations systems known hilbert-style deduction system combinatory logic secondly particular formulations systems known natural deduction lambda calculus natural deduction system lambda calculus following correspondences beginning simple remark curry feys 1958 book combinatory logic simplest types basic combinators k combinatory logic surprisingly corresponded respective axiom schemes α → β → α α → β → γ → α → β → α → γ used hilbert-style deduction systems reason schemes often called axioms k s. examples programs seen proofs hilbert-style logic given one restricts implicational intuitionistic fragment simple way formalize logic hilbert style follows let γ finite collection formulas considered hypotheses δ derivable γ denoted γ ⊢ δ following cases formalized using inference rules left column following table typed combinatory logic formulated using similar syntax let γ finite collection variables annotated types term also annotated type depend variables γ ⊢ δ generation rules defined given right-column curry remark simply states columns one-to-one correspondence restriction correspondence intuitionistic logic means classical tautologies peirce law α → β → α → α excluded correspondence seen abstract level correspondence restated shown following table especially deduction theorem specific hilbert-style logic matches process abstraction elimination combinatory logic thanks correspondence results combinatory logic transferred hilbert-style logic vice versa instance notion reduction terms combinatory logic transferred hilbert-style logic provides way canonically transform proofs proofs statement one also transfer notion normal terms notion normal proofs expressing hypotheses axioms never need detached since otherwise simplification happen conversely non provability intuitionistic logic peirce law transferred back combinatory logic typed term combinatory logic typable type results completeness sets combinators axioms also transferred instance fact combinator x constitutes one-point basis extensional combinatory logic implies single axiom scheme principal type x adequate replacement combination axiom schemes curry emphasized syntactic correspondence hilbert-style deduction combinatory logic howard made explicit 1969 syntactic analogy programs simply typed lambda calculus proofs natural deduction left-hand side formalizes intuitionistic implicational natural deduction calculus sequents use sequents standard discussions curry–howard isomorphism allows deduction rules stated cleanly implicit weakening right-hand side shows typing rules lambda calculus left-hand side γ γ γ denote ordered sequences formulas right-hand side denote sequences named i.e. typed formulas names different paraphrase correspondence proving γ ⊢ α means program given values types listed γ manufactures object type α axiom corresponds introduction new variable new unconstrained type rule corresponds function abstraction rule corresponds function application observe correspondence exact context γ taken set formulas e.g. λ -terms λx λy x λx λy type would distinguished correspondence examples given howard showed correspondence extends connectives logic constructions simply typed lambda calculus seen abstract level correspondence summarized shown following table especially also shows notion normal forms lambda calculus matches prawitz notion normal deduction natural deduction follows algorithms type inhabitation problem turned algorithms deciding intuitionistic provability howard correspondence naturally extends extensions natural deduction simply typed lambda calculus non-exhaustive list time curry also time howard proofs-as-programs correspondence concerned intuitionistic logic i.e logic particular peirce law deducible extension correspondence peirce law hence classical logic became clear work griffin typing operators capture evaluation context given program execution evaluation context later reinstalled basic curry–howard-style correspondence classical logic given note correspondence double-negation translation used map classical proofs intuitionistic logic continuation-passing-style translation used map lambda terms involving control pure lambda terms particularly call-by-name continuation-passing-style translations relates kolmogorov double negation translation call-by-value continuation-passing-style translations relates kind double-negation translation due kuroda finer curry–howard correspondence exists classical logic one defines classical logic adding axiom peirce law allowing several conclusions sequents case classical natural deduction exists proofs-as-programs correspondence typed programs parigot λμ-calculus proofs-as-programs correspondence settled formalism known gentzen sequent calculus correspondence well-defined pre-existing model computation hilbert-style natural deductions sequent calculus characterized presence left introduction rules right introduction rule cut rule eliminated structure sequent calculus relates calculus whose structure close one abstract machines informal correspondence follows n. g. de bruijn used lambda notation representing proofs theorem checker automath represented propositions categories proofs late 1960s period time howard wrote manuscript de bruijn likely unaware howard work stated correspondence independently sørensen urzyczyn 1998 2006 pp 98–99 researchers tend use term curry–howard–de bruijn correspondence place curry–howard correspondence bhk interpretation interprets intuitionistic proofs functions specify class functions relevant interpretation one takes lambda calculus class function bhk interpretation tells howard correspondence natural deduction lambda calculus kleene recursive realizability splits proofs intuitionistic arithmetic pair recursive function proof formula expressing recursive function realizes i.e correctly instantiates disjunctions existential quantifiers initial formula formula gets true kreisel modified realizability applies intuitionistic higher-order predicate logic shows simply typed lambda term inductively extracted proof realizes initial formula case propositional logic coincides howard statement extracted lambda term proof seen untyped lambda term realizability statement paraphrase fact extracted lambda term type formula means seen type gödel dialectica interpretation realizes extension intuitionistic arithmetic computable functions connection lambda calculus unclear even case natural deduction joachim lambek showed early 1970s proofs intuitionistic propositional logic combinators typed combinatory logic share common equational theory one cartesian closed categories expression curry–howard–lambek correspondence used people refer three way isomorphism intuitionistic logic typed lambda calculus cartesian closed categories objects interpreted types propositions morphisms terms proofs correspondence works equational level expression syntactic identity structures case curry howard correspondences i.e structure well-defined morphism cartesian-closed category comparable structure proof corresponding judgment either hilbert-style logic natural deduction clarify distinction underlying syntactic structure cartesian closed categories rephrased objects types defined morphisms terms defined well-defined morphisms typed terms defined following typing rules usual categorical morphism notation formula_13 replaced sequent calculus notation formula_14 identity composition unit type terminal object cartesian product left right projection currying application finally equations category equations imply following formula_34-laws exists formula_37 iff formula_38 provable implicational intuitionistic logic thanks curry–howard correspondence typed expression whose type corresponds logical formula analogous proof formula examples example consider proof theorem lambda calculus type identity function λ x x combinatory logic identity function obtained applying λ fgx fx gx twice k λ xy x k k description proof says following steps used prove general procedure whenever program contains application form p q steps followed complicated example let look theorem corresponds b function type b β → α → γ → β → γ → α b equivalent k k roadmap proof theorem β → α → γ → β → γ → α first step construct k make antecedent k axiom look like axiom set α equal equal avoid variable collisions since antecedent consequent detached using modus ponens theorem corresponds type k apply expression taking follows put yielding detach consequent formula type k special case theorem last formula must applied k. specialize k time replacing antecedent prior formula detaching consequent switching names variables gives us remained prove diagram gives proof natural deduction shows interpreted λ -expression λ λ b λ g b g type recently isomorphism proposed way define search space partition genetic programming method indexes sets genotypes program trees evolved gp system curry–howard isomorphic proof referred species correspondences listed go much farther deeper example cartesian closed categories generalized closed monoidal categories internal language categories linear type system corresponding linear logic generalizes simply-typed lambda calculus internal language cartesian closed categories moreover shown correspond cobordisms play vital role string theory extended set equivalences also explored homotopy type theory became active area research around 2013 still type theory extended univalence axiom equivalence equivalent equality permits homotopy type theory used foundation mathematics including set theory classical logic providing new ways discuss axiom choice many things curry–howard correspondence proofs elements inhabited types generalized notion homotopic equivalence proofs paths space identity type equality type type theory interpreted path
Programming language topics
magen security magen masking gateway enterprises information security technology designed ibm haifa research lab magen designed keep users viewing discrete chunks secret sensitive data screens authorized see magen applies sort inverse highlighting data question real time rendered screen allows eyes business logic implemented screen rather within affected application magen leverages combination optical character recognition screen scraping techniques
Computer security
futex computing futex short fast userspace mutex kernel system call programmers use implement basic locking building block higher-level locking abstractions semaphores posix mutexes condition variables futex consists kernelspace wait queue attached atomic integer userspace multiple processes threads operate integer entirely userspace using atomic operations avoid interfering one another resort relatively expensive system calls request operations wait queue example wake waiting processes put current process wait queue properly programmed futex-based lock use system calls except lock contended since operations require arbitration processes happen cases futex implemented 1995 beos also known benaphores https //www.haiku-os.org/legacy-docs/benewsletter/issue1-26.html linux hubertus franke ibm thomas j. watson research center matthew kirkwood ingo molnár red hat rusty russell ibm linux technology center originated futex mechanism futexes appeared first time version 2.5.7 linux kernel development series semantics stabilized version 2.5.40 futexes part linux kernel mainline since december 2003 release 2.6.x stable kernel series 2002 discussions took place proposal make futexes accessible via file system creating special node codice_1 codice_2 however linus torvalds strongly opposed idea rejected related patches may 2014 cve system announced vulnerability discovered linux kernel futex subsystem allowed denial-of-service attacks local privilege escalation may 2015 linux kernel introduced deadlock bug via commit b0c29f79ecea caused hang user applications bug affected many enterprise linux distributions including 3.x 4.x kernels red hat enterprise linux version 5 6 7 suse linux 12 amazon linux futexes implemented openbsd since 2016 futex mechanism one core concepts zircon kernel google fuchsia operating system since least april 2018 futexes two basic operations codice_3 codice_4 third operation called codice_5 available functions generic codice_4 operation move threads waiting queues
Operating systems
messaging pattern software architecture messaging pattern network-oriented architectural pattern describes two different parts message passing system connect communicate telecommunications message exchange pattern mep describes pattern messages required communications protocol establish use communication channel two major message exchange patterns — request–response pattern one-way pattern example http request–response pattern protocol udp one-way pattern term message exchange pattern specific meaning within simple object access protocol soap soap mep types include ømq message queueing library provides so-called sockets kind generalization traditional ip unix sockets require indicating messaging pattern used optimized pattern basic ømq patterns pattern defines particular network topology request-reply defines so-called service bus publish-subscribe defines data distribution tree push-pull defines parallelised pipeline patterns deliberately designed way infinitely scalable thus usable internet scale
Distributed computing architecture
billion laughs attack computer security billion laughs attack type denial-of-service dos attack aimed parsers xml documents also referred xml bomb exponential entity expansion attack example attack consists defining 10 entities defined consisting 10 previous entity document consisting single instance largest entity expands one billion copies first entity frequently cited example first entity string lol hence name billion laughs amount computer memory used would likely exceed available process parsing xml certainly would time vulnerability first reported original form attack aimed specifically xml parsers term may applicable similar subjects well problem first reported early 2002 began widely addressed 2008 defenses kind attack include capping memory allocated individual parser loss document acceptable treating entities symbolically expanding lazily extent content used xml version= 1.0 doctype lolz lolz lol9 /lolz xml parser loads document sees includes one root element lolz contains text lol9 however lol9 defined entity expands string containing ten lol8 strings lol8 string defined entity expands ten lol7 strings entity expansions processed small 1 kb block xml actually contain 10 billion lol taking almost 3 gigabytes memory billion laughs attack described takes exponential amount space quadratic blowup variation causes quadratic growth storage requirements simply repeating large entity avoid countermeasures detect heavily nested entities see computational complexity theory comparisons different growth classes billion laughs attack exist file format contain references example yaml bomb lol lol lol lol lol lol lol lol lol b b *a *a *a *a *a *a *a *a *a c c *b *b *b *b *b *b *b *b *b *c *c *c *c *c *c *c *c *c e e *d *d *d *d *d *d *d *d *d f f *e *e *e *e *e *e *e *e *e g g *f *f *f *f *f *f *f *f *f h h *g *g *g *g *g *g *g *g *g *h *h *h *h *h *h *h *h *h reason file formats allow references often preferred data arriving untrusted sources
Computer security
list powerpc processors following list powerpc processors 32-bit 64-bit powerpc processors favorite embedded computer designers keep costs low high-volume competitive products cpu core usually bundled system-on-chip soc integrated circuit socs contain processor core cache processor local data on-chip along clocking timers memory sdram peripheral network serial i/o bus pci pci-x rom/flash bus i2c controllers ibm also offers open bus architecture called coreconnect facilitate connection processor core memory peripherals soc design ibm motorola competed along parallel development lines overlapping markets later development book e powerpc specification implemented ibm freescale semiconductor defines embedded extensions powerpc programming model northbridge host bridge powerpc cpu integrated circuit ic interfacing powerpc cpu memory southbridge ic northbridge also provide interface accelerated graphics ports agp bus peripheral component interconnect pci pci-x pci express hypertransport bus specific northbridge ic must used powerpc cpu impossible use northbridge intel amd x86 cpu powerpc cpu however possible use certain types x86 southbridge powerpc based motherboards example via 686b amd geode cs5536 list northbridge powerpc
Computer architecture
ca anti-spyware ca anti-spyware spyware detection program distributed ca inc. 2007 known pestpatrol product offered total defense inc. named total defense anti-virus pestpatrol inc. carlisle pa based software company founded dr. david stang robert bales developed pestpatrol released first version 2000 originally called safersite company changed name 2002 better reflect focus company pestpatrol anti-malware product designed protect computer system threats adware spyware viruses performed automated scans system hard disks windows registry crucial system areas enabled manual scans specific threats selected long list known malicious software among unique features cookiepatrol purges spyware cookies keypatrol detects keyloggers unlike anti-spyware programs designed home use single desktop pestpatrol also provided solution network environments found enterprises among features made appealing enterprise security administrators ability manage networked desktops remotely early versions product criticized poor user interface described alternatively something looks like application ported os/2 unclear buttons clunky text-based ui reviewers praised malware detection removal capabilities stating pestpatrol effective anti-spyware system short switch linux 've ever used described infoworld one established brands anti-spyware 2002 selected security product year network world cited ability detect remove 60,000 types malware defenses remote administration tools rats billing authority spyware protection licensed signature files use yahoo companion others 2003 along anti-spyware anti-malware companies webroot lavasoft aluria formed industry consortium fight malware called consortium antispyware technology coast computer associates ca technologies bought pestpatrol 2004 made part etrust computer security line includes virus scanner firewall using newly acquired technology ca created bundle named ca integrated threat management itm consisted anti-virus solution pestpatrol anti-spyware renamed ca anti-spyware 2007 program bought separately part ca internet security 2007 ca anti-spyware team instrumental exposing fact facebook collecting personal information users without knowledge even users opted facebook ill-fated beacon program even users logged facebook
Computer security
reliable event logging protocol reliable event logging protocol relp networking protocol computer data logging computer networks extends functionality syslog protocol provide reliable delivery event messages often used environments tolerate message loss financial industry relp uses tcp message transmission provides basic protection message loss guarantee delivery circumstances connection aborts tcp reliably detect whether last messages sent actually reached destination unlike syslog protocol relp works backchannel conveys information back sender messages processed receiver enables relp always know messages properly received even case connection abort relp developed 2008 reliable protocol rsyslog-to-rsyslog communication relp designer rainer gerhards explains lack reliable transmission industry-standard syslog core motivation create relp originally rfc 3195 syslog considered take part rsyslog suffered high overhead missing support new ietf syslog standards since published rfc 5424 named time relp initially meant solely rsyslog use became adopted widely currently tools linux windows support relp also in-house deployments java relp still formally standardized evolved industry standard computer logging relp inspired rfc 3195 syslog rfc 3080 initial connection sender receiver negotiate session options like supported command set application level window size network event messages transferred commands receiver acknowledges command soon processed sessions may closed sender receiver usually terminated sender side order facilitate message recovery session aborts relp keeps transaction numbers command negotiates messages need resent session reestablishment current version relp specify native tls support however practical deployments use wrappers around relp session order provide functionality publicly available implementations listed list exhaustive
Internet protocols
cloud communications cloud communications internet-based voice data communications telecommunications applications switching storage hosted third-party outside organization using accessed public internet cloud services broad term referring primarily data-center-hosted services run accessed internet infrastructure recently services data-centric evolution voip voice internet protocol voice become part cloud phenomenon cloud telephony also known hosted telephony refers specifically voice services specifically replacement conventional business telephone equipment private branch exchange pbx third-party voip service cloud communications providers deliver voice data communications applications services hosting servers providers maintain giving customers access “ cloud. ” pay services applications use customers cost-effective reliable secure communications environment without headaches associated conventional pbx system deployment companies cut costs cloud communications services without sacrificing features success google others cloud-based providers demonstrated cloud-based platform effective software-based platform much lower cost voice services delivered cloud increases value hosted telephony users equally well turn cloud-based offering instead relying facilities-based service provider hosted voip expands options beyond local regional carriers past businesses able services telecommunication cloud communications attractive cloud become platform voice data video hosted services built around voice usually referred hosted voip cloud communications environment serves platform upon modes seamlessly work well integrate three trends enterprise communications pushing users access cloud allowing device choose development traditional communications infrastructure designed handle first trend increasingly distributed company operations branches home offices making wide area networks cumbersome inefficient costly second communications devices need access enterprise networks – iphones printers voip handsets example third data centers housing enterprise assets applications consolidating often located managed remotely cloud telephony services predominantly used business processes advertising e-commerce human resources payments processing services include distributed call centers economical teleworking scale services features functionality expected evolve even coming years embrace mobilisation facilitate direct collaboration streamline communications small medium-sized business capital investment set voip infrastructure in-house could high compared potential return cloud telephony could offer services lower-cost subscription basis cloud telephony provider also expert technology whereas small business unlikely employee level expertise justify expense full-time telecommunication infrastructure position traditional telephony applications required on-premises maintenance pbx great deal wiring main distribution frame mdf cloud communications promoted help businesses collaboration scalability supporting access via multiple locations devices cloud technology still must exist physical servers physical location servers important many nation laws cloud telephony companies provide hosted off-site software versions services previously constructed on-site hardware also allow users geographically distributed since voice traffic moves internet examples include
Distributed computing architecture
jim geovedi jim geovedi born 28 june 1979 security expert indonesia focuses discovery computer network security vulnerabilities bbc news described guy n't look like bond villain ... possesses secrets might kill geovedi co-founded ran several security consulting companies 2001 co-founded c2pro consulting providing general consulting mostly government agencies 2004 co-founded bellua asia pacific renamed xynexis international later 2010 noosc global managed security services company part hackers group began 1996 called w00w00 met future co-founder bellua anthony zboralski currently based london interviewed issues including satellite security system banking security law enforcement geovedi also professional dj music producer currently signed elektrax recordings sydney-based techno label geovedi born bandarlampung lampung indonesia graduating high school 1998-1999 found living street without steady work later managed teach computer security programming despite lacking formal education field media often use example people become successful industry relying empirical knowledge acumen even without holding university degrees arsenal fan also fan death metal grindcore music interview beritagar 2013 geovedi revealed fan napalm death brutal truth cannibal corpse deicide
Computer security
florant florant public access web-based database flora northern territory provides authoritative scientific information 4300 native taxa including descriptions maps images conservation status nomenclatural details together names used various aboriginal groups alien taxa 470 species also recorded users access fact sheets species details specimens held northern territory herbarium herbaria codes nt dna together keys regional factsheets distribution guides florant uses ibra version 5.1 botanical regions conservation act nt flora fauna territory parks wildlife conservation act 1976 twpca uses iucn criteria categories
Databases
playstation 3 playstation 3 officially abbreviated ps3 home video game console developed sony computer entertainment successor playstation 2 part playstation brand consoles first released november 11 2006 japan november 17 2006 north america march 23 2007 europe australia playstation 3 competed mainly consoles microsoft xbox 360 nintendo wii part seventh generation video game consoles console first officially announced e3 2005 released end 2006 first console use blu-ray disc primary storage medium console first playstation integrate social gaming services including playstation network well first controllable handheld console remote connectivity playstation portable playstation vita september 2009 slim model playstation 3 released longer provided hardware ability run ps2 games lighter thinner original version featured redesigned logo marketing design well minor start-up change software super slim variation released late 2012 refining redesigning console early years system critically negative reception due high price 599 60 gigabyte model 499 20 gb model complex processor architecture lack quality games praised blu-ray capabilities untapped potential reception would get positive time system slow start market managed recover particularly introduction slim model successor playstation 4 released later november 2013 september 29 2015 sony confirmed sales playstation 3 discontinued new zealand system remained production markets shipments new units europe australia ended march 2016 followed north america ended october 2016 heading 2017 japan last territory new units still produced may 29 2017 sony confirmed playstation 3 discontinued japan playstation 3 began development 2001 ken kutaragi president sony computer entertainment announced sony toshiba ibm would collaborate developing cell microprocessor time shuhei yoshida led group programmers within hardware team explore next-generation game creation early 2005 focus within sony shifted towards developing ps3 launch titles sony officially unveiled playstation 3 public may 16 2005 e3 2005 along boomerang-shaped prototype design sixaxis controller functional version system present tokyo game show september 2005 although demonstrations held events software development kits comparable personal computer hardware video footage based predicted playstation 3 specifications also shown notably final fantasy vii tech demo initial prototype shown may 2005 featured two hdmi ports three ethernet ports six usb ports however system shown year later e3 2006 reduced one hdmi port one ethernet port four usb ports presumably cut costs two hardware configurations also announced console 20 gb model 60 gb model priced us 499 €499 us 599 €599 respectively 60 gb model configuration feature hdmi port wi-fi internet flash card readers chrome trim logo silver models announced simultaneous worldwide release november 11 2006 japan november 17 2006 north america europe september 6 2006 sony announced pal region playstation 3 launch would delayed march 2007 shortage materials used blu-ray drive tokyo game show september 22 2006 sony announced would include hdmi port 20 gb system chrome trim flash card readers silver logo wi-fi would included also launch price japanese 20 gb model reduced 20 60 gb model announced open pricing scheme japan event sony showed 27 playable ps3 games running final hardware playstation 3 first released japan november 11 2006 07:00 according media create 81,639 ps3 systems sold within 24 hours introduction japan soon release japan ps3 released north america november 17 2006 reports violence surrounded release ps3 customer shot campers robbed gunpoint customers shot drive-by shooting bb guns 60 campers fought 10 systems console originally planned global release november start september release europe rest world delayed march somewhat last-minute delay companies taken deposits pre-orders sony informed customers eligible full refunds could continue pre-order january 24 2007 sony announced playstation 3 would go sale march 23 2007 europe australia middle east africa new zealand system sold 600,000 units first two days march 7 2007 60 gb playstation 3 launched singapore price 799 console launched south korea june 16 2007 single version equipped 80 gb hard drive iptv following speculation sony working 'slim model sony officially announced ps3 cech-2000 model august 18 2009 sony gamescom press conference new features included slimmer form factor decreased power consumption quieter cooling system released major territories september 2009 time new logo introduced console replace previous spider-man wordmarks named due use font logos sony then-current spider-man films new ps3 wordmark evoking design playstation 2 wordmark replacing capitalized playstation 3 lettering september 2012 tokyo game show sony announced new slimmer ps3 redesign cech-4000 due release late 2012 would available either 250 gb 500 gb hard drive three versions super slim model revealed one 500 gb hard drive second 250 gb hard drive available pal regions third 12 gb flash storage available pal regions canada storage 12 gb model upgradable official standalone 250 gb hard drive vertical stand also released model united kingdom 500 gb model released september 28 2012 12 gb model released october 12 2012 united states ps3 super slim first released bundled console 250 gb model bundled game year edition released september 25 2012 500 gb model bundled assassin creed iii released october 30 2012 japan black colored super slim model released october 4 2012 white colored super slim model released november 22 2012 super slim model 20 percent smaller 25 percent lighter slim model features manual sliding disc cover instead motorized slot-loading disc cover slim model white colored super slim model released united states january 27 2013 part instant game collection bundle garnet red azurite blue colored models launched japan february 28 2013 garnet red version released north america march 12 2013 part bundle 500 gb storage contained god war ascension well god war saga azurite blue model released gamestop exclusive 250gb storage playstation 3 launched north america 14 titles another three released end 2006 first week sales confirmed insomniac games top-selling launch game north america game heavily praised numerous video game websites including gamespot ign awarded playstation 3 game year award 2006 titles missed launch window delayed early 2007 f.e.a.r sonic hedgehog japanese launch ridge racer 7 top-selling game also fared well sales offerings namco bandai games playstation 3 launched europe 24 titles including ones offered north american japanese launches formula one championship edition motorstorm virtua fighter 5 motorstorm successful titles 2007 games subsequently received sequels form resistance 2 e3 2007 sony able show number upcoming video games playstation 3 including heavenly sword lair warhawk released third fourth quarters 2007 also showed number titles set release 2008 2009 notably killzone 2 infamous gran turismo 5 prologue littlebigplanet number third-party exclusives also shown including highly anticipated alongside high-profile third-party titles grand theft auto iv assassin creed devil may cry 4 resident evil 5 two important titles playstation 3 final fantasy xiii final fantasy versus xiii shown tgs 2007 order appease japanese market sony since launched budget range playstation 3 titles known greatest hits range north america platinum range europe australia best range japan among titles available budget range include motorstorm call duty 3 assassin creed ninja gaiden sigma october 2009 devil may cry 4 army two also joined list 595 million games sold playstation 3 best selling ps3 games grand theft auto v gran turismo 5 last us last game released playstation 3 fifa 19 september 28 2018 december 2008 cto blitz games announced would bring stereoscopic 3d gaming movie viewing xbox 360 playstation 3 technology first demonstrated publicly ps3 using sony technology january 2009 consumer electronics show journalists shown wipeout hd gran turismo 5 prologue 3d demonstration technology might work implemented future firmware update 3.30 officially allowed ps3 titles played 3d requiring compatible display use system software update 3.50 prepared 3d films game must programmed take advantage 3d technology titles may patched add functionality retroactively titles patches include wipeout hd pain super stardust hd playstation 3 convex left side playstation logo upright vertical top side convex horizontal glossy black finish playstation designer teiyu goto stated spider-man-font-inspired logo one first elements scei president ken kutaragi decided logo may motivating force behind shape ps3 march 22 2007 sce stanford university released folding home software playstation 3 program allows ps3 owners lend computing power consoles help study process protein folding disease research ps3 hardware also used build supercomputers high-performance computing fixstars solutions sells version yellow dog linux playstation 3 originally sold terra soft solutions rapidmind produced stream programming package ps3 acquired intel 2009 also january 3 2007 dr. frank mueller associate professor computer science ncsu clustered 8 ps3s mueller commented 256 mb system ram limitation particular application considering attempting retrofit ram software includes fedora core 5 linux ppc64 mpich2 openmp v 2.5 gnu compiler collection cellsdk 1.1 cost-effective alternative conventional supercomputers u.s. military purchased clusters ps3 units research purposes retail ps3 slim units used supercomputing ps3 slim lacks ability boot third-party os december 2008 group hackers used cluster 200 playstation 3 computers crack ssl authentication november 2010 air force research laboratory afrl created powerful supercomputer connecting together 1,760 sony ps3s include 168 separate graphical processing units 84 coordinating servers parallel array capable performing 500 trillion floating-point operations per second 500 tflops built condor cluster 33rd largest supercomputer world would used analyze high definition satellite imagery playstation 3 features slot-loading 2x speed blu-ray disc drive games blu-ray movies dvds cds optical media originally available hard drives 20 60 gb 20 gb model available pal regions various sizes 500 gb made available since see model comparison ps3 models user-upgradeable 2.5 sata hard drives playstation 3 uses cell microprocessor designed sony toshiba ibm cpu made one 3.2 ghz powerpc-based power processing element ppe eight synergistic processing elements spes eighth spe disabled improve chip yields six seven spes accessible developers seventh spe reserved console operating system graphics processing handled nvidia rsx 'reality synthesizer produce resolutions 480i/576i sd 1080p hd playstation 3 256 mb xdr dram main memory 256 mb gddr3 video memory rsx system bluetooth 2.0 support seven bluetooth devices gigabit ethernet usb 2.0 hdmi 1.4 built wi-fi networking also built-in 20 gb models flash card reader compatible memory stick sd/mmc compactflash/microdrive media built-in 60 gb cechexx 80 gb models playstation 3 produced various models original slim super slim successive models added removed various features numerous accessories console developed accessories include wireless sixaxis dualshock 3 controllers logitech driving force gt logitech cordless precision controller bd remote playstation eye camera playtv dvb-t tuner/digital video recorder accessory sony e3 press conference 2006 standard wireless sixaxis controller announced controller based basic design playstation 2 dualshock 2 controller wireless lacked vibration capabilities built-in accelerometer could detect motion three directional three rotational axes six total hence name sixaxis cosmetic tweaks press conference 2007 tokyo game show sony announced dualshock 3 trademarked dualshock 3 playstation 3 controller function design sixaxis vibration capability included hands-on accounts describe controller noticeably heavier standard sixaxis controller capable vibration forces comparable dualshock 2 released japan november 11 2007 north america april 5 2008 australia april 24 2008 new zealand may 9 2008 mainland europe july 2 2008 united kingdom ireland july 4 2008 e3 2009 sony unveiled plans release motion controller later named playstation move gdc 2010 released september 15 2010 europe september 19 2010 north america october 21 2010 japan october 13 2010 sony announced official surround sound system ps3 official playstation youtube channel playstation 3 also use dualshock 4 controller initially via usb cable firmware update 4.60 enabled wireless connection according ars technica number playstation 3 consoles experienced failure well within normal failure rates consumer electronics industry 2009 study squaretrade warranty provider found two-year failure rate 10 playstation 3s september 2009 bbc watchdog television program aired report investigating issue calling yellow light death ylod among consoles experienced failure found usually occurred 18–24 months purchase standard sony warranty covers one year purchase time period playstation 3 owners pay sony fixed fee refurbished console sony claimed according statistics returned consoles approximately 0.5 consoles reported showing ylod response televised report sony issued document criticizing program accuracy conclusions specifically faults evidence manufacturing defect document also complained report inappropriate tone might damage sony brand name sony included ability operating system referred system software updated updates acquired several ways original playstation 3 also included ability install operating systems linux included newer slim models removed older playstation 3 consoles release firmware update 3.21 april 2010 functionality available users original consoles choose update system software beyond version 3.15 installed third-party modified unofficial versions firmware instead standard playstation 3 version xrossmediabar pronounced cross media bar abbreviated xmb includes nine categories options users settings photo music video tv/video services game network playstation network friends similar playstation portable media bar tv/video services category services like netflix and/or playtv torne installed first category section channels lets users download various streaming services including sony streaming services crackle playstation vue default new section playstation network displayed system starts ps3 includes ability store various master secondary user profiles manage explore photos without musical slide show play music copy audio cd tracks attached data storage device play movies video files hard disk drive optical disc blu-ray disc dvd-video optional usb mass storage flash card compatibility usb keyboard mouse web browser supporting compatible-file download function additionally upnp media appear respective audio/video/photo categories compatible media server dlna server detected local network friends menu allows mail emoticon attached picture features video chat requires optional playstation eye eyetoy webcam network menu allows online shopping playstation store connectivity playstation portable via remote play playstation 3 console protects certain types data uses digital rights management limit data use purchased games content playstation network store governed playstation network digital rights management ndrm ndrm allows users access data 2 different playstation 3 activated using user playstation network id playstation 3 also limits transfer copy protected videos downloaded store machines states copy protected video may restore correctly following certain actions making backup downloading new copy protected movie photo gallery optional application view create group photos ps3 installed separately system software 105 mb introduced system software version 2.60 provides range tools sorting displaying system pictures key feature application organize photos groups according various criteria notable categorizations colors ages facial expressions people photos slideshows viewed application along music playlists software updated release system software version 3.40 allowing users upload browse photos facebook picasa playmemories optional stereoscopic 3d also standard photo viewing application installed playstation store 956 mb application dedicated specifically 3d photos features ability zoom 3d environments change angle perspective panoramas requires system software 3.40 higher 3d photos 3d hdtv hdmi cable 3d images viewed properly new application released part system software version 3.40 allows users edit videos playstation 3 upload internet software features basic video editing tools including ability cut videos add music captions videos rendered uploaded video sharing websites facebook youtube addition video service provided sony entertainment network playstation 3 console access variety third party video services dependent region since june 2009 vidzone offered free music video streaming service europe australia new zealand october 2009 sony computer entertainment netflix announced netflix streaming service would also available playstation 3 united states paid netflix subscription required service service became available november 2009 initially users use free blu-ray disc access service however october 2010 requirement use disc gain access removed april 2010 support mlb.tv added allowing mlb.tv subscribers watch regular season games live hd access new interactive features designed exclusively psn november 2010 access video social networking site mubi enabled european new zealand australian users service integrates elements social networking rental subscription video streaming allowing users watch discuss films users also november 2010 video rental service vudu nhl gamecenter live subscription service hulu plus launched playstation 3 united states august 2011 sony partnership directv added nfl sunday ticket october 2011 best buy launched app cinemanow service april 2012 amazon.com launched amazon video app accessible amazon prime subscribers us upon reviewing playstation netflix collaboration pocket-lint said 've used netflix app xbox good think ps3 version might edge stated netflix lovefilm playstation mind-blowingly good july 2013 yupptv ott player launched branded application ps3 computer entertainment system united states playstation 3 initially shipped ability install alternative operating system alongside main system software linux unix-based operating systems available hardware allowed access six seven synergistic processing elements cell microprocessor rsx 'reality synthesizer graphics chip 'otheros functionality present updated ps slim models feature subsequently removed previous versions ps3 part machine firmware update version 3.21 released april 1 2010 sony cited security concerns rationale firmware update 3.21 mandatory access playstation network removal caused controversy update removed officially advertised features already sold products gave rise several class action lawsuits aimed making sony return feature provide compensation december 8 2011 u.s. district judge richard seeborg dismissed last remaining count class action lawsuit claims suit previously dismissed stating legal matter ... plaintiffs failed allege facts articulate theory sony may held liable u.s. court appeals ninth circuit partially reversed dismissal sent case back district court march 1 2010 utc many original fat playstation 3 models worldwide experiencing errors related internal system clock error many symptoms initially main problem seemed inability connect playstation network however root cause problem unrelated playstation network since even users never online also problems playing installed offline games queried system timer part startup using system themes time many users noted console clock gone back december 31 1999 event nicknamed apocalyps3 play word apocalypse ps3 abbreviation playstation 3 console error code displayed typically 8001050f affected users unable sign play games use dynamic themes view/sync trophies problem resided within 1st 3rd generation original ps3 units newer slim models unaffected different internal hardware clock sony confirmed error stated narrowing issue continuing work restore service march 2 utc 2010 owners original ps3 models could connect psn successfully clock longer showed december 31 1999 sony stated affected models incorrectly identified 2010 leap year bug bcd method storing date however users hardware operating system clock mainly updated internet associated internal clock needed updated manually re-syncing via internet june 29 2010 sony released ps3 system software update 3.40 improved functionality internal clock properly account leap years playstation portable connect playstation 3 many ways including in-game connectivity example formula one championship edition racing game shown e3 2006 using psp real-time rear-view mirror addition users able download original playstation format games playstation store transfer play psp well ps3 also possible use remote play feature play playstation network games remotely psp network internet connection sony also demonstrated psp playing back video content playstation 3 hard disk across ad hoc wireless network feature referred remote play located browser icon playstation 3 playstation portable remote play since expanded allow remote access ps3 via psp wireless access point world playstation network unified online multiplayer gaming digital media delivery service provided sony computer entertainment playstation 3 playstation portable announced 2006 playstation business briefing meeting tokyo service always connected free includes multiplayer support network enables online gaming playstation store playstation home services playstation network uses real currency playstation network cards seen playstation store playstation home playstation plus commonly abbreviated ps+ occasionally referred psn plus premium playstation network subscription service officially unveiled e3 2010 jack tretton president ceo scea rumors service speculation since kaz hirai announcement tgs 2009 possible paid service psn current psn service still available launched alongside ps3 firmware 3.40 psp firmware 6.30 june 29 2010 paid-for subscription service provides users enhanced services playstation network top current psn service still available features enhancements include ability demos game updates download automatically playstation 3 subscribers also get early exclusive access betas game demos premium downloadable content playstation store items north american users also get free subscription qore users may choose purchase either one-year three-month subscription playstation plus playstation store online virtual market available users sony playstation 3 ps3 playstation portable psp game consoles via playstation network store offers range downloadable content purchase available free charge available content includes full games add-on content playable demos themes game movie trailers service accessible icon xmb ps3 psp ps3 store also accessed psp via remote play connection ps3 psp store also available via pc application media go 600 million downloads playstation store worldwide playstation store updated new content tuesday north america wednesday pal regions may 2010 changed thursdays allow psp games released digitally closer time released umd new announced gamescom 2009 released september 1 2009 playstation 3 system software 3.0 feature replace existing information board displayed news playstation website associated user region concept developed major playstation network feature interacts status indicator display ticker content excluding recently played content currently north america japan system displays new screen default instead games menu video menu movie inserted starting new four sections pick recently played latest information new content available playstation store four kinds content new screen displays links sections recently played displays user recently played games online services whereas sections contain website links links play videos access selected sections playstation store playstation store icons game video section act similarly new screen except display link games videos playstation store respectively playstation home virtual 3d social networking service playstation network home allowed users create custom avatar could groomed realistically users could edit decorate personal apartments avatars club houses free premium content users could shop new items win prizes ps3 games home activities users could interact connect friends customize content virtual world home also acted meeting place users wanted play multiplayer video games others closed beta began europe may 2007 expanded territories soon home delayed expanded several times initially releasing open beta test started december 11 2008 remained perpetual beta closure march 31 2015 home available directly playstation 3 xrossmediabar membership free required psn account home featured places meet interact dedicated game spaces developer spaces company spaces events service underwent weekly maintenance frequent updates time closure march 2015 home downloaded 41 million users life playstation released september 18 2008 succeed folding home retired november 6 2012 life playstation used virtual globe data display news information city along folding home functionality application provided access three information channels first live channel offering news headlines weather provided google news weather channel university wisconsin–madison space science engineering center among sources second channel world heritage channel offered historical information historical sites third channel united village channel united village designed share information communities cultures worldwide update allowed video photo viewing application fourth channel u.s. exclusive playstation network game trailers channel direct streaming game trailers april 20 2011 sony shut playstation network qriocity prolonged interval revealing april 23 due external intrusion system sony later revealed personal information 77 million users might taken including names addresses countries email addresses birthdates psn/qriocity logins passwords handles/psn online ids. ref name= psn/qriocity service update /ref also stated possible users profile data including purchase history billing address playstation network/qriocity password security answers may obtained evidence credit card data taken possibility could ruled sony advised customers credit card data may obtained additionally credit card numbers encrypted sony never collected three digit cvc csc number back credit cards required authenticating transactions response incident sony announced welcome back program 30 days free membership playstation plus psn members two free downloadable ps3 games free one-year enrollment identity theft protection program although playstation predecessors dominant competition hugely profitable sony playstation 3 inauspicious start sony chairman ceo sir howard stringer initially could convince investors turnaround fortunes ps3 lacked unique gameplay affordable wii became generation successful console terms units sold furthermore ps3 compete directly xbox 360 market head start result platform longer exclusive titles ps2 enjoyed grand theft auto final fantasy series regarding cross-platform games xbox 360 versions generally considered superior 2006 although 2008 ps3 versions reached parity surpassed took longer expected ps3 enjoy strong sales close gap xbox 360 sony also continued lose money ps3 sold 2010 although redesigned slim ps3 cut losses since playstation 3 initial production cost estimated isuppli us 805.85 20 gb model us 840.35 60 gb model however priced us 499 us 599 respectively meaning units may sold estimated loss 306 241 depending model cost estimates correct thus may contributed sony games division posting operating loss ¥232.3 billion us 1.97 billion fiscal year ending march 2007 april 2007 soon results published ken kutaragi president sony computer entertainment announced plans retire various news agencies including times wall street journal reported due poor sales scei maintains kutaragi planning retirement six months prior announcement january 2008 kaz hirai ceo sony computer entertainment suggested console may start making profit early 2009 stating next fiscal year starts april try achieve next fiscal year would great thing profitability definite commitment would like try shoot however market analysts nikko citigroup predicted playstation 3 could profitable august 2008 july 2008 interview hirai stated objective playstation 3 sell 150 million units ninth year surpassing playstation 2 sales 140 million nine years market january 2009 sony announced gaming division profitable q3 2008 since system launch production costs reduced significantly result phasing emotion engine chip falling hardware costs cost manufacturing cell microprocessors fallen dramatically result moving 65 nm production process blu-ray disc diodes become cheaper manufacture january 2008 unit cost around 400 manufacture august 2009 sony reduced costs total 70 meaning costs sony around 240 per unit early playstation 3 reviews launch critical high price lack quality games game developers regarded architecture difficult program ps3 however commended hardware including blu-ray home theater capabilities graphics potential critical commercial reception ps3 improved time series price revisions blu-ray victory hd dvd release several well received titles ars technica original launch review gave ps3 6/10 second review console june 2008 rated 9/10 september 2009 ign named playstation 3 15th best gaming console time behind competitors wii 10th xbox 360 6th however ps3 ign console showdown —based console offers best selection games released year—in three four years since began 2008 2009 2011 xbox winning 2010 ign judged playstation 3 best game line-up 2008 based review scores comparison wii xbox 360 comparison piece pc magazine greenwald june 2012 ps3 selected overall better console compared xbox 360 pocket-lint said console ps3 always brilliant games console best media device money ps3 given number-eight spot pc world magazine list top 21 tech screwups 2006 criticized late expensive incompatible gamesradar ranked ps3 top item feature game-related pr disasters asking sony managed take one anticipated game systems time — within space year — turn hate object reviled entire internet added despite problems system untapped potential business week summed general opinion stating impressed playstation 3 could currently developers also found machine difficult program 2007 gabe newell valve said ps3 total disaster many levels think really clear sony lost track customers developers wanted continued 'd say even late date cancel say 'this horrible disaster 're sorry 're going stop selling stop trying convince people develop doug lombardi vp marketing valve since stated valve interested developing console looking hire talented ps3 programmers future projects later restated valve position ability get ps3 team together find people want come valve valve want work n't really see us moving platform sony e3 2010 press conference newell made live appearance recant previous statements citing sony move make system developer friendly announce valve would developing portal 2 system also claimed inclusion steamworks valve system automatically update software independently would help make ps3 version portal 2 best console version market activision blizzard ceo bobby kotick criticized ps3 high development costs inferior attach rate return xbox 360 wii believes factors pushing developers away working console interview times kotick stated 'm getting concerned sony playstation 3 losing bit momentum n't make easy support platform continued expensive develop console wii xbox selling better games generate better return invested capital roic xbox playstation kotick also claimed activision blizzard may stop supporting system situation addressed sony cut ps3 retail price n't attach rates likely slow realistic might stop supporting sony kotick received heavy criticism statement notably developer bioware questioned wisdom threatened move referred statement silly despite initial negative press several websites given system good reviews mostly regarding hardware cnet united kingdom praised system saying ps3 versatile impressive piece home-entertainment equipment lives hype ... ps3 well worth hefty price tag cnet awarded score 8.8 10 voted number one must-have gadget praising robust graphical capabilities stylish exterior design criticizing limited selection available games addition home theater magazine ultimate av given system blu-ray playback favorable reviews stating quality playback exceeds many current standalone blu-ray disc players interview kazuo hirai chairman sony computer entertainment argued choice complex architecture hexus gaming reviewed pal version summed review saying playstation 3 matures developers start really pushing 'll see playstation 3 emerge console choice gaming gdc 2007 shiny entertainment founder dave perry stated think sony made best machine best piece hardware without question playstation 3 slim received extremely positive reviews well boost sales less 24 hours announcement ps3 slim took number-one bestseller spot amazon.com video games section fifteen consecutive days regained number-one position one day later ps3 slim also received praise pc world giving 90 100 praising new repackaging new value brings lower price well praising quietness reduction power consumption stark contrast original ps3 launch given position number-eight top 21 tech screwups 2006 list cnet awarded ps3 slim four five stars praising blu-ray capabilities 120 gb hard drive free online gaming service affordable pricing point complained lack backward compatibility playstation 2 games techradar gave ps3 slim four half stars five praising new smaller size summed review stating ps3 slim phenomenal piece kit amazing something small much however criticized exterior design build quality relation original model eurogamer called product cost-cutting – large – tastefully done said nothing short massive win sony super slim model ps3 received positive reviews gaming website spong praised new super slim quietness stating noticeable noise comes drive seeks new area disc starting load game occurs infrequently added fans quieter slim went praise new smaller lighter size criticism placed new disc loader stating cover moved hand wish also eject button work software eject triangle button menus xross media bar xmb interface addition close cover hand bit fiddly upright ps3 wo n't start reading disc unless close cover also said real drop retail price tech media website cnet gave new super slim 4 5 stars excellent saying super slim playstation 3 shrinks powerful gaming machine even tinier package maintaining features predecessors great gaming library strong array streaming services ... whilst also criticising cheap design disc-loader stating sometimes cover n't catch feel like 're using one old credit card imprinter machines short feels cheap n't realize convenient autoloading disc trays 're gone whether cut costs save space move ultimately step back criticism also due price stating cheapest super slim model still expensive cheapest slim model smaller size bigger hard drive n't considered upgrade hard drive slim model easily removed replaced praise hard drive super slim model easiest yet simply sliding side panel reveals drive bay quickly unscrewed also stated whilst super slim model way upgrade could indicator come may revolutionary super slim ps3 impressive machine much smaller package n't seem reason existing ps3 owners upgrade prospective ps3 buyer super slim probably way go deal slot-loading disc drive pocket-lint gave super slim positive review saying much affordable brilliant gaming second-to-none video media player think blinding good console one serve years come second-hand games even new releases without doubt n't ps3 time buy gave super slim 4 half stars 5 technology magazine t3 gave super slim model positive review stating console almost nostalgic design similarities original fat model n't know whether play ps3 games blu-ray discs differently yet look feel new ps3 slim obvious homage original ps3 minus considerable excess weight immediately would concerned durability top loading tray feels like could yanked straight console ultimately feels like sony nostalgic way signing current generation console anticipation ps4 official websites auxiliary sites sony directories
Computer architecture
cramfs compressed rom file system cramfs free gpl'ed read-only linux file system designed simplicity space-efficiency mainly used embedded small-footprint systems unlike compressed image conventional file system cramfs image used i.e without first decompressing reason linux distributions use cramfs initrd images debian 3.1 particular installation images suse linux particular constraints memory image size 2013 linux maintainers indicated cramfs made obsolete squashfs file system got rehabilitated 2017 use low-memory devices using squashfs may viable files cramfs file systems zlib-compressed one page time allow random read access metadata compressed expressed terse representation space-efficient conventional file systems file system intentionally read-only simplify design random write access compressed files difficult implement cramfs ships utility codice_1 pack files new cramfs images file sizes limited less 16mb maximum file system size little 272mb last file file system must begin 256mb block extend past
Computer file systems
frame injection frame injection attack attack internet explorer 5 internet explorer 6 internet explorer 7 load arbitrary code browser attack caused internet explorer checking destination resulting frame therefore allowing arbitrary code javascript vbscript also happens code gets injected frames due scripts validating input type frame injection affects browsers scripts validate untrusted input
Computer security
android application package android package apk package file format used android operating system distribution installation mobile apps middleware apk analogous software packages appx microsoft windows debian package debian-based operating systems make apk file program android first compiled parts packaged one container file apk file contains program code .dex files resources assets certificates manifest file case many file formats apk files name needed provided file name ends file extension .apk apk files used downgrade apps older file version i.e downgrade app version 78.9 55.1 uninstalling upgraded app installing older version via unknown sources setting settings see information done various reasons upgrade causing app repeatedly freeze and/or crash upgrade changing app drastically e.g background dark bright preferred features present changed hidden restoring/removing something upgrade removed installed apk file also solution installing apps/games limited restricted countries apk files type archive file specifically zip format-type packages based jar file format codice_1 filename extension mime type associated apk files codice_2 apk files installed android-powered devices like installing software pc user downloads android application using android device official source google play store automatically installed apk files also downloaded google play store without installation using non-android device either chrome firefox extension directly unofficial sites several android apps used process moving apk files different devices known also called apk sideloading apps include android file manager apps app orientation apps ... installation apk files outside google play disabled default users install unknown apk files enabling unknown sources accounts security settings user developer also install apk file directly device via download network desktop computer using communication program adb apk file archive usually contains following files directories
Operating systems
awstats awstats open source web analytics reporting tool suitable analyzing data internet services web streaming media mail ftp servers awstats parses analyzes server log files producing html reports data visually presented within reports tables bar graphs static reports created command line interface on-demand reporting supported web browser cgi program awstats supports major web server log file formats including apache ncsa combined/xlf/elf log format common log format clf webstar iis w3c log format many common web server log formats development moved sourceforge github 2014 written perl awstats deployed almost operating system server administration tool packages available linux distributions awstats installed workstation microsoft windows local use situations log files downloaded remote server awstats licensed gnu general public license gpl proper web log analysis tool configuration report interpretation requires bit technical business knowledge awstats support resources include documentation user community forums on-demand cgi program object security exploits case many cgi programs organizations wishing provide public access web analytics reports consider generating static html reports on-demand facility still used restricting use internal users precautions taken referrer spam referrer spam filtering functionality added version 6.5
Web technology
warp amp warp player must take control monster fighter must shoot tongue-sticking aliens named berobero space world without letting touch kills three berobero colour row mystery alien appear killed extra points warp zone centre screen flashes katakana text japanese version english text warp us versions possible monster fighter warp maze world berobero must killed time-delay bombs delay controlled long player holds button every time kills one bombs get stronger making easier monster fighter blow bombs returns space world powerups may appear levels allow player shoot exploding bullets attach bombs directly onto enemy aliens however exploding bullets present space world obtained maze world powerup attach bombs onto enemies maze world appears space world players must alternate turns controls arcade version multiplayer mode two players play simultaneously famicom version first player controls white warpman second player controls orange warpman shooting player warpman multiplayer game causes become unable move fire certain period time three aliens called arcade version famicom version killing three aliens color causes mystery alien appear three four famicom version types mystery aliens three original types worth 500 1000 2000 points respectively fourth type mystery alien leaves one letter word extra killed extra life awarded player obtains five letters points awarded killing generic aliens differ depending area screen killed color changes three areas aliens killed near center screen yield highest number points 120 killed near edges yield lowest number points 60 killed near area worth 90 points killing multiple aliens single bomb maze world also worth 500 bonus points arcade version high score erased whenever cabinet reset turned famicom version high score kept even game reset erased console turned round number indicated flags bottom-right corner screen stop updating 48th round like namco galaxian king balloon number flags shown subsequent levels similarly indicator showing number lives remaining bottom-left corner stops updating four lives player still gain extra lives five lives remaining game reaches 1,000,000 points score roll
Computer architecture
little snitch little snitch host-based application firewall macos used monitor applications preventing permitting connect attached networks advanced rules produced maintained austrian firm objective development software gmbh unlike stateful firewall designed primarily protect system external attacks restricting inbound traffic little snitch designed protect privacy limiting outbound traffic little snitch controls network traffic registering kernel extensions standard application programming interface api provided apple application process attempts establish network connection little snitch prevents connection dialog presented user allows one deny permit connection one-time permanent basis dialog allows one restrict parameters connection restricting specific port protocol domain little snitch integral network monitor allows one see ongoing traffic real time domain names traffic direction displayed application version 4 received positive 4.5/5 review macworld
Computer security
pa-risc pa-risc instruction set architecture isa developed hewlett-packard name implies reduced instruction set computer risc architecture pa stands precision architecture design also referred hp/pa hewlett packard precision architecture architecture introduced 26 february 1986 hp 3000 series 930 hp 9000 model 840 computers launched featuring first implementation ts1 pa-risc succeeded itanium originally ia-64 isa jointly developed hp intel hp stopped selling pa-risc-based hp 9000 systems end 2008 supported servers running pa-risc chips 2013 late 1980s hp building four series computers based cisc cpus one line ibm pc compatible intel i286-based vectra series started 1986 others non-intel systems one hp series 300 motorola 68000-based workstations another series 200 line technical workstations based custom silicon sapphire sos chip design sos based 16-bit hp 3000 classic series finally hp 9000 series 500 minicomputers based 16 32-bit focus microprocessor precision architecture result known inside hewlett-packard spectrum program hp planned use spectrum move non-pc compatible machines single risc cpu family first processors introduced 1986 thirty-two 32-bit integer registers sixteen 64-bit floating-point registers number floating-point registers doubled 1.1 version 32 became apparent 16 inadequate restricted performance architects included allen baum hans jeans michael j. mahon ruby bei-loh lee russel kao steve muchnick terrence c. miller david fotland william s. worley first implementation ts1 central processing unit built discrete transistor–transistor logic 74f ttl devices later implementations multi-chip vlsi designs fabricated nmos processes ns1 ns2 cmos cs1 pcx first used new series hp 3000 machines late 1980s – 930 950 commonly known time spectrum systems name given development labs machines ran mpe-xl hp 9000 machines soon upgraded pa-risc processor well running hp-ux version unix operating systems ported pa-risc architecture include linux openbsd netbsd nextstep interesting aspect pa-risc line generations level 2 cache instead large level 1 caches used formerly separate chips connected bus integrated on-chip pa-7100lc pa-7300lc l2 caches another innovation pa-risc addition vectorized instructions simd form max first introduced pa-7100lc precision risc organization industry group led hp founded 1992 promote pa-risc architecture members included convex hitachi hughes aircraft mitsubishi nec oki prime stratus yokogawa red brick software allegro consultants inc.. isa extended 1996 64 bits revision named pa-risc 2.0 pa-risc 2.0 also added fused multiply–add instructions help certain floating-point intensive algorithms max-2 simd extension provides instructions accelerating multimedia applications first pa-risc 2.0 implementation pa-8000 introduced january 1996
Computer architecture
ad lib inc ad lib inc. canadian manufacturer sound cards computer equipment founded martin prevel former professor music vice-dean music department université laval company best known product adlib music synthesizer card almsc simply adlib called first add-on sound card ibm compatibles achieve widespread acceptance developers adoption games becoming first de facto standard audio reproduction today adlib functionality recreated emulators adplug vdmsound latter deprecated source code incorporated dosbox emulating adlib gold 1000 proves challenge due surround sound module 2x oversampling effect development work almsc adlib music synthesizer card concluded prevel struggled engage development community company new product example handed development kits trade shows hopes reach development staff software companies attendees simply used handouts personal entertainment discarded outright subsequently prevel engaged assistance top star computer services inc. also known tscs new jersey company provided quality assurance services game developers top star president rich heimlich sufficiently impressed product demonstration quebec 1987 endorse product top customers sierra on-line king quest iv became first game title support adlib game high audio production values including hired professional composer riding already popular game franchise catapulted adlib card mainstream media coverage soon game developers embraced adlib hoping give software competitive edge retail channel side retail stores chains wholesale distributor selling adlib sound cards 1990 adlib used yamaha ym3812 sound chip produces sound via fm synthesis adlib card consisted ym3812 chip off-the-shelf external glue logic plug standard pc compatible isa 8-bit slot pc software generated multitimbral music sound effects adlib card although acoustic quality distinctly synthesized digital audio pcm supported would become key missing feature competitor creative labs implemented sound blaster cards still possible however output pcm sound card software modulating playback volume audio rate done example microprose game f-15 strike eagle ii multi-channel music editor sound club ms-dos engineers developed sound cards software libraries adlib worked lyrtech notable sound designer worked adlib henri chalifour designed sound demos instrumental showing adlib products could including scoring music adlib commercial two separate revisions original adlib sound card original design 1987 provided mono output via ¼ inch jack aimed composers musicians second design 1990 used 3.5 mm miniature mono output quickly becoming new standard computer game industry adlib release microchannel version original sound card adlib mca used mca p82c611 interface ic notable updates mca version use volume wheel original potentiometer made card thick mca standard ad lib planned wholly new proprietary standard releasing 12-bit stereo sound card called adlib gold gold 1000 used later generation yamaha ymf262 opl3 12-bit digital pcm capability retaining backward compatibility opl2 opl3 chip albeit opl3 responds slightly differently ym3812/opl2 commands sound 100 exactly alike onboard yamaha ymz263-f also performs 2x oversampling would affect opl3 output slightly surround sound module developed optional attachment allowed chorus surround effect enabled opl3 outputs however games supported one unique aspect could initialized certain sounds affect entire output default optional attachments scsi support modem support development well evidence anti-competitive behavior creative failure card yamaha made parts creative adlib creative yamaha biggest customer time chip yamaha created adlib card continually failed pass testing creative yamaha chip passed enabled creative come market first shortly adlib chip passed testing late sustain despite adlib efforts gold 1000 failed capture market company eventually went bankrupt cheaper alternatives creative labs sound blaster 16 adlib designed gold 1000 mainly in-house gold 1000 layout lot discrete circuitry many surface mount components grid array creative labs able integrate sound cards tightly reduce cost gold 1000 finally released sound blaster series entrenched de facto pc sound card standard priced significantly cheaper adlib gold however sound blaster 16 suffered noisier output cheaper components contain unique 2x oversampling effect pc game developers supported gold directly however adlib gold support still found way small number mainstream games descent rayman dune police quest 3 bought games adlib gold 1000 planned ibm microchannel architecture bus named adlib gold mc2000 however adlib went bankrupt card could produced known prototypes confirmed success adlib music card soon attracted competitors long introduction creative labs introduced competing sound blaster card sound blaster fully compatible adlib hardware meaning would play past present future game written adlib card also added two key features absent adlib pcm audio channel game port pcm audio could record play digital audio recordings included dialogue sound effects short musical performances although pcm audio fidelity scarcely better radio allowed game developers include realistic sound effects speech could reproduced yamaha fm synthesis proved popular among game developers finally sound blaster inclusion game port made single-card gaming system superior product better marketing sound blaster quickly overshadowed adlib de facto standard pc gaming audio adlib slow response adlib gold sell well enough sustain company 1992 ad lib filed bankruptcy sound blaster family continued dominate pc game industry year binnenalster gmbh germany purchased assets ad lib government quebec acquired prevent creative labs buying company renamed adlib multimedia relaunched adlib gold sound card many products binnenalster sold adlib multimedia softworld taiwan 1994
Computer architecture
reliable datagram sockets reliable datagram sockets rds high-performance low-latency reliable connectionless protocol delivering datagrams developed oracle corporation included linux kernel 2.6.30 released 9th june 2009 code contributed openfabrics alliance ofa october 19 2010 vsr announced vulnerability within linux 2.6.30 kernel could result local privilege escalation via kernel implementation rds subsequently fixed may 8 2019 cve-2019-11815 published regarding race condition linux rds implementation could lead use-after-free bug possible arbitrary code execution bug fixed linux 5.0.8
Internet protocols
jsyn jsyn java synthesis free api developing interactive sound applications java developed phil burk others distributed burk company mobileer inc. jsyn flexible unit generator-based synthesis dsp architecture allows developers create synthesizers audio playback routines effects processing algorithms within java framework allows easy integration java routines e.g graphics user interface etc. plugin available web browsers run jsyn-enabled applets distributed world wide web although fundamentally synthesis language imitative directly inspired csound music-n languages jsyn number powerful extensions ancillary libraries including jmsl java update hmsl music specification language jscore staff notation editor library adds significantly higher level musical informatics package would normally supplied set synthesis routines wire graphical editor jsyn routines also allows developers create dsp chains using simple gui gives api ease use programs max/msp commercial though inexpensive developer license allows jsyn incorporated commercial applications
Programming language topics
paul horn computer scientist paul m. horn born august 16 1946 american computer scientist solid state physicist made contributions pervasive computing pioneered use copper self-assembly chip manufacturing helped manage development deep computing important tool provides business decision makers ability analyze develop solutions complex difficult problems horn born august 16 1946 graduated clarkson college 1968 bachelor science degree obtained phd university rochester physics 1973 horn various times senior vice president ibm corporation executive director research ibm initiated project develop watson computer competed successfully quiz show jeopardy currently new york university nyu distinguished scientist residence nyu stern executive residence also professor nyu tandon school engineering 2009 appointed senior vice provost research nyu
Computer architecture
real-time multiprogramming operating system real-time multiprogramming operating system rtmos 24-bit process control operating system developed 1960s general electric supported real-time computing multiprogramming programming done assembly language process fortran two languages could used program allowing programmers alternate two desired multiprogramming operating systems considered obsolete replaced multitasking
Operating systems
caller id spoofing caller id spoofing practice causing telephone network indicate receiver call originator call station true originating station example caller id display might display phone number different telephone call placed term commonly used describe situations motivation considered malicious originator caller id spoofing available years people specialized digital connection telephone company called isdn pri circuit collection agencies law-enforcement officials private investigators used practice varying degrees legality first mainstream caller id spoofing service star38.com launched september 2004 star38.com first service allow spoofed calls placed web interface stopped offering service 2005 handful similar sites launched august 2006 paris hilton accused using caller id spoofing break voicemail system used caller id authentication caller id spoofing also used purchase scams web sites craigslist ebay scamming caller claims calling canada u.s. legitimate interest purchasing advertised items often sellers asked personal information copy registration title etc. scammer purchaser invests time effort come see for-sale items 2010 election fake caller ids ambulance companies hospitals used missouri get potential voters answer phone 2009 vindictive brooklyn wife spoofed doctor ’ office husband ’ lover attempt trick woman taking medication would make miscarry frequently caller id spoofing used prank calls example someone might call friend arrange white house appear recipient caller display december 2007 hacker used caller id spoofing service arrested sending swat team house unsuspecting victim february 2008 collegeville pennsylvania man arrested making threatening phone calls women home numbers appear caller id make look like call coming inside house march 2008 several residents wilmington delaware reported receiving telemarketing calls early morning hours caller apparently spoofed caller id evoke tommy tutone ’ 1981 hit 867-5309/jenny “ 2014 increase illegal telemarketers displaying victim number either verbatim digits randomised observed attempt evade caller id-based blacklists canadian federal election may 2 2011 live calls robocalls alleged placed false caller id either replace caller identity fictitious person pierre poutine joliette quebec disguise calls ohio call centre peterborough ontario domestic calls see robocall scandal june 2012 search google returned nearly 50,000 consumer complaints individuals receiving multiple continuing spoofed voice ip voip calls lines leased originating “ pacific telecom communications group ” located los angeles ca mailbox store apparent violation fcc rules companies lease thousands phone numbers anonymous voice-mail providers combination dubious companies like “ phone broadcast club ” actual spoofing allow phone spam become increasingly widespread pervasive problem 2013 misleading caller name teachers phone reported large quantity robocalls advertising credit card services ruse trick students families answering unwanted calls mistaken belief local schools january 7 2013 internet crime complaint center issued scam alert various telephony denial service attacks fraudsters using spoofed caller id impersonate police attempt collect bogus payday loans placing repeated harassing calls police victim number displayed impersonation police common scams involved impersonating utility companies threaten businesses householders disconnection means extort money impersonating immigration officials impersonating medical insurers obtain personal data use theft identity bogus caller id also used grandparent scams target elderly impersonating family members requesting wire transfer money caller id spoofed variety methods different technology popular ways spoofing caller id use voip pri lines past caller id spoofing required advanced knowledge telephony equipment could quite expensive however open source software asterisk freeswitch almost voip company one spoof calls minimal costs effort voip providers allow user configure displayed number part configuration page provider web interface additional software required caller name sent call instead generated number database lookup destination may configured part settings client-owned analog telephone adapter sip phone level flexibility provider-dependent provider allows users bring device unbundles service direct inward dial numbers may purchased separately outbound calling minutes flexible carrier n't follow established hardware standards skype locks subscribers configuration settings hardware subscriber owns outright vonage restrictive providers market wholesale voip typically intended allow displayed number sent resellers want end user numbers appear rare cases destination number served voice-over-ip reachable directly known sip address may published enum telephone number mapping .tel dns record located using intermediary sip broker google voice users directly reachable sip inum initiative numbers country codes +883 5100 +888 federated voip scheme provides direct internet connection pass signaling gateway public switched telephone network shares advantages nearly free unlimited access worldwide disadvantages ernet applications spoofing services work similarly prepaid calling card customers pay advance personal identification number pin customers dial number given company pin destination number number wish appear caller id call bridged transferred arrives spoofed number chosen caller—thus tricking called party many providers also provide web-based interface mobile application user creates account logs supplies source number destination number bogus caller id information displayed server places call two endpoint numbers bridges calls together providers offer ability record calls change voice send text messages another method spoofing emulating bell 202 fsk signal method informally called orange boxing uses software generates audio signal coupled telephone line call object deceive called party thinking incoming call waiting call spoofed number fact new incoming call technique often also involves accomplice may provide secondary voice complete illusion call-waiting call orange box truly spoof incoming caller id prior answering relies certain extent guile caller considered much social engineering technique technical hack methods include switch access signaling system 7 network social engineering telephone company operators place calls desired phone number telephone exchange equipment manufacturers vary handling caller name display much equipment manufactured bell system companies united states sends caller number distant exchange switch must use database lookup find name display calling number canadian landline exchanges often run nortel equipment sends name along number mobile clec internet independent exchanges also vary handling caller name depending switching equipment manufacturer calls numbers differing country codes represent complication caller id often displays local portion calling number without indicating country origin format mistaken domestic invalid number results multiple possible outcomes caller id spoofing remains legal canada recently become prevalent canadian anti-fraud centre add ed automated message practice fraud-reporting hotline crtc estimates 40 complaints receive regarding unsolicited calls involve spoofing agency advises canadians file complaints regarding calls provides list protection options dealing website july december 2015 held public consultation identify technical solutions address issue regulators set march 31 2019 target date implementation cid authentication system december 19 2018 crtc announced beginning december 19 2019 phone providers must block calls ids purport originate telephone numbers conform established numbering plans according report india department telecommunications government india taken following steps cli spoofing service providers per dot using spoofed call service illegal per indian telegraph act sec 25 c using service may lead fine three years imprisonment uk spoofed number called presentation number must either allocated caller allocated third party used third party explicit permission starting 2016 direct marketing companies obliged display phone numbers offending companies hit fines £2 million ofcom caller id spoofing generally legal united states unless done intent defraud cause harm wrongfully obtain anything value relevant federal statute truth caller id act 2009 make exceptions certain law-enforcement purposes callers also still allowed preserve anonymity choosing block outgoing caller id information phone lines act also targets voip services illegal cause caller identification service knowingly transmit misleading inaccurate caller identification information intent defraud cause harm wrongfully obtain anything value ... forfeiture penalties criminal fines 10,000 per violation exceed 1,000,000 could imposed law maintains exemption blocking one outgoing caller id information law enforcement n't affected new york times sent number 111-111-1111 calls made offices august 15 2011 fake number intended prevent extensions reporters appearing call logs thus protect reporters divulge calls made anonymous sources times abandoned practice proposed changes caller id law many companies blocking calls well-known number starting mid-2017 intended culmination 2019 fcc pushed forward caller id certification implemented via methodology shaken/stir shaken/stir acronyms signature-based handling asserted information using tokens shaken secure telephone identity revisited stir standards august 1 2019 fcc voted extend truth caller id act international calls text messaging
Computer security
sector slipping sector slipping technique used deal defective sectors hard disk drives due volatility hard disks moving parts low tolerances sectors become defective defective sectors even come hard disks factory disks incorporate bad-block recovery system cope issues low-level format defect lists populated store sectors bad bad sectors mapped sector slipping algorithm utilized using sector slipping bad sectors disk access time largely affected drive skip sectors takes time would read sector spare sectors located disk aid sectors “ slip ” sectors allowing preservation sequential ordering data accuracy programs reliant static knowledge cylinders block positions compromised though bad sectors found normal usage disk capable sector slipping algorithm applied instead linear reallocation sector forwarding used bad sector replaced sector spare area affect access times disk need seek spare sector since lookups bad sector redirect new sector example physical sectors 3 5 found bad sectors slipped allow logical sectors placed sequential order good sectors sector 3 slipped 4 sector 4 slipped 6 rest sectors slipped remaining spare sectors sector 4 6 sector 5 7
Computer file systems
palm iii palm iii personal digital assistant made palm computing division 3com went sale 1998 replacement palmpilot handheld first palm handheld support infrared file transfer flash rom-capable operating system release palm iii priced us 400 first glance notable difference palm iii predecessor palmpilot rugged streamlined case differences include removable hard cover protect screen removal memory door recessed contrast adjustment knob infrared port battery door less prone accidentally falling palm iii ran new palm os version 3.0 featured new application launcher extra font size bug fixes improvements featured two megabytes edo sdram storage user data software two megabytes flash rom storage operating system built-in applications lcd screen palm iii essentially palm pilot professional palm pilot personal display 2-bit greyscale lcd screen also electroluminescent backlight turned holding power button three seconds allow easier viewing dark areas palm iii os rom ram mounted memory card separate motherboard card could replaced third party upgrade card increase palm iii storage functionality year 2000 kodak released palmpix digital camera image display screen palm handheld
Computer architecture