text
stringlengths 6
1.88M
| source
stringclasses 13
values |
---|---|
email filtering email filtering processing email organize according specified criteria term apply intervention human intelligence often refers automatic processing incoming messages anti-spam techniques outgoing emails well received email filtering software may reject item initial smtp connection stage pass unchanged delivery user mailbox alternatively redirect message delivery elsewhere quarantine checking edit 'tag way common uses mail filters include organizing incoming email removal spam computer viruses less common use inspect outgoing email companies ensure employees comply appropriate policies laws users might also employ mail filter prioritize messages sort folders based subject matter criteria mailbox providers also install mail filters mail transfer agents service customers anti-virus anti-spam url filtering authentication-based rejections common filter types corporations often use filters protect employees information technology assets catch-all filter catch emails addressed domain exist mail server help avoid losing emails due misspelling users may able install separate programs see links configure filtering part email program email client email programs users make personal manual filters automatically filter mail according chosen criteria mail filters operate inbound outbound email traffic inbound email filtering involves scanning messages internet addressed users protected filtering system lawful interception outbound email filtering involves reverse scanning email messages local users potentially harmful messages delivered others internet one method outbound email filtering commonly used internet service providers transparent smtp proxying email traffic intercepted filtered via transparent proxy within network outbound filtering also take place email server many corporations employ data leak prevention technology outbound mail servers prevent leakage sensitive information via email mail filters varying degrees configurability sometimes make decisions based matching regular expression times code may match keywords message body perhaps email address sender message complex control flow logic possible programming languages typically implemented data-driven programming language procmail specifies conditions match actions take matching may involve matching advanced filters particularly anti-spam filters use statistical document classification techniques naive bayes classifier image filtering use complex image-analysis algorithms detect skin-tones specific body shapes normally associated pornographic images microsoft outlook includes user-generated email filters called rules
|
Computer security
|
general graphics interface general graphics interface ggi project aimed develop reliable stable fast computer graphics system works everywhere intent allow program using ggi run computing platform supported requiring recompilation ggi free open-source software subject requirements mit license ggi project related projects kgi generally acknowledged dead project originally started make switching back forth virtual consoles svgalib x display server subsystems linux reliable goals ggi framework implemented set portable user-space libraries array different backends targets e.g linux framebuffer x11 quartz directx two fundamental libgii input-handling libggi graphical output packages add features core libraries depend one targets talk targets called pseudo targets pseudo targets combined work like pipeline one example display-palemu example emulates palette mode truecolor modes allows users run applications palette mode even machines palette mode would available otherwise display-tile splits large virtual display many smaller pieces spread multiple monitors even forward network andreas beck steffen seeger founded ggi project 1994 experimental precursors called scrdrv development scrdrv motivated problems caused coexisting well cooperating graphics environments mainly x svgalib linux operating system time frequently lead lockups requiring reboot first scrdrv design heavily influenced graphics subsystem dj dos extender concepts sane project basic problem scrdrv solved provided kernel mode driver knew enough video hardware set modes thus allowing get sane state even messed-up crashed graphics application first official version appeared 1995 1996 ggi 1.0 released lgpl license ggi consisted core lib named libggi included input handling set 2d graphic primitives userspace drivers graphic boards along linux kernel patch userspace interface drivers patch known kgi kernel graphics interface 1997 ggi went complete re-design many new ideas decision linux made ggi became ggi 2.0 released august 2001 mit release 1998 big flame war linux kernel mailing list getting kgi kernel linus torvalds explained concerns ggi stating think x good enough expressing concern regarding overall direction ggi time another design idea called evstack also added flamewar evstack pretty much complete redesign input output subsystem allowed events thus ev flow stack modules configured manipulate evstack powerful concept allowing e.g two keyboards attached machine one operating text console one graphics adapter one operating graphics console demonstrated linux-kongreß ´97 even allows different keyboard layouts different virtual consoles attaching keyboards via network however came price huge patch input subsystem seem acceptable modern linux input event system allows programs e.g xorg receive keyboard events console keyboard allowing multiseat operation set talks ggi kgi evstack given linuxexpo 98 ggi 2.0 kgi split became project named kgi project ggi 2.0 consisted set libraries 2.0 beta phase late 1998 license libraries changed lgpl mit-style license much work also done buildsystem support operating systems worked freebsd code openbsd netbsd even ms-windows well support hardware platforms input handling moved library called libgii generic ggi code libgg sublib within libgii core graphic library libggi lightweight set graphic primitives common enough write kind graphic application higherlevel api went libraries top libggi called ggi extensions libggi support set targets linux specific fbdev x aa vcsa terminfo pseudo targets tile multi palemu trueemu ggi extensions featured higherlevel api libggiwmh provides functionality windowed targets time x. libggimisc provided basic stuff like vga splitline ggi 2.0.2 released december 2002 user visible change scratch re-designed x backend another noticeable change huge documentation improvement last least release cycles changed release development stable tree stable tree open bugfixes development tree got name following bsd scheme -current november 2004 last bugfix ggi 2.0.x stable tree released favour new ggi 2.1.x stable tree ggi 2.1.x runs many operating systems gnu hurd linux *bsd system v mac os x ms windows support hardware platforms added netbsd even created binary package netbsd/vax new ggi library top libgii called libgiigic added allows combine user actions events run time ggi 2.2 released december 2005 target auto detection reworked longer linux centric ggi replaced integer datatypes ansi c99 types portability target quartz added mac os x users longer depend x11 still use x11 backend user visible change however support static linked targets latest release ggi 2.2.2 bugfix release ggi 2.2.x stable series released january 2007 ggi project moving onward ggi 3.0 release libgii re-designed input handling replaced reactor event model flexible using select file descriptor also simplified input-drivers general particularly n't use file descriptors input-quartz libgg moved separate library libggi merged targets one sublib multi tile mono text palemu libggi also gotten new vnc target allowed run application vnc server ggi 3.0 extension mechanism re-designed scratch simplify interactions extensions core libs required little api change
|
Operating systems
|
sophos sophos group plc british security software hardware company sophos develops products communication endpoint encryption network security email security mobile security unified threat management sophos primarily focused providing security software mid market pragmatic enterprise 100- 5,000-seat organizations whilst primary focus sophos also protects home users free antivirus software sophos home intended demonstrate product functionality listed london stock exchange constituent ftse 250 index sophos founded jan hruska peter lammer began producing first antivirus encryption products 1985 late 1980s 1990s sophos primarily developed sold range security technologies uk including encryption tools available users private business late 1990s sophos concentrated efforts development sale antivirus technology embarked program international expansion 2003 sophos acquired activestate north american software company developed anti-spam software time viruses spread primarily email spam allowed sophos produce combined anti-spam antivirus solution 2006 peter gyenes steve munford named chairman ceo sophos respectively jan hruska peter lammer remain members board directors 2010 majority interest sophos sold apax 2010 nick bray formerly group cfo micro focus international named cfo sophos 2011 utimaco safeware ag acquired sophos 2008-9 accused supplying data monitoring tracking software partners sold governments syria sophos issued statement apology confirmed suspended relationship partners question launched investigation 2012 kris hagerman formerly ceo corel corporation named ceo sophos joined company board former ceo steve munford became non-executive chairman board february 2014 sophos announced acquired cyberoam technologies provider network security products june 2015 sophos announced plans raise us100 million london stock exchange september 2003 february 2006 sophos served parent company activestate developer programming tools dynamic programming languages february 2006 activestate became independent company sold vancouver-based venture capitalist firm pender financial 2007 sophos acquired endforce company based ohio united states developed sold security policy compliance network access control nac software july 2008 sophos announced intention acquire utimaco safeware ag july 2009 sophos completed integration utimaco safeware ag may 2010 sophos reached definitive agreement sell majority interest company apax partners global private equity group may 2011 sophos announced entered agreement acquire astaro privately held provider network security solutions headquartered wilmington massachusetts united states karlsruhe germany 2012 sophos acquired remained virusbuster – hungarian antivirus firm – company closed april 2012 sophos acquired dialogs privately held provider mobile management solutions headquartered germany february 2014 sophos announced acquired cyberoam technologies leading global provider network security products october 2014 sophos acquired mojave networks leading cloud-based security startup december 14 2015 sophos acquired surfright small dutch company behind hitmanpro strengthen endpoint protection products november 2016 sophos acquired barricade pioneering start-up powerful behavior-based analytics engine built machine learning techniques strengthen synchronized security capabilities next-generation network endpoint protection february 2017 sophos acquired invincea software company provides malware threat detection prevention pre-breach forensic intelligence
|
Computer security
|
monitor control command set vesa monitor control command set mccs computer standard developed video electronics standards association defines binary protocol controlling properties computer monitors host device pc set-top box etc mccs requires bidirectional communication protocol like display data channel host display although specification favour particular protocol virtual control panel vcp code binary code represents single command entity mccs language command contains variable number data parameters command attributes following groups controls defined standard three categories controls exist control data may read write rw read-only ro write-only wo display exposes supported internal controls via capability strings original mccs standard version 1 released september 11 1998 mccs version 2 released october 17 2003 major update standard provided support flat panel displays vesa dpvl digital packet video link standard added range television controls introduced individual control multiple windows display new classes vcp codes associated asset management secondary displays information status etc remote program calls display processor introduced mccs version 2 revision 1 released may 28 2005 included minor updates well clarifications improved usability standard mccs version 3 released july 27 2006 major revision update introduced significant changes however revision seen little support industry latest release v2 standard version 2.2a adopted january 2011
|
Computer architecture
|
displayport displayport dp digital display interface developed consortium pc chip manufacturers particularly maxell lattice philips sony standardized video electronics standards association vesa interface primarily used connect video source display device computer monitor also carry audio usb forms data displayport designed replace vga dvi fpd-link interface backward compatible interfaces hdmi dvi use either active passive adapters displayport first display interface rely packetized data transmission form digital communication found technologies ethernet usb pci express permits use internal external display connections unlike legacy standards transmit clock signal output displayport protocol based small data packets known micro packets embed clock signal within data stream allows higher resolution using fewer pins use data packets also makes displayport extensible meaning additional features added time without significant changes physical interface displayport used transmit audio video simultaneously although optional transmitted without video signal path range six sixteen bits per color channel audio path eight channels 24-bit 192khz pcm audio uncompressed bi-directional half-duplex auxiliary channel carries device management device control data main link vesa edid mccs dpms standards addition interface capable carrying bi-directional usb signals displayport uses lvds signal protocol compatible dvi hdmi however dual-mode displayports designed transmit single-link dvi hdmi protocol tmds across interface use external passive adapter adapter enables compatibility mode converts signal 3.3 volts 5 volts analog vga/ypbpr dual-link dvi powered active adapter required compatibility rely dual mode active vga adapters powered displayport connector directly active dual-link dvi adapters typically rely external power source usb first version 1.0 approved vesa 3 may 2006 version 1.1 ratified 2 april 2007 version 1.1a ratified 11 january 2008 displayport 1.0–1.1a allow maximum bandwidth 10.8gbit/s 8.64gbit/s data rate standard 4-lane main link displayport cables 2 meters length required support full 10.8gbit/s bandwidth displayport 1.1 allows devices implement alternative link layers fiber optic allowing much longer reach source display without signal degradation although alternative implementations standardized also includes hdcp addition displayport content protection dpcp displayport1.1a standard downloaded free vesa website displayport version 1.2 introduced 7 january 2010 significant improvement new version doubling effective bandwidth 17.28gbit/s high bit rate 2 hbr2 mode allows increased resolutions higher refresh rates greater color depth improvements include multiple independent video streams daisy-chain connection multiple monitors called multi-stream transport facilities stereoscopic 3d increased aux channel bandwidth 1mbit/s 720mbit/s color spaces including xvycc scrgb adobe rgb 1998 global time code gtc sub 1µs audio/video synchronisation also apple inc. mini displayport connector much smaller designed laptop computers small devices compatible new standard displayport version 1.2a released january 2013 may optionally include vesa adaptive sync amd freesync uses displayport adaptive-sync feature operation freesync first demonstrated ces 2014 toshiba satellite laptop making use panel-self-refresh psr feature embedded displayport standard proposal amd vesa later adapted panel-self-refresh feature use standalone displays added optional feature main displayport standard name adaptive-sync version 1.2a optional feature support adaptive-sync required display displayport 1.2a-compliant displayport version 1.3 approved 15 september 2014 standard increases overall transmission bandwidth 32.4gbit/s new hbr3 mode featuring 8.1gbit/s per lane 5.4gbit/s hbr2 version 1.2 total data throughput 25.92gbit/s factoring 8b/10b encoding overhead bandwidth enough 4k uhd display 120hz 24bit/px rgb color 5k display 60hz 30bit/px rgb color 8k uhd display 30hz 24bit/px rgb color using multi-stream transport mst displayport port drive two 4k uhd displays 60hz four wqxga displays 60hz 24bit/px rgb color new standard includes mandatory dual-mode dvi hdmi adapters implementing hdmi2.0 standard hdcp2.2 content protection thunderbolt 3 connection standard originally include displayport1.3 capability final release ended version 1.2 vesa adaptive sync feature displayport version 1.3 remains optional part specification displayport version 1.4 published 1 march 2016 new transmission modes defined hbr3 32.4gbit/s introduced version 1.3 still remains highest available mode displayport1.4 adds support display stream compression 1.2 dsc forward error correction hdr10 metadata defined cta-861.3 including static dynamic metadata rec 2020 color space hdmi interoperability extends maximum number inline audio channels 32 dsc visually lossless encoding technique 3:1 compression ratio using dsc hbr3 transmission rates displayport1.4 support 8k uhd 60hz 4k uhd 120hz 30bit/px rgb color hdr 4k 60hz 30bit/px rgb/hdr achieved without need dsc displays support dsc maximum limits unchanged displayport1.3 4k 120hz 5k 60hz 8k 30hz displayport version 1.4a published april 2018 vesa made official press release version updated displayport dsc implementation dsc 1.2 1.2a according roadmap published vesa september 2016 new version displayport intended launched early 2017 would improved link rate 8.1 10.0gbit/s 24 increase would increased total bandwidth 32.4gbit/s 40.0gbit/s however new version released 2017 likely delayed make improvements hdmi forum announced january 2017 next standard hdmi2.1 would offer 48gbit/s bandwidth according press release 3 january 2018 vesa also currently engaged members development next displayport standard generation plans increase data rate enabled displayport two-fold beyond vesa plans publish update within next 18 months ces 2019 vesa announced new version would support 8k 60hz without compression expected released first half 2019 june 26 2019 vesa formally released displayport 2.0 standard vesa stated dp 2.0 first major update displayport standard since march 2016 provides ≈3× improvement data rate 25.92 77.37gbit/s compared previous version displayport 1.4a well new capabilities address future performance requirements traditional displays include beyond 8k resolutions higher refresh rates high dynamic range hdr support higher resolutions improved support multiple display configurations well improved user experience augmented/virtual reality ar/vr displays including support 4k-and-beyond vr resolutions increased bandwidth enabled dp 2.0 vesa offers high degree versatility configurations higher display resolutions refresh rates addition above-mentioned 8k resolution 60hz hdr support dp 2.0 across native dp connector usb-c displayport alt mode enables variety high-performance configurations using two lanes usb-c connector via dp alt mode allow simultaneous superspeed usb data video dp 2.0 enable configurations displayport main link used transmission video audio main link consists number unidirectional serial data channels operate concurrently called lanes standard displayport connection 4 lanes though applications displayport implement thunderbolt 3 interface implements 8 lanes displayport standard displayport connection lane dedicated set twisted-pair wires transmits data across using differential signaling self-clocking system dedicated clock signal channel necessary unlike dvi hdmi vary transmission speed exact rate required specific video format displayport operates specific speeds excess bits transmission filled stuffing symbols displayport versions 1.01.4a data encoded using ansi 8b/10b encoding prior transmission scheme 8 every 10 transmitted bits represent data extra bits used dc balancing ensuring roughly equal number 1s 0s result rate data transmitted 80 physical bitrate transmission speeds also sometimes expressed terms link symbol rate rate 8b/10b-encoded symbols transmitted i.e rate groups 10 bits transmitted 8 represent data following transmission modes defined version 1.01.4a displayport 2.0 uses 128b/132b encoding group 132 transmitted bits represents 128 bits data scheme efficiency 96. addition forward error correction fec consumes small amount link bandwidth resulting overall efficiency ≈96.7 following transmission modes added dp 2.0 total bandwidth main link standard 4-lane connection aggregate lanes transmission mode used displayport main link negotiated source sink device connection made process called link training process determines maximum possible speed connection quality displayport cable insufficient reliably handle hbr2 speeds example displayport devices detect switch lower mode maintain stable connection link re-negotiated time loss synchronization detected audio data transmitted across main link video blanking intervals short pauses line frame video data displayport aux channel half-duplex bidirectional data channel used miscellaneous additional data beyond video audio ic cec commands device manufacturer discretion aux signals transmitted across dedicated set twisted-pair wires displayport1.0 specified manchester encoding 2mbaud signal rate 1mbit/s data rate displayport1.2 introduced second transmission mode called faux fast aux operates 720mbaud 8b/10b encoding 576mbit/s data rate used implement additional transport protocols usb2.0 480mbit/s without need additional cable seen little practical use 2018 displayport cables compatible displayport devices regardless version device cable certification level features displayport function across displayport cable displayport multiple cable designs dp cables basic layout wiring support feature including audio daisy-chaining g-sync/freesync hdr dsc displayport cables differ transmission speed support displayport specifies four different transmission modes rbr hbr hbr2 hbr3 support progressively higher bandwidths displayport cables capable four transmission modes vesa offers certifications level bandwidth certifications optional displayport cables certified vesa cables limited transmission speed still compatible displayport devices may place limits maximum resolution refresh rate available displayport cables classified version although cables commonly labeled version numbers hbr2 cables advertised displayport1.2 cables example notation permitted vesa use version numbers cables seem imply displayport1.4 display requires displayport1.4 cable features introduced dp1.4 hdr dsc function older dp1.2 cables reality neither true displayport cables classified bandwidth certification level rbr hbr hbr2 hbr3 certified displayport cables capable functioning highest levels bandwidth cables may submitted vesa optional certification various bandwidth levels vesa offers three levels cable certification rbr standard dp8k certify displayport cables proper operation following speeds april 2013 vesa published article stating displayport cable certification distinct tiers hbr hbr2 bandwidth certified standard displayport cable—including certified displayport1.1—would able handle 21.6gbit/s bandwidth hbr2 introduced displayport 1.2 standard displayport1.2 standard defines single specification high bit rate cable assemblies used hbr hbr2 speeds although dp cable certification process governed displayport phy compliance test standard cts displayport standard dp8k certification announced vesa january 2018 certifies cables proper operation hbr3 speeds 8.1gbit/s per lane 32.4gbit/s total june 2019 release version 2.0 displayport standard vesa announced dp8k certification also sufficient new uhbr 10 transmission mode new certifications announced uhbr 13.5 uhbr 20 modes vesa encouraging displays use tethered cables speeds rather releasing standalone cables onto market also noted use display stream compression dsc introduced displayport1.4 greatly reduces bandwidth requirements cable formats would normally beyond limits displayport1.4 4k 38402160 144hz 8bpc rgb/4:4:4 31.4gbit/s data rate uncompressed implemented using dsc would reduce physical bandwidth requirements 2–3x placing well within capabilities hbr2-rated cable exemplifies displayport cables classified version although dsc introduced version 1.4 mean needs so-called dp1.4 cable hbr3-rated cable function hbr3 cables required applications exceed hbr2-level bandwidth simply application involving displayport1.4 dsc used reduce bandwidth requirements hbr2 levels hbr2-rated cable sufficient displayport standard specify maximum length cables though displayport 1.2 standard set minimum requirement cables 2 meters length must support hbr2 speeds 21.6gbit/s cables length must support rbr speeds 6.48gbit/s cables greater 2 meters may may support hbr/hbr2 speeds cables length may may support hbr3 speeds displayport cables ports may either full-size connector mini connector connectors differ physical shape—the capabilities displayport regardless connector used using mini displayport connector affect performance feature support connection standard displayport connector referred full-size connector distinguish mini connector sole connector type introduced displayport1.0 20-pin single-orientation connector friction lock optional mechanical latch standard displayport receptacle dimensions 16.10mm width × 4.76mm height × 8.88mm depth standard displayport connector pin allocation follows mini displayport connector developed apple use computer products first announced october 2008 use new macbook pro macbook air cinema display 2009 vesa adopted official standard 2010 specification merged main displayport standard release displayport1.2 apple freely licenses specification vesa mini displayport mdp connector 20-pin single-orientation connector friction lock unlike full-size connector option mechanical latch mdp receptacle dimensions 7.50mm width × 4.60mm height × 4.99mm depth mdp pin assignments full-size displayport connector pin 20 displayport connector called dp_pwr provides 3.3v ±10 dc power 500ma minimum power delivery 1.5w power available displayport receptacles source display devices dp_pwr intended provide power adapters amplified cables similar devices separate power cable necessary standard displayport cable connections use dp_pwr pin connecting dp_pwr pins two devices directly together cable create short circuit potentially damage devices since dp_pwr pins two devices unlikely exactly voltage especially ±10 tolerance reason displayport1.1 later standards specify passive displayport-to-displayport cables must leave pin 20 unconnected however 2013 vesa announced investigating reports malfunctioning displayport devices discovered large number non-certified vendors manufacturing displayport cables dp_pwr pin connected stipulation dp_pwr wire omitted standard displayport cables present displayport1.0 standard however displayport products cables begin appear market 2008 long version 1.0 replaced version 1.1 displayport1.0 standard never implemented commercial products tables describe refresh frequencies achieved transmission mode general maximum refresh frequency determined transmission mode rbr hbr hbr2 hbr3 uhbr 10 uhbr 13.5 uhbr 20 transmission modes introduced displayport standard follows however transmission mode support necessarily dictated device claimed displayport version number example older versions displayport marketing guidelines allowed device labeled displayport 1.2 supported mst feature even n't support hbr2 transmission mode newer versions guidelines removed clause currently june 2018 revision guidelines usage displayport version numbers products displayport version numbers therefore reliable indication transmission speeds device support addition individual devices may arbitrary limitations beyond transmission speed example nvidia kepler gk104 gpus geforce gtx 680 770 support displayport 1.2 hbr2 transmission mode limited 540mpx/s maximum possible hbr2 consequently certain devices may limitations differ listed following tables support particular format source display devices must support required transmission mode displayport cable must also capable handling required bandwidth transmission mode see cables connectors color depth 8bpc 24bit/px 16.7 million colors assumed formats tables standard color depth used computer displays note operating systems refer 32-bit color depth—this 24-bit color depth 8 extra bits alpha channel information present software transmission stage information already incorporated primary color channels actual video data transmitted across cable contains 24 bits per pixel color depth 10bpc 30bit/px 1.07 billion colors assumed formats tables color depth requirement various common hdr standards hdr10 requires 25 bandwidth standard 8bpc video hdr extensions defined version 1.4 displayport standard displays support hdr extensions may implement hbr2 transmission mode extra bandwidth hbr3 unnecessary example 4k 60hz hdr displays since definition constitutes displayport 1.4 device manufacturers may choose label dp 1.2 devices despite support dp 1.4 hdr extensions result displayport version numbers used indicator hdr support displayport dual-mode dp++ also called dual-mode displayport standard allows displayport sources use simple passive adapters connect hdmi dvi displays dual-mode optional feature displayport sources necessarily support dvi/hdmi passive adapters though practice nearly devices officially dp++ logo used indicate dp port supports dual-mode modern devices use logo devices implement dual-mode detect dvi hdmi adapter attached send dvi/hdmi tmds signals instead displayport signals original displayport dual-mode standard version 1.0 used displayport1.1 devices supported tmds clock speeds 165mhz 4.95gbit/s bandwidth equivalent hdmi1.2 sufficient 19201080 19201200 60hz 2013 vesa released dual-mode 1.1 standard added support 300mhz tmds clock 9.00gbit/s bandwidth used newer displayport1.2 devices slightly less 340mhz maximum hdmi1.4 sufficient 19201080 120hz 25601440 60hz 38402160 30hz older adapters capable 165mhz speed retroactively termed type1 adapters new 300mhz adapters called type2 release displayport1.3 standard vesa added dual-mode support 600mhz tmds clock 18.00gbit/s bandwidth full bandwidth hdmi2.0 sufficient 19201080 240hz 25601440 144hz 38402160 60hz however passive adapters capable 600mhz dual-mode speed produced 2018 multi-stream transport feature first introduced displayport1.2 standard allows multiple independent displays driven single dp port source devices multiplexing several video streams single stream sending branch device demultiplexes signal original streams branch devices commonly found form mst hub plugs single dp input port provides multiple outputs also implemented display internally provide dp output port daisy-chaining effectively embedding 2-port mst hub inside display.. theoretically 63 displays supported combined data rate requirements displays exceed limits single dp port 17.28gbit/s dp1.2 port 25.92gbit/s dp 1.3/1.4 port addition maximum number links source device i.e maximum length daisy-chain 7 maximum number physical output ports branch device hub 7 release mst standard single-display operation retroactively named sst mode single-stream transport daisy-chaining feature must specifically supported intermediary display displayport1.2 devices support daisy-chaining requires dedicated displayport output port display standard displayport input ports found displays used daisy-chain output last display daisy-chain need support feature specifically dp output port displayport1.1 displays also connected mst hubs part displayport daisy-chain last display chain host system software also needs support mst hubs daisy-chains work microsoft windows environments full support apple operating systems currently support mst hubs displayport daisy-chaining macos 10.13 high sierra displayport-to-dvi displayport-to-hdmi adapters/cables may may function mst output port support depends specific device mst supported usb type-c displayport alternate mode standard displayport daisy-chains mst hubs function type-c sources simple type-c displayport adapter support hdr video introduced displayport1.4 implements cta 861.3 standard transport static hdr metadata edid displayport1.0 includes optional dpcp displayport content protection philips uses 128-bit aes encryption also features full authentication session key establishment encryption session independent independent revocation system portion standard licensed separately also adds ability verify proximity receiver transmitter technique intended ensure users bypassing content protection system send data distant unauthorized users displayport1.1 added optional implementation industry-standard 56-bit hdcp high-bandwidth digital content protection revision 1.3 requires separate licensing digital content protection llc displayport1.3 added support hdcp2.2 also used hdmi2.0 vesa creators displayport standard state standard royalty-free implement however march 2015 mpeg la issued press release stating royalty rate 0.20 per unit applies displayport products manufactured sold countries covered one patents mpeg la license pool includes patents hitachi maxell philips lattice semiconductor rambus sony response vesa updated displayport faq page following statement october 2017 still seems royalty according vesa official faq standard may require per-device royalty fees vesa requires membership access said standards minimum cost presently 5,000 december 2010 several computer vendors display makers including intel amd dell lenovo samsung lg announced would begin phasing fpd-link vga dvi-i next years replacing displayport hdmi one notable exception list manufacturers nvidia yet announce plans regarding future implementation legacy interfaces displayport several advantages vga dvi fpd-link although displayport much functionality hdmi complementary connection used different scenarios dual-mode displayport port emit hdmi signal via passive adapter figures idc show 5.1 commercial desktops 2.1 commercial notebooks released 2009 featured displayport main factor behind phase-out vga intel amd planned stop building products fpd-link 2013 nearly 70 lcd monitors sold august 2014 us uk germany japan china equipped hdmi/displayport technology 7.5 year according digitimes research ihs markit analytics firm forecast displayport would surpass hdmi 2019 mini displayport mdp standard announced apple fourth quarter 2008 shortly announcing mini displayport apple announced would license connector technology fee following year early 2009 vesa announced mini displayport would included upcoming displayport 1.2 specification 24 february 2011 apple intel announced thunderbolt successor mini displayport adds support pci express data connections maintaining backwards compatibility mini displayport based peripherals micro displayport would targeted systems need ultra-compact connectors phones tablets ultra-portable notebook computers standard would physically smaller currently available mini displayport connectors standard expected released q2 2014 project seems aborted replaced displayport alt mode usb type-c standard direct drive monitor ddm 1.0 standard approved december 2008 allows controller-less monitors display panel directly driven displayport signal although available resolutions color depth limited two-lane operation display stream compression dsc vesa-developed low-latency compression algorithm overcome limitations posed sending high-resolution video physical media limited bandwidth visually lossless low-latency algorithm based delta pcm coding ycocg-r color space allows increased resolutions color depths reduced power consumption dsc tested meet requirements iso/iec 29170-2 evaluation procedure nearly lossless coding using various test patterns noise subpixel-rendered text cleartype ui captures photo video images dsc version 1.0 released 10 march 2014 soon deprecated dsc version 1.1 released 1 august 2014 dsc standard supports 3:1 compression ratio constant variable bit rate 4:4:4 chroma subsampling optional 4:2:2 conversion 6/8/10/12 bits per color component dsc version 1.2 released 27 january 2016 included displayport 1.4 version 1.2a released 18 january 2017 update includes native encoding 4:2:2 4:2:0 formats pixel containers 14/16 bits per color minor modifications encoding algorithm dsc compression works horizontal line pixels encoded using groups three consecutive pixels native 4:4:4 simple 4:2:2 formats six pixels three compressed containers native 4:2:2 4:2:0 formats rgb encoding used first converted reversible ycgco simple conversion 4:2:2 4:4:4 add missing chroma samples interpolating neighboring pixels luma component coded separately using three independent substreams four substreams native 4:2:2 mode prediction step performed using one three modes modified median adaptive coding mmap algorithm similar one used jpeg-ls block prediction optional decoders due high computational complexity negotiated dsc handshake midpoint prediction bit rate control algorithm tracks color flatness buffer fullness adjust quantization bit depth pixel group way minimizes compression artifacts staying within bitrate limits repeating recent pixels stored 32-entry indexed color history ich buffer referenced directly group slice improves compression quality computer-generated images alternatively prediction residuals computed encoded entropy coding algorithm based delta size unit-variable length coding dsu-vlc encoded pixel groups combined slices various height width common combinations include 100 25 picture width 8- 32- 108-line height 4 january 2017 hdmi 2.1 announced supports 10k resolution uses dsc 1.2 video higher 8k resolution 4:2:0 chroma subsampling embedded displayport edp display panel interface standard portable embedded devices defines signaling interface graphics cards integrated displays various revisions edp based existing displayport standards however version numbers two standards interchangeable instance edp version 1.4 based displayport 1.2 edp version 1.4a based displayport 1.3 practice embedded displayport displaced lvds predominant panel interface modern laptops edp 1.0 adopted december 2008 included advanced power-saving features seamless refresh rate switching version 1.1 approved october 2009 followed version 1.1a november 2009 version 1.2 approved may 2010 includes displayport 1.2 hbr2 data rates 120hz sequential color monitors new display panel control protocol works aux channel version 1.3 published february 2011 includes new optional panel self-refresh psr feature developed save system power extend battery life portable pc systems psr mode allows gpu enter power saving state frame updates including framebuffer memory display panel controller version 1.4 released february 2013 reduces power consumption partial-frame updates psr mode regional backlight control lower interface voltages additional link rates auxiliary channel supports multi-touch panel data accommodate different form factors version 1.4a published february 2015 underlying displayport version updated 1.3 order support hbr3 data rates display stream compression 1.1 segmented panel displays partial updates panel self-refresh version 1.4b published october 2015 protocol refinements clarifications intended enable adoption edp 1.4b devices mid-2016 internal displayport idp 1.0 approved april 2010 idp standard defines internal link digital tv system chip controller display panel timing controller aims replace currently used internal fpd-link lanes displayport connection idp features unique physical interface protocols directly compatible displayport applicable external connection however enable high resolution refresh rates providing simplicity extensibility idp features non-variable 2.7ghz clock nominally rated 3.24gbit/s data rate per lane sixteen lanes bank resulting six-fold decrease wiring requirements fpd-link 1080p24 signal data rates also possible idp built simplicity mind n't aux channel content protection multiple streams however frame sequential line interleaved stereo 3d portable digital media interface pdmi interconnection docking stations/display devices portable media players includes 2-lane displayport v1.1a connection ratified february 2010 ansi/cea-2017-a wireless displayport wdp enables displayport 1.2 bandwidth feature set cable-free applications operating 60ghz radio band announced november 2010 wigig alliance vesa cooperative effort slimport brand analogix products complies mobility displayport also known mydp industry standard mobile audio/video interface providing connectivity mobile devices external displays hdtvs slimport implements transmission video 4k-ultrahd eight channels audio micro-usb connector external converter accessory display device slimport products support seamless connectivity displayport hdmi vga displays mydp standard released june 2012 first product use slimport google nexus 4 smartphone lg smartphones lg g series also adopted slimport slimport alternative mobile high-definition link mhl displayid designed replace e-edid standard displayid features variable-length structures encompass existing edid extensions well new extensions 3d displays embedded displays latest version 1.3 announced 23 september 2013 adds enhanced support tiled display topologies allows better identification multiple video streams reports bezel size locations december 2013 many current 4k displays use tiled topology lack standard way report video source tile left right early 4k displays manufacturing reasons typically use two 1920×2160 panels laminated together currently generally treated multiple-monitor setups displayid 1.3 also allows 8k display discovery applications stereo 3d multiple video streams used dockport formerly known lightning bolt extension displayport include usb 3.0 data well power charging portable devices attached external displays originally developed amd texas instruments announced vesa specification 2014 22 september 2014 vesa published displayport alternate mode usb type-c connector standard specification send displayport signals newly released usb-c connector one two four differential pairs usb uses superspeed bus configured dynamically used displayport lanes first two cases connector still carry full superspeed signal latter case least non-superspeed signal available displayport aux channel also supported two sideband signals connection furthermore usb power delivery according newly expanded usb-pd 2.0 specification possible time makes type-c connector strict superset use-cases envisioned dockport slimport mini micro displayport virtuallink uses usb-c connectors displayport transmit video signals since introduction 2006 displayport gained popularity within computer industry featured many graphic cards displays notebook computers dell first company introduce consumer product displayport connector dell ultrasharp 3008wfp released january 2008 soon amd nvidia released products support technology amd included support radeon hd 3000 series graphics cards nvidia first introduced support geforce 9 series starting geforce 9600 gt later year apple introduced several products featuring mini displayport new connector – proprietary time – eventually became part displayport standard however apple reserves right void license licensee commence action patent infringement apple 2009 amd followed suit radeon hd 5000 series graphics cards featured mini displayport eyefinity versions series nvidia launched nvs 810 8 mini displayport outputs single card 4 november 2015 nvidia revealed geforce gtx 1080 world first graphics card displayport 1.4 support 6 may 2016 amd followed radeon rx 480 support displayport 1.3/1.4 29 june 2016 radeon rx 400 series support displayport 1.3 hbr hdr10 dropping dvi connector reference board design february 2017 vesa qualcomm announced displayport alt mode video transport integrated snapdragon 835 mobile chipset powers smartphones vr/ar head-mounted displays ip cameras tablets mobile pcs following organizations hold active patents contributed towards development displayport technology listed patent pool mpeg la following companies participated preparing drafts displayport edp idp ddm dsc standards following companies additionally announced intention implement displayport edp idp
|
Computer architecture
|
passive attack passive attack cryptosystem one cryptanalyst interact parties involved attempting break system solely based upon observed data i.e ciphertext also include known plaintext attacks plaintext corresponding ciphertext known classical ciphers vulnerable form attack modern ciphers designed prevent type attack others main types passive attacks traffic analysis release message contents traffic analysis attack eavesdropper analyzes traffic determines location identifies communicating hosts observes frequency length exchanged messages uses information predict nature communication incoming outgoing traffic network analyzed altered release message content telephonic conversation e-mail message transferred file may contain confidential data passive attack monitors contents transmitted data passive attacks difficult detect involve alteration data messages exchanged neither sender receiver aware third party may capture messages prevented encryption data
|
Computer security
|
eric vanderburg eric vanderburg american cyber security storage networking information technology professional writer living cleveland ohio vanderburg vice president cybersecurity tcdi author speaker information security interviewed tv radio discuss information security presents conferences seminars participated panels information security vanderburg attended kent state university earning bachelor science technology masters business administration also master business administration mba pursued doctorate information assurance vanderburg interested technology early age often reading computer manuals library thus allowing learn basics programming spending time hackers internet deviants early 1990s managed turn interest security career since late 1990s interest primarily cybersecurity within business world also spoken development devops business world vanderburg founded independent systems consulting consulting firm 1997 ran almost ten years joined jurinnov 2006 directed digital forensics cybersecurity consulting teams 2009 built network operations center jurinnov headquarters monitor data center operations perform transaction monitoring key business client systems 2016 vanderburg became vice president cybersecurity tcdi tcdi acquired jurinnov also techmin network board member vanderburg involved hitachi data systems testing essential nas product compared netapp fas3000 nas partnered lateral data using viewpoint ediscovery tool perform large-scale litigation document review worked venio litigation review tool early case assessment eca worked companies including dell carbonite bitdefender microsoft vanderburg served expert witness cases involving digital preservation electronic communication access control confidential information disclosure database management systems directory services vanderburg taught courses security database management systems computer networking remington college cleveland-west campus instructor chair computer networking technology program served adjunct instructor computer information systems department lorain county community college elyria ohio vanderburg delivered commencement speeches vatterott college cleveland campus 2010 commencement remington college cleveland-west campus final graduation 2013 also taught web-based courses professional development eforensics magazine vanderburg served advisory boards remington college vatterott college lincoln school technology cuyahoga community college workforce economic development division wedd vanderburg published cio magazine eforensics magazine network world computer world networks asia certification magazine pc security world cso magazine arn techworld mcgladrey technology news brief vanderburg also maintains blog called security thinking cap
|
Computer security
|
asynchronous system trap asynchronous system trap ast refers mechanism used several computer operating systems designed former digital equipment corporation dec maynard massachusetts various events within systems optionally signalled back user processes via ast mechanism asts act like subroutine calls delivered asynchronously without regard context main thread care must taken asts commonly encountered result issuing qio calls kernel completion i/o signalled issuance ast calling process/task certain runtime errors could also signalled using ast mechanism within openvms special kernel-mode asts used standard mechanism getting access process context executed highest possible per-process priority next time scheduler makes process current used among things retrieving process-level information response getjpi getjob/process information system call performing process deletion following operating systems implement asts asts roughly analogous unix signals important differences vax/vms v4 later implemented interesting optimization problem synchronizing ast-level non-ast-level code system service named setast could used disable enable delivery asts current less-privileged access modes openvms term ring-based security features however critical section needing protection asts instructions long overhead making setast calls could far outweigh time execute instructions user mode least privileged ring normally used ordinary user programs pair bit flags provided predefined user-writable memory location per-process p1 space meanings two flags could construed n't deliver asts asts disabled instead usual pair setast calls user-mode code would set first flag executing sequence instructions asts need blocked clear sequence note ordering avoid race conditions would check second flag see become set time asts really become disabled setast called re-enable common case asts would become pending time would need call setast kernel ast delivery code part would check first flag trying deliver user-mode ast set would directly set asts-disabled bit process control block bit would set explicit setast call user mode also set second flag returning leaving ast undelivered asynchronous procedure call mechanism windows nt family operating systems similar mechanism
|
Operating systems
|
security type system computer science type system described syntactic framework contains set rules used assign type property int boolean char etc various components computer program variables functions security type system works similar way main focus security computer program information flow control thus various components program assigned security types labels aim system ultimately able verify given program conforms type system rules satisfies non-interference security type systems one many security techniques used field language-based security tightly connected information flow information flow policies simple terms using security type system want detect exists kind violation confidentiality integrity program i.e want detect program line information flow policy suppose two users b program introduce following security classes sc information flow policy want define direction information allowed flow dependent whether specifying policy read write operations example consider read operations confidentiality define following flows allowed also described superset ⊇ words information allowed flow towards stricter levels confidentiality using combination operator ⊕ express security classes perform read operations respect security classes example also described intersection ∩ security classes information flow policy illustrated hasse diagram also want policy lattice greatest lower-bound least upper-bound always exists combination security classes case integrity information flow opposite direction thus policy inverted policy place software developer apply security classes program components use security type system usually combined compiler perform verification information flow according type system rules sake simplicity consider simple computer program together information flow policy described previous section simple program given following pseudocode codice_1 see equality check made variable assigned security class see variable x lower security class b influenced check means information leaking class class b violation confidentiality policy leak detected security type system order design security type system need formalize couple things first need function also known security environment creates mapping variables security types classes denote function γ γ x τ x variable τ security class type assign security classes also called judgement program components using following notation use following bottom-up notation decompose program program decomposed trivial judgements easily determine type work way obtain types less trivial parts program consider numerator isolation looking types statement see able derive allowed type denominator based defined type system rules main part security type system rules say decompose program type verification performed toy program consists conditional test two possible variable assignments rules two events defined follows applying simple program introduced get type system detects policy violation line 2 read operation security class performed followed two write operations less strict security class b formalized terms ⋢ b b rule conditional test thus program classified typeable soundness security type system informally defined program p well typed p satisfies non-interference
|
Computer security
|
semantic analysis compilers semantic analysis context sensitive analysis process compiler construction usually parsing gather necessary semantic information source code usually includes type checking makes sure variable declared use impossible describe extended backus–naur form thus easily detected parsing
|
Programming language topics
|
app store ios app store digital distribution platform developed maintained apple inc. mobile apps ios operating system store allows users browse download apps developed apple ios software development kit apps downloaded iphone smartphone ipod touch handheld computer ipad tablet computer transferred apple watch smartwatch 4th-generation newer apple tvs extensions iphone apps app store opened july 10 2008 initial 500 applications available store features 2.1 million apps developers multiple options monetizing applications ranging free free in-app purchases paid however app store criticized lackluster development environment prompting company june 2016 announce renewed focus energy store major changes introduced following months include ads search results new app subscription model ability developers respond customer reviews additionally apple began process remove old apps function intended n't follow current app guidelines app research firms noticing significant numbers app removals store furthermore release ios 11 september 2017 app store received complete design overhaul bringing greater focus editorial content daily highlights well design similar style several apple built-in ios apps iphone app store opened july 10 2008 july 11 iphone 3g released came pre-loaded support app store success apple app store launch similar services competitors term app store adopted refer similar service mobile devices however apple applied u.s. trademark term app store 2008 tentatively approved early 2011 june 2011 u.s. district judge phyllis hamilton presiding apple case amazon said would probably deny apple motion stop amazon using app store name july apple denied preliminary injunction amazon appstore federal judge term app become popular buzzword january 2011 app awarded honor 2010 word year american dialect society app used shorthand application since least mid-1990s product names since least 2006 example then-named google apps apple announced mac app store similar app distribution platform macos personal computer operating system october 2010 official launch taking place january 2011 release 10.6.6 snow leopard update february 2013 apple informed developers could begin using appstore.com links apps june developer conference apple announced upcoming kids section app store new section featuring apps categorized age range section launched alongside release ios 7 september 2013 november 2014 due pressure european commission apple updated app store apps charge download labeled get instead previous free due many free apps inclusions paid in-app purchases january 2017 reports surfaced documentation new beta then-upcoming release ios 10.3 detailed apple would let developers respond customer reviews app store marking significant change previous limitation prevented developers communicating users functionality officially enabled march 27 2017 ios 10.3 released users details also released reviews users including able rate review apps apps rather redirected app store mark users reviews helpful helpful apple published document describing proper ways respond developers including timely clear concise prioritize certain forms reviews low-star ratings certain countries recent reviews filtering itunes connect developer responses go approval process published developers also forbidden manipulating incenting feedback developer responses listed app store line underneath respective user review users receive notification/email upon response respective developer option update review march 2017 app store submissions containing pricing details free name started getting rejected developers previously advised developer guides itunes connect app store overview pages refrain practice though apps still approved starting march though apps free titles rejected october 2016 effort improve app discoverability apple rolled ability developers purchase advertising spots app store users united states ads shown top search results based strictly relevant keywords used create profiles users apple expanded search ads united kingdom australia new zealand april 2017 along configurable advertising settings developers search ads expanded canada mexico switzerland october 2017 december 2017 apple revamped search ads program offer two distinctive versions search ads basic pay-per-install program aimed smaller developers pay users actually install app search ads basic also features easier setup process restricted monthly budget search ads advanced new name given older method developers pay whenever users tap apps search results along unlimited monthly budgets launch basic program available u.s. international rollout expected sometime next year apple also offers itunes affiliate program lets people refer others apps itunes content along in-app purchases percentage sales commission rate in-app purchases reduced 7 2.5 may 2017 affiliate rates paid apps music movies books tv shows remained 7 app store received major design overhaul release ios 11 new design features greater focus editorial content daily highlights introduces cleaner consistent colorful look similar several apple built-in ios apps prior september 2017 apple offered way users manage ios app purchases itunes computer software september version 12.7 itunes released removing app store section process however following month itunes 12.6.3 also released retaining app store 9to5mac noting secondary release positioned apple necessary businesses performing internal app deployments december 2017 apple announced developers could offer applications pre-order letting make apps visible store 2–90 days ahead release january 4 2018 apple announced app store record-breaking holiday season according new press release week starting christmas eve record number customers made app store purchases spending 890 million seven-day period new year day 2018 alone customers made 300 million purchases ios sdk software development kit allows development mobile apps ios originally developing iphone prior unveiling 2007 apple then-ceo steve jobs intend let third-party developers build native apps ios instead directing make web applications safari web browser however backlash developers prompted company reconsider jobs announcing october 2007 apple would software development kit available developers february 2008 sdk released march 6 2008 sdk free download users mac personal computers available microsoft windows pcs sdk contains sets giving developers access various functions services ios devices hardware software attributes also contains iphone simulator mimic look feel device computer developing new versions sdk accompany new versions ios order test applications get technical support distribute apps app store developers required subscribe apple developer program combined xcode ios sdk helps developers write ios apps using officially supported programming languages including swift objective-c. companies also created tools allow development native ios apps using respective programming languages publish apps app store developers must pay 99 yearly fee access apple developer program apple announced united states 2018 waive fee nonprofit organizations governments developers options monetizing applications free model enables free apps increasing likelihood engagement freemium model makes app download free users offered optional additional features in-app require payments subscription model enables ongoing monetization renewable transactions paid model makes app paid download offers additional features paymium model enables paid app downloads paid in-app content in-app subscriptions originally introduced magazines newspapers music apps february 2011 giving developers 70 revenue earned apple 30 publishers could also sell digital subscriptions website bypassing apple fees allowed advertise website alternative apps 2016 multiple media outlets reported apps decreased significantly popularity recode wrote app boom editorial techcrunch stated air hopelessness surrounds mobile app ecosystem obvious demoralizing verge wrote original app store model selling apps buck two looks antiquated issues included consumer boredom lack app discoverability stated report 2014 lack new app downloads among smartphone users interview verge june 2016 phil schiller apple senior vice president worldwide marketing said apple renewed focus energy app store announced multiple significant changes including advertisements search results new app subscription model subscription model saw firmly established 70/30 revenue split developers apple change new 85/15 revenue split user stays subscribed developer app year opens possibility subscriptions apps select categories app data insights analyst company app annie released report october 2016 announcing china overtaken united states apple biggest market app store revenue third quarter 2016 chinese users spent 1.7 billion vs. approximately 1.5 billion american users june 2017 apple announced app store generated 70 billion revenue developers since 2008 launch july 10 2008 apple then-ceo steve jobs told usa today app store contained 500 third-party applications iphone ipod touch 25 percent free ten million applications downloaded first weekend september number available apps increased 3,000 100 million downloads years store surpassed multiple major milestones including 50,000 100,000 250,000 500,000 1 million 2 million apps billionth application downloaded april 24 2009 ipad released april 2010 approximately 3,000 apps available july 2011 16 months release 100,000 apps available designed specifically device apple publishes list yearly basis giving credit apps highest number downloads past year most-downloaded ios applications highest revenue generating ios applications time 2010-2018 apple rates applications worldwide based content determines age group appropriate according iphone os 3.0 launch event iphone allow blocking objectionable apps iphone settings following ratings apple detailed applications subject approval apple outlined sdk agreement basic reliability testing analysis applications may still distributed ad-hoc rejected author manually submitting request apple license application individual iphones although apple may withdraw ability authors later date apple employed mostly static analysis app review process means dynamic code reassembly techniques could defeat review process june 2017 apple updated app store review guidelines specify app developers longer ability use custom prompts encouraging users leave reviews apps release ios 11 late 2017 apple also let developers choose whether keep current app reviews updating apps reset additionally another update app store policies allows users optionally tip content creators voluntarily sending money november 2012 boyfriend maker dating sim game removed due reports references violent sexual acts paedophilia deemed inappropriate boyfriend maker age rating 4+ revised version called boyfriend plus approved apple april 2013 march 2013 hiddenapps approved appeared app store app provided access developer diagnostic menus allowed stock apps hidden enabled opt-out feature iads apple developer-driven advertisement system app removed shortly afterwards violating guidelines april 2013 apple removed appgratis then-successful app store market promoted paid apps offering one free day apple told things digital app violated two developer agreement clauses including apps display apps purchase promotion manner similar confusing app store rejected apps use push notifications send advertising promotions direct marketing kind apple however tell developers welcome resubmit changing app though much hope could survive anything like current incarnation november 2014 apple removed marijuana social networking app massroots reason given encourage excessive consumption alcohol illegal substances. ” february 2015 massroots reintroduced store apple changed enforcement guidelines allow cannabis social apps 23 states legal september 2015 discovered hundreds apps submitted approved app store using xcodeghost malicious version xcode development software issues prompted apple remove infected apps store issue statement working developers make sure ’ using proper version xcode security firm later published lists infected apps including china-only version angry birds 2 camcard lifesmart tinydeal.com wechat aftermath apple stated would make xcode faster download certain regions outside united states contacted developers ensure download code mac app store apple website provided code signature developers test running tampered version xcode june 2017 scamming trend discovered store developers make apps built non-existent services attach in-app purchase subscriptions opening dialogue buy app store search advertising space get app higher rankings one instance app name mobile protection clean security vpn would require payments 99.99 seven-day subscription short trial apple yet responded issues addition apple removed software licensed gnu general public license gpl app store due text apple terms service agreement imposing digital rights management proprietary legal terms incompatible terms gpl september 1 2016 apple announced starting september 7 would removing old apps function intended n't follow current review guidelines developers warned given 30 days update apps apps crash startup removed immediately additionally app names registered developers exceed 50 characters attempt stop developers inserting long descriptions irrelevant terms app names improve app ranking app store search results app intelligence firm sensor tower revealed november 2016 apple promised september announcement removing old apps removed 47,300 apps app store october 2016 238 percent increase prior number average monthly app removals june 2017 techcrunch reported apple turned app removal focus apps copying functionality popular apps example cited included popular game like flappy bird red ball hits charts hundreds thousands clones within weeks attempt capitalize initial wave popularity report also noted removals music apps serving pirated tracks publication wrote since initial september app removals began apple removed multiple hundreds thousands apps december 2017 new report techcrunch stated apple begun enforcing new restrictions use commercialized template app generation services originally introduced part apple 2017 developer conference new app store guidelines allow company ban apps making use templates commercial app services affected many small businesses techcrunch report citing local retailers restaurants small fitness studios nonprofits churches organizations benefit using templates app services due minimal costs developers received notice apple january 1 2018 deadline change respective apps news caught attention congress congressman ted lieu writing letter apple beginning december asking reconsider writing understanding many small businesses research organizations religious institutions rely template apps possess resources develop apps in-house new rules cast wide net specifically invalidating apps longstanding legitimate developers pose threat app store ’ integrity additionally news stricter enforcement caused significant criticism app development firms one company told techcrunch chose close business following news saying 4.2.6 rule enforcement final drop made us move bit faster decision close another company told publication way june guidelines changed would said ‘ ’ going target apps ... apple told us ’ targeted quality standpoint hit umbrella spam shocking every quality developer good actors furthermore latter company stated ’ much apps perform utility – ordering food third company said rule 4.2.6 concrete illustration danger apple ’ dominant position fourth said ’ wiped pretty much entire industry diy tools like appmakr also development suites like titanium towards end year apple updated guideline clarify companies organizations allowed use template apps long directly publish app remained violation rule commercial app services publish apps respective clients january 2017 apple complied request chinese government remove chinese version new york times app followed government efforts 2012 block times website stories hidden wealth among family members then-leader china wen jiabao published statement apple spokesperson told media informed app violation local regulations though would specify regulations added result app must taken china app store situation changes app store offer new york times app download china following july reported apple begun remove listings china apps circumvent government internet censorship policies new laws restricting virtual private network vpn services apple issued statement explaining app removals result developers complying new laws china requiring government license businesses offering vpns apps remain available markets business earnings call following month cook elaborated recent news explainining would obviously rather remove apps like countries follow law wherever business besides vpn services number internet calling apps including microsoft skype also removed chinese app store 2017 apple telling new york times similar vpn apps new apps also violated local law microsoft explained bbc news skype app temporarily removed working reinstate app soon possible though many news outlets reported chinese government increased efforts pressure crack internet freedom following apple ceo tim cook appearance china world internet conference december 2017 cook stated apple china share vision developing digital economy openness shared benefits free speech human rights activists criticized cook company maya wang human rights watch told washington post cook ’ appearance lends credibility state aggressively censors internet throws people jail critical social ills building artificial intelligence systems monitors everyone targets dissent ... version cyberspace chinese government building decidedly dystopian one ’ think anyone would want share ‘ common future. ’ apple spoken endorsed u.s senator patrick leahy told cnbc american tech companies become leading champions free expression commitment end borders ... global leaders innovation like apple opportunity moral obligation promote free expression basic human rights countries routinely deny rights cook told reuters hope time things couple things ’ pulled come back great hope great optimism however techcrunch jon russell criticized line thinking writing firstly apple ’ remove couple things reach china-based users rather couple hundred apps acknowledging even counting furthermore russell listed censorship efforts chinese government including vpn bans restrictions live video messaging apps wrote apple little choice follow beijing ’ line order continue business lucrative chinese market statements like cook ’ today dangerous massively underplay severity situation florida senator marco rubio also criticized cook appearance world internet conference describing situation ’ example company view desperate access chinese market place willing follow laws country even laws run counter companies ’ standards supposed august 2018 result chinese regulations 25,000 illegal apps pulled apple app store china
|
Operating systems
|
kde neon kde neon linux distribution developed kde based recent ubuntu long-term support lts release bundled set additional software repositories containing latest 64-bit versions plasma 5 desktop environment/framework qt 5 toolkit compatible kde software first announced june 2016 kubuntu founder jonathan riddell following departure canonical ubuntu parent company adopted steadily growing number linux users regularly appearing top 20 distrowatch.com popularity tables targets user demographic ubuntu official kde plasma-focused distribution kubuntu differing primarily much shorter time-frame users receive updated qt kde software offered four release channels user testing unstable developer editions kde neon linux distribution focused development kde emphasis bleeding edge software packages sourced directly kde offers programmers early access new features potentially cost greater susceptibility software bugs kde neon announced january 2017 distribution switching installer ubiquity calamares due ubiquity features february 2018 kde neon developers removed lts editions downloads page kept editions download mirrors lots people asking edition use difference may 2018 kde started changing kde neon based ubuntu 16.04 ubuntu 18.04 kde neon preview images based ubuntu 18.04 became available august 2018 kubuntu kde plasma suite ubuntu base os kde neon often mistaken kubuntu vice versa however primary difference two operating systems kubuntu maintains stable releases lts version ubuntu kde neon focuses updating developer editions kde applications without maintaining stable releases ubuntu unless root user actively chooses upgrade systems kde slimbook kde neon pre-installed well 1080p pinebook
|
Computer architecture
|
brouwer–heyting–kolmogorov interpretation mathematical logic brouwer–heyting–kolmogorov interpretation bhk interpretation intuitionistic logic proposed l. e. j. brouwer arend heyting independently andrey kolmogorov also sometimes called realizability interpretation connection realizability theory stephen kleene interpretation states intended proof given formula specified induction structure formula interpretation primitive proposition supposed known context context arithmetic proof formula computation reducing two terms numeral kolmogorov followed lines phrased interpretation terms problems solutions assert formula claim know solution problem represented formula instance formula_7 problem reducing q p solve requires method solve problem q given solution problem p identity function proof formula formula_22 matter p law non-contradiction formula_23 expands formula_24 putting together proof formula_24 function formula_8 converts pair b – formula_30 proof p formula_31 function converts proof p proof formula_19 – proof formula_19 function formula_8 formula_42 proving law non-contradiction matter p indeed line thought provides proof formula_43 well formula_3 proposition hand law excluded middle formula_45 expands formula_46 general proof according interpretation proof formula_45 pair b 0 b proof p 1 b proof formula_17 thus neither p formula_17 provable neither formula_45 general possible logical system formal negation operator proof formula_2 exactly n't proof formula_2 see gödel incompleteness theorems bhk interpretation instead takes formula_2 mean formula_2 leads absurdity designated formula_19 proof ¬formula_2 function converting proof formula_2 proof absurdity standard example absurdity found dealing arithmetic assume 0 1 proceed mathematical induction 0 0 axiom equality induction hypothesis 0 equal certain natural number n 1 would equal n +1 peano axiom sm sn n since 0=1 therefore 0 would also equal n 1 induction 0 equal numbers therefore two natural numbers become equal therefore way go proof 0=1 proof basic arithmetic equality thus proof complex arithmetic proposition furthermore get result necessary invoke peano axiom states 0 successor natural number makes 0=1 suitable formula_19 heyting arithmetic peano axiom rewritten 0 n → 0 s0 use 0 1 validates principle explosion bhk interpretation depend view taken constitutes function converts one proof another converts element domain proof different versions constructivism diverge point kleene realizability theory identifies functions computable functions deals heyting arithmetic domain quantification natural numbers primitive propositions form x=y proof x=y simply trivial algorithm x evaluates number always decidable natural numbers otherwise proof built induction complex algorithms one takes lambda calculus defining notion function bhk interpretation describes correspondence natural deduction functions
|
Programming language topics
|
architecture windows 9x windows 9x series operating systems refers kernel lies heart windows 9x architecture monolithic basic code considered similar function ms-dos 16-/32-bit hybrid requires ms-dos support operate windows 95 boots using following set files 32-bit shell command line interpreter windows 95 core registry configuration files virtual machine manager configuration manager installable file system manager device drivers system may also use config.sys contains settings commands executed loading command interpreter autoexec.bat batch file automatically executed loading command.com however two files critical boot process io.sys contains default setting case absence system windows config.sys autoexec.bat processed logo.sys may used splash screen windows 9x startup process consists 6 phases first two steps common operating system booting using traditional combination bios master boot record rom bios starts execution physical memory address ffff0h phase bios first executes power-on self-test checks existence boot disk drive found drive rom bios checks hard disk computer plug play bios addition bios checks ram i/o port addresses interrupt lines dma channels plug play devices disables found devices creates maps used unused resources re-enables devices master boot record loaded address 7c00h loads boot sector windows disk partition boot sector contains disk boot program bios parameter block table searches location root directory io.sys file loads io.sys file memory io.sys initializes minimal file allocation table driver loads msdos.sys memory displays starting windows depending bootdelay line msdos.sys file loads logo.sys file displays startup image screen drvspace.ini dblspace.ini file exists also loads drivers compressed disks windows attempts open registry file system.dat fails attempts open system.da0 configured msdos.sys registry double buffering also enabled windows 95 windows 98 analyze config.sys load ms-dos real mode drivers windows ignores config.sys file exist io.sys file loads drivers ifshlp.sys himem.sys setver.exe windows reserves upper memory blocks windows 95 operating system use expanded memory windows 95 windows 98 execute command.com process autoexec.bat loads terminate stay resident programs memory windows ignores step io.sys runs win.com win.com loads vmm32.vxd file memory accesses hard disk file contains important drivers real-mode virtual device driver loader checks duplicate virtual device drivers exist windows\system\vmm32 folder vmm32.vxd file case duplicates driver windows\system\vmm32 directory loaded windows 95 98 query real mode drivers calling int 2fh search drivers registry entry hkey_local_machine\system\currentcontrolset\services\vxd marked loaded external file vmm32 analyzes 386 enh section windows\system.ini file loads drivers listed important drivers loaded even listed windows registry system.ini windows\system\vmm32 directory real-mode virtual device drivers loaded driver initialization windows 95 windows 98 occurs vmm32 switches cpu real mode protected mode next step initialization protected mode drivers executed three phases device critical part initialization interrupts disabled device initialization file i/o allowed initcomplete phase initialization display driver windows switches graphical mode drivers loaded kernel32.dll gdi32.dll gdi.exe user32.dll user.exe shell32.dll explorer.exe files loaded next step startup process load network environment user prompted log network configured user logs desktop settings loaded registry desktop configuration uses default desktop windows starts programs defined startup folder win.ini programs defined registry keys run runonce runservices runservicesonce inside branches hkey_local_machine\software\microsoft\windows\currentversion hkey_current_user\software\microsoft\windows\currentversion\ program runonce registry key started program removed key windows 9x kernel 32-bit kernel virtual memory drivers provided .vxd files since windows 98 newer wdm drivers used however ms-dos kernel stays resident memory windows use old ms-dos 16-bit drivers installed
|
Computer architecture
|
termcap termcap terminal capability software library database used unix-like computers enables programs use display computer terminals device-independent manner greatly simplifies process writing portable text mode applications bill joy wrote first termcap library 1978 berkeley unix operating system since ported unix unix-like environments joy design reportedly influenced design terminal data store earlier incompatible timesharing system termcap database describe capabilities hundreds different display terminals allows programs character-based display output independent type terminal on-screen text editors vi emacs examples programs may use termcap programs listed category examples database describes termcap databases consist one descriptions terminals description must contain canonical name terminal may also contain one aliases name terminal canonical name aliases keys library searches termcap database description contains one capabilities conventional names capabilities typed boolean numeric string termcap library predetermined type capability name determines types capability syntax applications use termcap expect specific types commonly used capabilities obtain values capabilities termcap database using library calls return successfully database contents matches assumed type termcap descriptions constructed including contents one description another suppressing capabilities included description overriding adding capabilities matter storage model used termcap library constructs terminal description requested description including suppressing overriding time request termcap data stored text making simple modify text retrieved termcap library files environment variables term environment variable contains terminal type name termcap environment variable may contain termcap database often used store single termcap description set terminal emulator provide terminal characteristics shell dependent programs termpath environment variable supported newer termcap implementations defines search path termcap files original common implementation termcap library retrieves data flat text file searching large termcap file e.g. 500 kb slow aid performance utility reorder used put frequently used entries near beginning file bsd-4.4 based implementations termcap store terminal description hashed database e.g. something like berkeley db version 1.85 store two types records aliases point canonical entry canonical entry text termcap entry stored literally original termcap implementation designed use little memory newer implementations termcap interface generally require two-character name beginning entry capability names still two characters implementations tgetent function used read terminal description uses buffer whose size must large enough data assumed 1024 characters newer implementations termcap interface may relax constraint allowing null pointer place fixed buffer hiding data would fit e.g. via zz capability netbsd termcap terminfo library interface also emulates termcap interface actually use fixed-size buffer terminfo library emulation termcap allows multiple entries included without restricting position newer implementations termcap library may also provide ability though well documented special capability hz capability defined specifically support hazeltine 1500 terminal unfortunate characteristic using ascii tilde character '~ control sequence introducer order support terminal code used database know using tilde introduce certain control sequences also know substitute another printable character tildes displayed text since tilde text would interpreted terminal start control sequence resulting missing text screen garbling additionally attribute markers start end underlining took space screen comments database source code often referred hazeltine braindamage since hazeltine 1500 widely used terminal late 1970s important applications able deal limitations
|
Databases
|
kaspersky bans allegations russian government ties company kaspersky lab faced controversy allegations engaged russian federal security service fsb —ties company actively denied u.s. department homeland security banned kaspersky products government departments 13 september 2017 alleging kaspersky lab worked secret projects russia federal security service fsb october 2017 subsequent reports alleged hackers working russian government stole confidential data home computer national security agency contractor 2015 via kaspersky antivirus software kaspersky denied allegations stating software detected equation group malware samples uploaded servers analysis normal course operation company since announced commitments increased accountability soliciting independent reviews verification software source code announcing would migrate core infrastructure foreign customers russia switzerland according international new york times kaspersky become one russia recognized high-tech exports market share united states hampered origins according gartner evidence back doors software ties russian mafia state ... still concern ’ operate russia without controlled ruling party ceo eugene kaspersky prior work russian military education kgb-sponsored technical college led allegations employed russia expose us cyberweapons though denies analysts gartner peter firstbrook say suspicions firm ’ russian roots hindered expansion us company denied direct ties engaged russian government august 2015 bloomberg news reported kaspersky lab changed course 2012 high-level managers left fired jobs often filled people closer ties russia military intelligence services people actively aid criminal investigations fsb kgb ’ successor using data 400 million customers kaspersky slammed bloomberg coverage blog calling coverage sensationalist guilty exploiting paranoia increase readership july 2017 december 2017 u.s. government agencies phased use kaspersky software july 2017 united states general services administration gsa removed kaspersky lab list vendors authorized business u.s. government amid reports bloomberg mcclatchy dc alleging kaspersky lab worked secret projects russia federal security service fsb anti-russian sentiment also grown country wake investigation russian interference 2016 presidential election kaspersky denied reports stating inappropriate ties government never received request russian government affiliated organization create participate secret projects including one anti-ddos protection 8 september 2017 u.s. electronics store chain best buy pulled kaspersky products amid concerns ties 13 september 2017 department homeland security issued order stating 90 days kaspersky products banned use within u.s. civilian federal government citing concerns ties certain kaspersky officials russian intelligence government agencies requirements russian law allow russian intelligence agencies request compel assistance kaspersky intercept communications transiting russian networks 6 october 2017 wall street journal —citing multiple people knowledge matter —alleged 2015 hackers working russian government used kaspersky antivirus software steal classified material home computer belonging national security agency nsa contractor according report incident occurred 2015 remained undiscovered early 2016 stolen material reportedly included details nsa penetrates foreign computer networks computer code uses spying defends networks inside u.s. new york times reported hacks discovered israeli intelligence agents hacked kaspersky network 11 october 2017 wall street journal additionally alleged russian intelligence uses kaspersky software scan computers worldwide material interest company denied reports arguing baseless paranoia witch hunt considered suspicious major u.s. media outlets simultaneously went us almost full force fantasized simultaneously receiving order 've got confused details 23 october 2017 kaspersky announced global transparency initiative would accountable security issues surrounding products would allow third-party analysts validate products business practices order validate integrity company stated trust must repeatedly earned ongoing commitment transparency accountability program reaffirmation company commitment earning maintaining trust customers partners every day 25 october 2017 kaspersky confirmed incident described wall street journal occurred 2014 result software detected zip file containing samples source code equation group user enabled kaspersky security network ksn features software files automatically uploaded kaspersky malware sample ksn analysis assumption new malware variant eugene kaspersky stated ordered sample destroyed kaspersky claimed antivirus software temporarily disabled pc user order install pirated copy microsoft office software re-enabled detected equation group code well unrelated backdoor infections created keygen program office may facilitated third-party access computer 13 november 2017 british intelligence agency mi6 raised suspicions kaspersky lab software distributed free 2 million uk barclays customers 2 december 2017 barclay announced would longer provide new customers company software also around 2 december 2017 britain national cyber security centre advised national security precaution uk government departments avoid russia-based anti-virus software kaspersky stated compelling case present extend advice wider public 9 december 2017 u.s. government banned kaspersky federal civilian military computers part broader defense bill january 2018 twitter banned kaspersky advertising twitter stating kaspersky lab operates using business model inherently conflicts acceptable twitter ads business practices citing department homeland security warning kaspersky 15 may 2018 kaspersky lab announced would migrating core infrastructure russia new data centres switzerland kaspersky software antivirus definitions foreign markets compiled digitally signed switzerland end 2018 products targeting russia still compiled existing domestic infrastructure user data foreign markets stored processed swiss servers end 2019 swiss operations overseen third-party organization holding access necessary verify trustworthiness products business processes accompanied one three planned transparency centre facilities responsible stakeholders allowed inspect kaspersky source code business practices verify integrity kaspersky stated move first foremost response evolving ultra-connected global landscape challenges cyber-world currently facing step goal accountable trustworthy business practices december 2017 february 2018 company sued trump administration arguing ban bill attainder violation due process arguing government unfairly tarnished kaspersky reputation cases dismissed may 30 2018 judge colleen kollar-kotelly former presiding judge foreign intelligence surveillance court declaring unsubstantial
|
Computer security
|
distributed concurrency control distributed concurrency control concurrency control system distributed computer network bernstein et al 1987 weikum vossen 2001 database systems transaction processing transaction management distributed concurrency control refers primarily concurrency control distributed database also refers concurrency control multidatabase multi-transactional object environment e.g. federated database grid computing cloud computing environments major goal distributed concurrency control distributed serializability global serializability multidatabase systems distributed concurrency control poses special challenges beyond centralized one primarily due communication computer latency often requires special techniques like distributed lock manager fast computer networks low latency like switched fabric e.g. infiniband commitment ordering commit ordering general serializability technique achieves distributed serializability global serializability particular effectively large scale without concurrency control information distribution e.g. local precedence relations locks timestamps tickets thus without performance penalties typical serializability techniques raz 1992 common distributed concurrency control technique strong strict two-phase locking ss2pl also named rigorousness also common centralized concurrency control technique ss2pl provides serializability strictness commitment ordering properties strictness special case recoverability utilized effective recovery failure commitment ordering allows participating general solution global serializability large-scale distribution complex transactions distributed locking typical heavy performance penalty due delays latency saved using atomic commitment protocol needed distributed database distributed transactions atomicity e.g. two-phase commit simpler one reliable system together local commitment ordering variant e.g. local ss2pl instead distributed locking achieve global serializability entire system commitment ordering theoretical results applicable whenever atomic commitment utilized partitioned distributed recoverable transactional data including automatic distributed deadlock resolution technique utilized also large-scale parallel database single large database residing many nodes using distributed lock manager replaced homogeneous multidatabase comprising many relatively small databases loosely defined process supports transactions partitioned data participates atomic commitment complies fitting single node using commitment ordering e.g. ss2pl strict co together appropriate atomic commitment protocol without using distributed lock manager
|
Databases
|
fork particle fork particle computer graphics visual effects modeling software development kit sdk developed sold fork particle inc fork particle uses real time particle system technology simulate visual effects particle effects cgi explosions fire rain smoke dust etc fork particle used video games visual simulation software flight simulator licensed game developers windows macos linux playstation 3 playstation 4 xbox 360 xbox one notable fork particle licensees include ubisoft trickstar games firaxis games zenimax online studios electronic arts microsoft lego sony video games utilized fork particle ’ technology include elder scrolls online rocksmith 2014 edition empire earth iii lego universe splosion man sid meier civilization v sid meier civilization vi fork particle real time technology component particle engine meant integrated used video game engine computer graphics engine particle effects authored vfx artists designers using fork particle ’ effects modeling tool brought user ’ 3d computer graphics environment 2d computer graphics environment particle effects simulated fork particle ’ engine real time displayed user application ’ graphics engine fork particle sdk includes components real time particle engine fork runtime sdk particle editor modeling tool fork particle studio live update application particle effects editing fork live tuner particle effects definitions batch file exporter fork particle also includes incorporation integrations partner technologies
|
Distributed computing architecture
|
glide os glide os cross-platform web desktop developed jumptuit notable operating desktop operating systems like microsoft windows mac os x linux mobile operating systems like apple ios google android honeycomb blackberry os blackberry tablet os qnx webos symbian windows mobile glide os compatible variety web browsers including microsoft internet explorer mozilla firefox apple safari google chrome jumptuit originally transmedia founded donald leka began develop cloud computing platform could manage media across proprietary platforms company shifted focus business clients consumers unveiling glide national association broadcasters nab convention april 18 2005 launching free consumer version november 30 2005 current html5 version glide 4.0 presented harvard university cyberposium 16 technology conference november 13 2010 previous version 3.0 launched may 20 2008 things digital conference allthingsd 2006 intel announced plans include glide ultra-mobile pcs however project yet manifested consumer product glide provides support tablets including apple ipad hp touchpad blackberry playbook samsung galaxy motorola xoom recently amazon kindle fire barnes noble nook tablet glide os company numerous awards including pc world top 100 products year laptop magazine top 50 products year econtent magazine top 100 companies year red herring top 100 companies year among others glide features desktop-like interface displays desktop glide hd web portal glide includes several web-based applications including integrated office suite media players photo editor calendar software webmail address book micro-blogging service publishing platform internet search client
|
Distributed computing architecture
|
text analysis portal research tapor text analysis portal research gateway highlights tools code snippets usable text analysis types project housed university alberta currently led geoffrey rockwell stéfan sinclair kirsten c. uszkalo milena radzikowska users portal explore tools use research rate review comment tools browse curated lists recommended tools add tags tools tool pages tapor consist short description authorial information screenshot tool tags suggested related tools user ratings comments code snippet pages also contain excerpt code link full code location online earlier version portal based mcmaster university consisted network six leading humanities computing centres canada mcmaster university victoria collaboration malaspina uc university alberta university toronto université de montréal law university new brunswick tapor developed network nodes universities across canada would servers local labs best text tools industry sources could aggregated made available would supplemented representative texts special infrastructure ... earlier version allowed researchers experiment text analysis tools either using without account tapor tools interface getting account could define texts wanted operate create list favorite tools tapor also sponsored casta canadian symposium text analysis conferences including face text casta 2004 focused text visualization selected papers face text published text technology journal computer text processing
|
Computational linguistics
|
lidb lidb acronym line information database used united states canada traditional telephone companies store retrieve caller id records local phone switches also known class 5 switches use ss7 signaling protocol query centralized databases pass information call set
|
Computer security
|
devuan devuan fork debian uses sysvinit instead systemd default newer debian releases project name portmanteau debian vua veteran unix admins release debian 8 alienated developers users due project adoption systemd first stable release devuan published may 25 2017 devuan package repository mirrors upstream debian local modifications made needed allow init systems systemd modified packages include policykit udisks devuan supposed work like corresponding debian release devuan provide systemd repositories still retains libsystemd0 removed dependencies instead continuing debian practice using toy story character names release codenames devuan aliases releases using planet names first stable release shared debian 8 codename jessie however devuan release named minor planet 10464 second stable release named ascii minor planet 3568 permanent alias devuan unstable branch ceres named dwarf planet devuan 2.0.0 ascii released june 9 2018
|
Computer security
|
row database context relational database row—also called tuple—represents single implicitly structured data item table simple terms database table thought consisting rows columns row table represents set related data every row table structure example table represents companies row would represent single company columns might represent things like company name company street address whether company publicly held vat number etc.. table represents association employees departments row would associate one employee one department implicit structure row meaning data values row requires row understood providing succession data values one column table row interpreted relvar composed set tuples tuple consisting two items name relevant column value row provides column column expects data value particular type example one column might require unique identifier another might require text representing person name another might require integer representing hourly pay cents
|
Databases
|
linux tegra linux tegra linux4tegra l4t gnu/linux based system software distribution nvidia nvidia tegra processor series used nvidia jetson board series sort sibling nvidia vibrante linux publications system software comes example jetpack software development kit sdk nvidia official nvidia download page bears entry jetpack 3.2 uploaded 2018-03-08 states
|
Computer architecture
|
inindo way ninja inindo way ninja 伊忍道 打倒信長 inindou datou nobunaga スーパー伊忍道 打倒信長 super inindou datou nobunaga super famicom version role-playing video game developed published koei originally released pc8801sr pc9801 msx2 home computer sharp x68000 remade super nes also released north america game fictional account japan warring states period set 1582 player assumes role iga ninja whose village destroyed conquest demonic warlord oda nobunaga ninja must travel across feudal japan enlisting aid numerous ninja sages hermits ronin samurai wizards companions order avenge clan game fictitious account end oda nobunaga campaign conquer unify japan beginning game references rebellion akechi mitsuhide honnō-ji temple historical nobunaga died committing seppuku time game point year 1601 would prior birth tokugawa shogunate tokugawa ieyasu actual game begins year 1582 player kill nobunaga end year 1601 game several hazardous dungeons stand path victory well selection optional dungeons played order player chooses encounters monsters outlaws occur randomly dungeons game world map player characters npcs move around battlefield turn-based fashion attack cast magic spells use items complete game player must recruit npcs order successfully survive dungeons large scale battles order recruit characters player must build certain degree trust talking tea houses inns every character recruited characters rival clans join player strategy war simulation elements game well gaining trust japanese feudal lord spying committing acts sabotage competing daimyo player join battle provinces characterized era outcome battles changes lords possession individual provinces alter outcome game aid hinder player progress neighboring provinces nobunaga must conquered order advance final section game middle stories player follows either normal path magician path randomly selected completing first dungeon quest path leads different enemies random encounters example magician path causes western mythological monsters hellhound marchosias appear due smaller resolution snes character names shortened chinese version ported ms-dos 1993 playable english os 2003 pc-9801 version game ported windows 98 part koei 25th anniversary pack vol.1 standalone version published 2005 windows version runs pc-9801 game emulator saving emulator emulates drive switching operation port requires use mouse third scenario inaccessible running emulated environment gamepro review called inindo impressive mix adventure fantasy epic military strategy good rpg featuring myth magic mayhem history great fantasy
|
Computer architecture
|
beanshell beanshell java-like scripting language invented patrick niemeyer runs java runtime environment jre uses variation java syntax addition scripting commands syntax beanshell allows users define functions called within script underpinning philosophy pollute syntax many extensions syntactic sugar thereby ensuring code written java compiler usually executed interpretively beanshell without changes almost much vice versa makes beanshell popular testing debugging tool java virtual machine jvm platform beanshell supports scripted objects simple method closures like perl javascript beanshell open source project incorporated many applications apache openoffice apache ant weblogic server application server apache jmeter jedit imagej jump gis apache taverna many others beanshell provides easy integrate application programming interface api also run command-line mode within graphical environment first versions beanshell 0.96 1.0 released patrick niemeyer 1999 followed series versions beanshell 1.3.0 released august 2003 version 2.0b1 released september 2003 culminating version 2.0b4 may 2005 january 2015 newest release posted official webpage beanshell included linux distribution debian since 1999 beanshell undergoing standardization java community process jcp jsr 274 following jcp approval beanshell jsr review ballot june 2005 visible activity taking place around beanshell jsr 274 status dormant since java 9 java instead includes jshell different read–eval–print loop repl shell based java syntax indicating beanshell continued fork beanshell beanshell2 created may 2007 now-defunct google code web site beanshell2 project made number fixes enhancements beanshell multiple releases latest version beanshell2 v2.1.8 released february 2014 since closure google code project hosted github december 2012 following proposal accept beanshell apache incubator project beanshell licensed apache software foundation migrated apache extras changing license apache license 2.0 project accepted instead projected become part apache commons future time due changes developers personal circumstances beanshell community however complete move apache remained apache extras project since released beanshell 2.0b5 used apache openoffice apache taverna windows automated installer beanshell double-click created 2013 includes desktop integration features
|
Programming language topics
|
database preservation database preservation usually involves converting information stored database form likely accessible long term technology changes without losing initial characteristics context content structure appearance behaviour data version 1.0 software independent archiving relational databases siard format developed swiss federal archives 2007 designed archiving relational databases vendor-neutral form siard archive zip-based package files based xml sql:1999 siard file incorporates database content also machine-processable structural metadata records structure database tables relationships zip file contains xml file describing database structure metadata.xml well collection xml files one per table capturing table content siard archive may also contain text files binary files representing database large objects blobs clobs siard permits direct access individual tables exploring zip tools siard archive operational database supports re-integration archived database another relational database management system rdbms supports sql:1999 addition siard supports addition descriptive contextual metadata recorded database embedding documentation files archive siard version 1.0 homologized standard ech-0165 2013 version 2.0 siard preservation format designed developed swiss federal archives auspices e-ark project version 2.0 based version 1.0 defines format backwards-compatible version 1.0 new features version 2.0 include xml schema created researcher josé carlos ramalho university minho capture table information data relational database published 2007 database preservation toolkit dbptk allows conversion database formats including connection live systems purposes digitally preserving databases toolkit allows conversion live backed-up databases preservation formats siard xml-based format created purpose database preservation toolkit also allows conversion preservation formats back live systems allow full functionality databases example supports specialized export mysql optimized phpmyadmin database fully experimented using web interface toolkit originally part roda project released developed e-ark project together new version siard preservation format toolkit uses input output modules module supports read and/or write particular database format live system new modules easily added implementation new interface adding new drivers research projects regard include
|
Databases
|
locator/identifier separation protocol locator/id separation protocol lisp map-and-encapsulate protocol developed internet engineering task force lisp working group basic idea behind separation internet architecture combines two functions routing locators client attached network identifiers client one number space ip address lisp supports separation ipv4 ipv6 address space following network-based map-and-encapsulate scheme lisp identifiers locators ip addresses arbitrary elements like set gps coordinates mac address internet architecture board october 2006 routing addressing workshop renewed interest design scalable routing addressing architecture internet key issues driving renewed interest include concerns scalability routing system impending exhaustion ipv4 address space since iab workshop several proposals emerged attempted address concerns expressed workshop proposals based common concept separation locator identifier numbering internet devices often termed loc/id split current namespace architecture used internet protocol uses ip addresses two separate functions several advantages decoupling location identifier lisp specifically recent discussion several lisp use cases may found ietf active workgroup establishing standards lisp 2016 lisp specifications experimental track lisp workgroup plans moving core specifications onto standards track 2017 locator/identifier separation protocol network elements routers responsible looking mapping end-point-identifiers eid route locators rloc process invisible internet end-hosts mappings stored distributed database called mapping system responds lookup queries lisp beta network initially used bgp-based mapping system called lisp alternative topology lisp+alt replaced dns-like indexing system called ddt inspired lisp-tree protocol design made easy plug new mapping system different design proved benefits proposals already emerged compared testbed developed gain real-life experience lisp participants include google facebook ntt level3 intouch n.v. internet systems consortium january 2014 around 600 companies universities individual contributors 34 countries involved geographical distribution participating routers prefixes responsible observed lispmon project website updated daily multi-company lisp-community initiative lisp4.net/lisp6.net publishes relevant information beta network http //www.lisp4.net/ http //www.lisp6.net/ lisp-lab project coordinated upmc/lip6 aims building lisp network experimentation platform exclusively built using open source lisp nodes openlisp acting itr/etr tunnelling routers ms/mr mapping servers/resolvers ddt root proxy itr/etr partners include two academic institutions upmc tpt two cloud networking sme alphalink nss two network operators renater orange two smes access/edge networking border 6 ucopia one internet exchange point rezopole information http //www.lisp-lab.org platform opened external partners 2014/2015 already interconnected lisp beta network openlisp ddt root lisp also key component number commercial offerings njedge.net vinci consulting provide lisp based services icao considering ground-based lisp candidate technology next-generation aeronautical telecommunications network atn solution development part sesar single european sky atm research fci activities several proposals separating two functions allowing internet scale better proposed instance gse/8+8 network based solution shim6 hip ilnp host based solutions
|
Internet protocols
|
flicky idea flicky came sega senior leadership wanted exceed success namco mappy 1983 yoji ishii yoshiki kawasaki developed flicky sega one year originally game simply player catch ambiguous dots maze taking inspiration popular song japanese variety show kawasaki gave game urban theme bird characters game originally titled busty flippy finally settling flicky flicky first ported sg-1000 japan later japanese home consoles 1991 flicky released north america europe sega genesis character continued hold cameo appearances sega video games notably within sonic hedgehog series flicky platform game player takes control flightless blue bird named flicky ability run side-to-side jump player must collect small yellow birds called chirps take exit clear round according game artist yoshiki kawasaki flicky friend chirps although players may think mother chirps follow flicky chain collected exit bonus points awarded bringing multiple chirps back single chain 48 total stages stage takes place single wraparound screen scrolls horizontally flicky always center stages completed game loops infinitely increased difficulty mode collected chirps disperse chain comes contact enemy chirps wear sunglasses chirps behave unpredictably dispersed two enemy types standard rounds house cats called tigers green iguanas called iggys enemies simply avoided also defeated throwable items available levels items include telephones flower pots cups bottles flicky pick item walking throw jumping sometimes diamonds may appear thrown rather provide bonus points also bonus rounds flicky attempts catch many falling chirps possible net spark develop flicky came sega desire exceed namco mappy 1983 become popular japanese arcades sega game designer yoji ishii boss wanted design similar dot eater game better flicky developed course one year designed yoji ishii collaboration artist yoshiki kawasaki game evolved simple game kawasaki first envisioned player would catch dots maze took inspiration popular song sparrows power lines 1970s japanese variety show migoro tabegoro waraigoro made main character sparrow platforms walls wires however found power line theme boring thus changed background apartment building taking inspiration one outside office window kawasaki felt anyone around children experienced emotion wanting keep children safe outside returning safe home team wanted imbue message protect children game according kawasaki emotion drives flicky kawasaki used poorly calibrated graphics tablet draw game graphics chirps originally ambiguous dots would disappear collected kawasaki changed dots trailed player increased size 8x8 pixels make way interesting design size large enough simple chick design add difficulty game chirps programmed behave unpredictably touched enemy chirps given sunglasses deemed bad chirps game testing began team created 100 levels four background designs barely space left game kawasaki able change colors backgrounds create variety testing iggy added game flicky originally titled busty american sega branch asked team change term slang usage english game titled flippy changed shortly release 2002 ishii stated trademark issues united states 2018 said flippy similar mappy flicky released arcades may 1984 like many early 1980s sega arcade games flicky ported sg-1000 console port retains 40 arcade levels restructured feature iggy enemy addition behavior chirps slightly modified graphics changed version later ported several home platforms japan including msx sharp x1 fujitsu fm-7 nec pc-8801 1991 flicky ported sega genesis released north america europe japan port released sega meganet genesis port flicky reviewed multiple western publications found game poor graphics sound highly addictive enjoyable gameplay reviewers noted poor initial impressions based appearance sound found sprites simple colors garish music repetitive however began play game found simple appearance complemented simple yet engaging gameplay computer video games described flicky guilty pleasure discussed cute appearance positive light reviewers electronic gaming monthly concluded game aimed children based game cuteness aesthetic provided lower scores accordingly critics computer video games mean machines wrote employees offices disappearing game room play flicky julian mean machines wrote crazy know game crappy laughably-simple pathetic sounding prove addictive challenging long-lasting virtually mega drive game true numerous sega video game compilations feature flicky genesis version compiled game kanzume vol 1 1994 sega cd compilation japan featured cd quality remixes original soundtrack genesis port also featured sonic mega collection 2002 sega genesis collection 2006 sonic ultimate genesis collection 2009 sega mega drive classic collection 2010 even genesis-based plug play devices arcade version released japan sega ages memorial collection vol 1 1996 sega saturn sega memorial selection 1998 windows flicky also ported mobile devices first port 2001 sega ages line japan march 2003 similar variant appeared sonic cafe service exclusive japan 2007 sonic cafe port upgraded better graphics ported north america sega mobile service genesis port released steam 2010 flicky character made cameo appearances several sega arcade games effectively becoming mascot sega early arcade years teddy boy blues 1985 appears shooting target among sega mascots pengo puzzle game bloxeed used special weapon drop blocks playing field also playable sdi 1987 use cheat code flicky minor cameo appearance flash point wish player good luck round racing game super monaco gp 1989 appears racetrack banners game screen flicky also become entire species reoccurring minor character sonic hedgehog series featured prominently sonic 3d flickies island 1996 flicky continued minor cameo appearances sega titles including shenmue 1999 gunstar super heroes 2005 mario sonic olympic games 2007
|
Computer architecture
|
zerodium zerodium american information security company founded 2015 based washington d.c.. main business acquiring premium zero-day vulnerabilities functional exploits security researchers companies reporting research along protective measures security recommendations corporate government clients founder chaouki bekrar also known founding vupen defunct 2015 zerodium first company release full pricing chart zero-days ranging 5,000 1,500,000 per exploit company reportedly spending 400,000 600,000 per month vulnerability acquisitions
|
Computer security
|
fame database fame forecasting analysis modeling environment time series database sungard comes along suite apis domain-specific programming language fame software environment several development phases long history lawrence c. rafsky founded gemnet software corp create fame 1981 independent software company located ann arbor michigan first version software delivered harris bank 1983 company purchased citicorp 1984 time development focused time series oriented database engine 4gl scripting language citigroup sold fame private investors headed warburg pincus 1994 management focused fixing bugs developing remote database server access fame invested expanding fame database engine emphasis also placed extending fame creating object-oriented java interface called timeiq replicated many features fame 4gl java period also saw release accesspoint provides url access fame objects multiple output formats acquisition fame sungard 2004 resulted new set priorities focused core fame engine extending 4gl scripting language including another key goal modernize tools support working fame software environment example developers worked leverage fame web access transform fame software run service allows developers architects plug online analytical processing capabilities fame software existing enterprise software empower internal systems better handle complex queries made financial professionals many fame customers run environment within overall technology stack providing improved access wider distribution data analytics rather access standalone fame installations enterprise-oriented technology teams load fame databases procedures within multiple client analytical database server mcadbs providing access fame data via browser applications microsoft excel statistical applications advanced reporting systems crystal reports 2010 sungard merged fame marketmap data marketmap brand fis global acquired sungard 2015 early fame ’ evolution customers obtained loaders company required build maintain processes loading vendor feeds sungard provides service delivers content throughout day fame siteserver fame channel finds fame desktop add-in excel fame desktop excel add-in supports =fmd =fms formula 4gl command prompt formulas placed excel spreadsheets linked fame objects analytics stored fame server sample excel templates research analytics act accelerators clients available template library fame desktop add-in first renamed fame populator marketmap analytics fame connector matlab matlab environment technical computing applications also used financial sector fixed income analysts equity research groups investment firms customers store content fame use matlab access model data matlab-fame connector uses fame java toolkit link matlab scripts fame objects bita curve connector bita curve workstation provides platform link “ database ” analytics content warehoused fame bita curve connector fame users better visualize work content warehouse fame r interface fame customers developed released free software interface links fame objects open source r statistical package originally developed federal reserve board features include sasefame sas provides interface fame databases called sasefame provides dynamic read write access sas application fame databases fame server process troll interface troll ’ interface fame provides read write access troll application fame server directly local fame database 1982–1994 gemnet introduced first release fame 1983 citicorp purchased company 1984 development milestones period mcadbs users could use thin c hli client leverage power 4gl remote host via client/server tcp 7.5 release also introduced important 4gl features including postscript reports database features global names formulas 1994–2004 period focus improving managed content delivery onsite fame warehouses hosted asp fame servers milestones included 2004–present acquired sungard fame ’ development focus shifted 4gl scripting language core fame features milestones included fame 9.2 also added new 4gl debugging features analytical functions graphics reporting improvements core 4gl features included move function new forms shift filespec functions fame search command enhanced path option support memory mapped fame databases tune cache megabytes option helped users better manage large volume warehouses fame 9.3 also introduced new graphical features including bubble charts fame 10 opens environment real-time analysis larger database storage well support new frequencies millisecond weekly patterns new database formats increase maximum size 256 gb period fame also focused expanding managed content delivered database well out-of-the-box object models warehouse builders leverage loading proprietary content
|
Databases
|
macintosh xl macintosh xl modified version apple lisa personal computer made apple computer inc macintosh xl configuration computer shipped macworks xl lisa program allowed 64 k macintosh rom emulation identical machine previously sold lisa 2/10 lisa os macintosh xl 400k 3.5 floppy drive internal 10 mb proprietary widget hard drive provision optional 5 10 mb external profile hard drive addition parallel interface card machine uses motorola 68000 cpu clocked 5 mhz together 512kb ram time release january 1985 macintosh xl colloquially referred hackintosh although name since used generally describe macintosh computers assembled unusual combinations parts apple transition intel processors denote pcs running osx86 hacked version mac os x macintosh xl discontinued april 1985 roots lisa — unlike macintosh computers — stock macintosh xl used rectangular pixels resolution macintosh xl 12 inch 30.5 cm display 720x364 square pixels available via macintosh xl screen kit upgrade changed resolution 608x432 cpu could replaced new cpu board containing 8 mb ram called xlerator 18 maximum upgraded ram conventional add-in ram cards 2 mb four times larger maximum capacity earlier macintosh computers modifications cpu board macintosh xl could accommodate 4 mb ram macworks plus developed sun remarketing successor macworks xl order provide application compatibility macintosh plus computer macworks plus added support 800 kb 3.5-inch floppy disk system software version 6.0.3 macworks plus ii extended 7.5.5 limit imposed 68000 processors re-badging xl last-ditch effort apple save poorly selling lisa usurped macintosh line two years marginal sales apple unprepared record number orders placed newest member macintosh family despite relative success macintosh xl discontinued unavailable parts ordered keep xl production last parts ran apple made decision shut production good 1986 apple offered lisa/xl owners opportunity turn computer along us 1,498 receive exchange macintosh plus hard disk 20 list price us 4,098 time apple dropped xl price list september 1985 sun remarketing logan utah bought number apple remaining inventory continued sell license updated version macworks plus re-branded macintosh professional though new lisas available sale development continued macworks plus support installed base lisas making relevant closely related cousin macintosh plus macintosh xl shares legacy lisa however increased sales emulation macintosh operating system proved macintosh family badly needed professional environment could support larger monitors greater memory expandability macintosh 512k offered
|
Computer architecture
|
trust one internet security trust one tno approach towards internet software security issues internet communication software packages sort secrecy needed usually sort encryption applied trust one approach teaches one oneself trusted comes storage keys behind applied encryption technology many encryption technologies rely trust external party instance security secure end-to-end ssl connections relies trust certificate authority ca trust one design philosophy requires keys encryption always stay hands user applies implies external party access encrypted data assumed encryption strong enough also implies external party provide backup mechanism password recovery although philosophy trust one least assures reliability communication user creates real life society many communication means rely trust relationship least two parties tno crypt microsoft store example utility leverages methodology https //www.microsoft.com/en-us/p/tno-crypt/9phgpmz9dkvf activetab=pivot overviewtab
|
Computer security
|
blancco blancco ltd. international data security company specializes data erasure computer reuse corporations governments computer remarketing companies founded headquartered joensuu finland company operates offices across europe north america middle east russia asia australasia blancco wholly owned subsidiary regenersis strategic outsourcing company consumer technology companies 1997 janne tervo kim väisänen co-founded carelian innovation ltd company ’ first data erasure product blancco data cleaner released 1999 2000 carelian innovations ltd. changed name blancco ltd. sun microsystems blancco formed partnership 2007 deliver secure flexible data erasure solutions 2007 blancco approved included nato information assurance product catalogue niapc company expanded product line 2008 introduction blancco 4.5 client series added server support data center edition enables safe reuse hard drives mass storage environments clients sun hp emc need deep data expunging company released blancco mobile smartphone erasure 2012 2011 blancco lun launched 2012 blancco 5 management console 3 released company also acquired dban 2012 received common criteria certification year blancco acquired regenersis april 2014 blancco ’ data wipe products scale single reusable pc erasure tool software erasure requirements mass storage environments data centers various versions support erasure different hardware configurations blancco ’ security certificates approvals include common criteria iso 15408 communications electronics security group united kingdom information technology group cesg nato listed nato information assurance product catalogue
|
Computer security
|
asprox botnet asprox botnet network hacking tool used gain access ipv4 address network attacks microsoft windows mac e-mails untrusted websites social networking websites block fresh installation software compromise devices like computers printers ipads phones tablets playstation infection removed anti-virus like norton mcafee avast avg webroot etc network firewall lock programming tool security remove infection prevent network contamination future well since discovery 2008 asprox botnet involved multiple high-profile attacks various websites order spread malware botnet consists roughly 15,000 infected computers may 2008 although size botnet highly variable controllers botnet known deliberately shrink later regrow botnet order prevent aggressive countermeasures community botnet propagates somewhat unusual way actively searches infects vulnerable websites running active server pages finds potential target botnet performs sql injections website inserting iframe redirects user visiting site site hosting malware botnet usually attacks waves goal wave infect many websites possible thus achieving highest possible spread rate wave completed botnet lay dormant extended amount time likely prevent aggressive counterreactions security community initial wave took place july 2008 infected estimated 1,000 2,000 pages additional wave took place october 2009 infecting unknown number websites another wave took place june 2010 increasing estimated total number infected domains 2,000 estimated 10,000 13,000 within day infection targets asprox botnet randomly determined google searches high-profile websites infected past infections received individual coverage
|
Computer security
|
michigan cyber range michigan cyber range established merit network summer 2012 teach cybersecurity certification courses provide cybersecurity-related services merit network staffs operates michigan cyber range ann arbor michigan range infrastructure contains virtual servers placed merit fiber-optic network michigan cyber range currently four physical locations michigan campuses eastern michigan university ypsilanti michigan ferris state university big rapids northern michigan university marquette 110th attack wing facility battle creek expansion plans could involve many 10 sites michigan cyber range foundational piece michigan governor rick snyder cyber initiative launched october 2011 improve cybersecurity efforts protect families communities businesses government merit network ceo president welch professor helped create united states military academy cybersecurity program worked david behen state brigadier general mike stone michigan national guard create vision cyber range secure start-up funding throughout 2012 public private organizations pledged funds michigan cyber range created staffed william j joe adams joined merit network june 2012 executive director research michigan cyber range adams career signal corps officer u.s. army formerly cio national defense university adams also served professor research scientist west point network engineer supreme headquarters allied powers europe shortly hiring adams assembled staff create maintain michigan cyber range cybersecurity training environment called alphaville alphaville virtual environment simulates computer systems town hall library small company police station power company organizations companies practice detection mitigation cybersecurity threats using alphaville environment november 9 2012 michigan governor snyder participated ribbon-cutting ceremony michigan cyber range michigan cyber range partners include merit network u.s. department homeland security u.s. department energy national institute standards technology dte energy consumers energy plante moran pllc juniper networks eastern michigan university michigan state police michigan department military veterans affairs michigan economic development corporation michigan department technology management budget january 2013 michigan cyber range began collaboration arrangement mile2 developer provider vendor neutral professional certifications cybersecurity industry mile2 provides course materials instructors certification exams michigan cyber range range offers full curriculum training courses many cybersecurity disciplines mile2 recognized u.s. national security agency nsa information assurance ia courseware institution company nsa cnss-accredited well nist niccs-mapped organizations businesses use michigan cyber range conduct cybersecurity exercises simulate various kinds cyberattacks july 24 2013 members west michigan cyber security consortium wmcsc participated red team–blue team exercise wmcsc team members defended resources virtual town cyber attacks initiated michigan cyber range staff michigan cyber range members west michigan cyber security consortium wmcsc members michigan cyber civilian corps mic3 joined forces second red vs. blue team exercise campus davenport university july 23 2014 september 2013 merit network introduced new cybersecurity service called merit secure sandbox uses infrastructure michigan cyber range organizations use service cybersecurity exercises educational purposes software testing march 25 2014 michigan cyber range opened first cybersecurity hub kind u.s. national guard base dedicating facility located 110th attack wing battle creek michigan michigan governor rick snyder attended ribbon-cutting ceremony event teams battle creek participated cybersecurity exercises similar teams united states military academy west point california national guard october 15 2014 consumers energy dte energy conducted incident response exercise using michigan cyber range representatives two power companies michigan state police worked closely cyber range staff create exercise called power phoenix required participants diagnose mitigate malware-compromised computer network scada environment early 2015 wayne county community college district wcccd conjunction michigan cyber range mile2 hosted groundbreaking veteran retraining program 13-week program prepared group military veterans career cybersecurity 17 students participated retraining program veterans selected based experience aptitude conjunction wayne county ’ veterans affairs office 2016 michigan cyber range added new publicly-accessible hubs southeast michigan location provides certification courses cybersecurity training exercises product hardening/testing direct connection michigan cyber range cyber range hubs opened inside velocity center macomb-oakland university sterling heights march 18th pinckney community high school december 7th fall 2016 merit network michigan governor rick snyder launched governor high school cyber challenge competition high school students test skills computer science information technology cybersecurity final round challenge happened north american international cyber summit hosted governor snyder october 17 2016 three-person team clinton high school crowned champions competition defeating 28 teams inaugural event michigan cyber range provided challenges infrastructure annual cyber competition michigan cyber range twice named north american authorized training center atc year mile2 2017 michigan cyber range doubled participation governor ’ high school cyber challenge 292 high school students 584 included successful elicitation participation native american tribal areas michigan another milestone addition cyber range hubs florida georgia continuing commitment since 2015 cyber range provides exercises support infrastructure us cyber challenge national cyber competition sponsored department homeland security milestones include creation virtual environments facilitate cybersecurity involvement kinetic training exercises creation international cyber exercise ice promote collaboration partnership states ’ national guard units countries participating state partnership program spp successful launch regional cybersecurity education collaboration partnership state michigan cisco ice event 2017 run naics – 12 states 10 countries participated
|
Computer security
|
packet storm packet storm security popular information security website offering current historical computer security tools exploits security advisories operated group security enthusiasts publish new security information offer tools educational testing purposes site originally created ken williams sold 1999 kroll o'gara year later given back security community kroll o'gara packet storm awarded mixter 10,000 whitepaper contest dedicated mitigation distributed denial service attacks today offer suite consulting services site referenced hundreds books 2013 packet storm launched bug bounty program buy working exploits would given back community testing purposes later year worked security researcher help expose large scale shadow profile issue popular internet site facebook facebook claimed 6 million people affected additional testing packet storm exposed numbers accurately reported
|
Computer security
|
ultrasparc t2 sun microsystems ultrasparc t2 microprocessor multithreading multi-core cpu member sparc family successor ultrasparc t1 chip sometimes referred codename niagara 2 sun started selling servers t2 processor october 2007 t2 commodity derivative ultrasparc series microprocessors targeting internet workloads computers storage networking devices processor manufactured 65 nm available eight cpu cores core able handle eight threads concurrently thus processor capable processing 64 concurrent threads new features include 8 stages integer operations instead 6 t1 t2 processor found following products sun fujitsu computer systems sun also licensed t2 processor themis computer introduced first non-sun t2-based servers 2008 april 2008 sun released servers based ultrasparc t2 plus processor smp capable version ultrasparc t2 sun released ultrasparc t2 plus processor following changes ultrasparc t2 plus processors found following products sun fujitsu computer systems two-way smp servers four-way smp server high performance computing virtual laboratory canada built compute cluster using 78 sun sparc enterprise t5140 servers two 1.2 ghz t2 plus chips t5140 server cluster close 10,000 compute threads making ideal high-throughput workloads like t1 t2 supports hyper-privileged execution mode sparc hypervisor runs mode partition t2 system 64 logical domains two-way smp t2 plus system 128 logical domains run independent operating system instance ultrasparc t2 offers variety performance improvements former ultrasparc t1 processor ultrasparc t2 performance related tunings documented oracle engineers blogs peak power consumption go high 123 watts t2 typically consumes 95 watts nominal system operation 72 watts t1 sun explains due higher degree system integration onto chip april 12 2006 sun announced tape-out ultrasparc t2 sun announced t2 release 7 august 2007 billing world fastest microprocessor april 9 2008 sun announced ultrasparc t2 plus december 11 2007 sun made ultrasparc t2 processor design publicly available gnu general public license via opensparc project release includes
|
Computer architecture
|
psx digital video recorder psx sony digital video recorder fully integrated playstation 2 video game console released japan december 13 2003 since designed general-purpose consumer video device marketed main sony corporation instead sony computer entertainment carry usual playstation branding high cost resulted poor sales meaning psx never released outside japan making commercial failure device fully functional digital video recorder included infrared remote control s-video composite video rf inputs able tune analog vhf catv also linked playstation portable transfer photos videos music via usb ports features software non-linear video editing image editing audio editing dvd+r support introduced future update first device use sony xrossmediabar xmb graphical user interface later used playstation portable playstation 3 2008-era bravia tvs psx fully supports playstation playstation 2 software slot-loading dvd drive onboard ee+gs chip unification ps2 emotion engine graphics synthesizer chips online game compatibility available using broadband connection games use ps2 hdd final fantasy xi supported well psx supplied game controllers two controller ports back device psx compatible standard ps/ps2 controllers memory cards exception pocketstation variant dualshock 2 controller marketed specifically psx also sold featured 4-meter long cord bit longer standard versions controller two playstation memory card ports front psx behind panel cover different placement memory card slots located controller ports standard ps2 consoles psx incompatible playstation multitap ps2 counterpart psx-compatible multitap ever produced games require use two usb ports also incompatible psx like standard ps2 consoles psx laid horizontally stood vertically psx released eight retail configurations lifespan 5000 series embossed logo top grey stripe back shipped 160 gb hard disk drives 7000 series colored logo top black stripe back contained 250 gb drives software updates made available disc download 7500/7700 models added ghost reduction tuner inclusion bs uhf/vhf connectors varied model final revision series supported playstation portable video export via memory stick revisions console support psp games compatible umd discs models two sets indicator lights power lights infrared receivers one along front horizontal orientation second strip along top-back vertical orientation 'disk rec indicator front device later models known ps1 first playstation console came known colloquially provisional codename psx adopted echo msx home computer standard sold sony companies throughout 1980s cause confusion device referred psx initially displayed ceatec white silver yellow red blue white variant released commercially limited edition silver model made available 2004
|
Computer architecture
|
zen microarchitecture zen codename computer processor microarchitecture amd first used ryzen series cpus february 2017 first zen-based preview system demonstrated e3 2016 first substantially detailed event hosted block away intel developer forum 2016 first zen-based cpus codenamed summit ridge reached market early march 2017 zen-derived epyc server processors launched june 2017 zen-based apus arrived november 2017 zen clean sheet design differs long-standing bulldozer architecture zen-based processors use 14 nm finfet process reportedly energy efficient execute significantly instructions per cycle smt introduced allowing core run two threads cache system also redesigned making l1 cache write-back zen processors use three different sockets desktop mobile ryzen chips use am4 socket bringing ddr4 support high-end desktop zen-based threadripper chips support quad-channel ddr4 ram offer 64 pcie 3.0 lanes vs 24 lanes using tr4 socket epyc server processors offer 128 pci 3.0 lanes octal-channel ddr4 using sp3 socket socket am4 cpus based zen microarchitecture 7th gen apus athlon x4s based excavator microarchitecture zen based soc design memory pcie sata usb controllers incorporated chip processor cores advantages bandwidth power expense chip complexity die area soc design allows zen microarchitecture scale laptops small-form factor mini pcs high-end desktops servers according amd main focus zen increasing per-core performance new improved features include zen architecture built 14 nanometer finfet process subcontracted globalfoundries turn licenses 14nm process samsung electronics gives greater efficiency 32 nm 28 nm processes previous amd fx cpus amd apus respectively summit ridge zen family cpus use am4 socket feature ddr4 support 95 w tdp thermal design power newer roadmaps n't confirm tdp desktop products suggest range low-power mobile products two zen cores 5 15 w 15 35 w performance-oriented mobile products four zen cores zen core decode four instructions per clock cycle includes micro-op cache feeds two schedulers one integer floating point segments core two address generation units four integer units four floating point units two floating point units adders two multiply-adders however using multiply-add-operations may prevent simultaneous add operation one adder units also improvements branch predictor l1 cache size 64 kib instructions per core 32 kib data per core l2 cache size 512 kib per core l3 1–2 mb per core l3 caches offer 5× bandwidth previous amd designs amd began planning zen microarchitecture shortly re-hiring jim keller august 2012 amd formally revealed zen 2015 team charge zen led keller left september 2015 3-year tenure amd senior fellow chief architect michael clark zen originally planned 2017 following arm64-based k12 sister core amd 2015 financial analyst day revealed k12 delayed favor zen design allow enter market within 2016 timeframe release first zen-based processors expected october 2016 november 2015 source inside amd reported zen microprocessors tested met expectations significant bottlenecks found december 2015 rumored samsung may contracted fabricator amd 14 nm finfet processors including zen amd then-upcoming polaris gpu architecture clarified amd july 2016 announcement products successfully produced samsung 14 nm finfet process amd stated samsung would used needed arguing would reduce risk amd decreasing dependence one foundry processors based zen use 14 nm finfet silicon processors reportedly produced globalfoundries tsmc prior zen amd smallest process size 28 nm utilized steamroller excavator microarchitectures immediate competition intel skylake kaby lake microarchitecture also fabricated 14 nm finfet though intel planned begin release 10 nm parts later 2017 comparison intel 14 nm finfet amd claimed february 2017 zen cores would 10 smaller intel later announced july 2018 10nm mainstream processors expected second half 2019 identical designs die shrinks would use less current power frequency voltage cpus usually power limited typically ~125w ~45w mobile smaller transistors allow either lower power frequency higher frequency power one zen major goals 2016 focus performance per-core targeting 40 improvement instructions per cycle ipc predecessor excavator comparison offered 4–15 improvement previous architectures amd announced final zen microarchitecture actually achieved 52 improvement ipc excavator inclusion smt also allows core process two threads increasing processing throughput better use available resources zen processors also employ sensors across chip dynamically scale frequency voltage allows maximum frequency dynamically automatically defined processor based upon available cooling amd demonstrated 8-core/16-thread zen processor outperforming equally-clocked intel broadwell-e processor blender rendering handbrake benchmarks zen supports avx2 requires two clock cycles complete avx2 instruction compared intel one zen supports ddr4 memory eight channels ecc pre-release reports stated apus using zen architecture would also support high bandwidth memory hbm however first demonstrated apu use hbm previous apus amd relied shared memory gpu cpu processors built 14 nm node finfet silicon show reduced power consumption therefore heat 28 nm 32 nm non-finfet predecessors equivalent designs computationally powerful equivalent heat output/power consumption zen also uses clock gating reducing frequency underutilized portions core save power comes frome amd sensemi technology using sensors across chip dynamically scale frequency voltage zen added support amd secure memory encryption sme amd secure encrypted virtualization sev secure memory encryption real-time memory encryption done per page table entry encryption occurs hardware aes engine keys managed onboard security processor arm cortex-a5 boot time encrypt page allowing ddr4 memory including non-volatile varieties encrypted amd sme also makes contents memory resistant memory snooping cold boot attacks secure encrypted virtualization sev feature allows memory contents virtual machine vm transparently encrypted key unique guest vm memory controller contains high-performance encryption engine programmed multiple keys use different vms system programming management keys handled amd secure processor firmware exposes api tasks incorporating much southbridge soc zen cpu includes sata usb pci express nvme links augmented available socket am4 chipsets add connectivity options including additional sata usb connections support amd crossfire nvidia sli amd announcing radeon instinct line argued upcoming zen-based naples server cpu would particularly suited building deep learning systems 128 pcie lanes per naples cpu allows eight instinct cards connect pcie x16 single cpu compares favorably intel xeon line 40 pcie lanes zen architecture used current-generation desktop ryzen cpus also epyc server processors successor opteron processors apus first desktop processors without graphics processing units codenamed summit ridge initially expected start selling end 2016 according amd roadmap first mobile desktop processors amd accelerated processing unit type codenamed raven ridge following late 2017 amd officially delayed zen q1 2017 august 2016 early demonstration architecture showed 8-core/16-thread engineering sample cpu 3.0 ghz december 2016 amd officially announced desktop cpu line ryzen brand release q1 2017 also confirmed server processors would released q2 2017 mobile apus h2 2017 march 2 2017 amd officially launched first zen architecture-based octacore ryzen desktop cpus final clock speeds tdps 3 cpus released q1 2017 demonstrated significant performance-per-watt benefits previous k15h piledriver architecture octacore ryzen desktop cpus demonstrated performance-per-watt comparable intel broadwell octacore cpus march 2017 amd also demonstrated engineering sample server cpu based zen architecture cpu codenamed naples configured dual-socket server platform cpu 32 cores/64 threads first generation ryzen processors ryzen 1000 series ryzen apus identified either g ge suffix name february 2018 amd announced v1000 series embedded zen+vega apus four skus amd announced march 2017 would release server platform based zen codenamed naples second quarter year platform include 1- 2-socket systems cpus multi-processor configurations communicate via amd infinity fabric chip supports eight channels memory 128 pcie 3.0 lanes 64 lanes used cpu-to-cpu communication infinity fabric installed dual-processor configuration amd officially revealed naples brand name epyc may 2017 june 20 2017 amd officially released epyc 7000 series cpus launch event austin texas february 2018 amd also announced epyc 3000 series embedded zen cpus
|
Computer architecture
|
mappy player guides mappy police mouse mansion cats called meowkies mewkies japan retrieve stolen goods player uses left-right joystick move mappy single button operate doors mansion six floors hallways four five versions stolen items stashed mappy cats move floors bouncing trampolines various places house mappy cats land floor way way mappy passes cats air mappy unharmed mappy runs cat anywhere else lose life trampolines break mappy bounces four times row trampolines change color depending many times mappy used without rest addition meowkies boss cat goro nyamco japanese also roams around faster less aggressive meowkies throughout levels goro hides behind different recoverable objects mappy recovers item goro hiding behind player receives 1000 points addition score item current world record score set may 12 2019 marc holliday marc holliday scored 3,423,470 points beating previous record 2,313,890 held mike kasper opening closing doors important feature game doors open towards doorknobs opening door cat near score 50 points stun cat knocking meowkie goro backwards meowkies open doors go open ones goro open door opens away blue doors opened blast slow moving microwave direction doorknob trap cats touches remove board wave reaches edge screen cats caught points gained goro trapped wave score doubled cats removed way return shortly round completed loot retrieved player takes longer usual clear round hurry message appears music speeds cats move quickly aggressively meowkies added two appear ready drop meowkies normally immediately following hurry message meowkies arrive later player takes much longer green disc goro face named gosenzo coin drop onto top-middle platform chase mappy effectively meowkies kill jumping gosenzo open doors stopped microwave doors objects third round every fourth round bonus round mappy unbothered cats must bounce across series trampolines popping fifteen different suspended red balloons 200 pts goro 2000 points along way bonus 5000 pts awarded balloons popped music ends every bonus round new feature added gameplay bells freeze cats hurry message also appear sooner 256 levels japan-only port game initially released famicom japanese version nes msx 1984 followed later port sega game gear 1991 followed video game console-only sequel called mappy-land 1986 released united states taxan 1998 re-released part microsoft revenge arcade pc mappy also several japan-only sequels including hopping mappy 1986 arcades mappy kids 1989 famicom also version called mappy arrangement released 1995 part namco classic collection vol 1 1995 arcades famicom version original mappy re-released japan part famicom mini series 2004 mappy included ms. pac-man collection manufactured jakks pacific also featured 1996 game boy compilation namco gallery vol 1 later released xbox gamecube pc playstation 2 2005 appear game boy advance version also appears namco museum ds mappy also re-released part pac-man arcade party arcade machine 2010 mappy playable playstation portable version namco museum battle collection mappy included dot-s set also one first arcade titles released virtual console 2002 released japan pachinko title mappy park 2003 two mobile games released japan titles 2009 titled september 2011 new mobile game titled bandai namco games bringing back series titled ios 2015 japan part bandai namco shiftylook initiative animated mappy web series titled mappy beat announced 2012 series written directed scott kurtz kris straub also performed character voices presented using limited animation style blamimations series story follows mappy working thankless job security guard former foe goro company nyamco accompanied friends fellow nyamco employees laid-back digging-obsessed dig dug dim good-natured sky kid along bandai namco characters working office mappy beat premiered shiftylook youtube channel july 22 2013 ran 13 episodes roughly eight minutes length final episode released january 20 2014 kurtz also made guest appearance mappy concurrent bravoman animated series bravoman turn appearing final story arc mappy portrayed guest voice dax gordine following closure shiftylook channel removed youtube making episodes longer available
|
Computer architecture
|
open architecture computing environment open architecture computing environment oace specification aimed provide standards-based computing environment order decouple computing environment software applications proposed united states department defense 2004
|
Distributed computing architecture
|
xeon phi xeon phi series x86 manycore processors designed made intel intended use supercomputers servers high-end workstations architecture allows use standard programming languages apis openmp since originally based earlier gpu design intel shares application areas gpus main difference xeon phi gpgpu like nvidia tesla xeon phi x86-compatible core less modification run software originally targeted standard x86 cpu initially form pcie-based add-on cards second generation product codenamed knights landing announced june 2013 second generation chips could used standalone cpu rather add-in card june 2013 tianhe-2 supercomputer national supercomputer center guangzhou nscc-gz announced world fastest supercomputer used intel xeon phi coprocessors ivy bridge-ep xeon processors achieve 33.86 petaflops xeon phi product line directly competes nvidia tesla amd radeon instinct lines deep learning gpgpu cards larrabee microarchitecture development since 2006 introduced wide 512-bit simd units x86 architecture based processor design extended cache-coherent multiprocessor system connected via ring bus memory core capable four-way multithreading due design intended gpu well general purpose computing larrabee chips also included specialised hardware texture sampling project produce retail gpu product directly larrabee research project terminated may 2010 another contemporary intel research project implementing x86 architecture many-multicore processor 'single-chip cloud computer prototype introduced 2009 design mimicking cloud computing computer datacentre single chip multiple independent cores prototype design included 48 cores per chip hardware support selective frequency voltage control cores maximize energy efficiency incorporated mesh network inter-chip messaging design lacked cache-coherent cores focused principles would allow design scale many cores teraflops research chip prototype unveiled 2007 experimental 80-core chip two floating point units per core implementing 96-bit vliw architecture instead x86 architecture project investigated intercore communication methods per-chip power management achieved 1.01 tflops 3.16 ghz consuming 62 w power intel many integrated core mic prototype board named knights ferry incorporating processor codenamed aubrey isle announced 31 may 2010 product stated derivative larrabee project intel research including single-chip cloud computer development product offered pcie card 32 in-order cores 1.2 ghz four threads per core 2 gb gddr5 memory 8 mb coherent l2 cache 256 kb per core 32 kb l1 cache power requirement ~300 w built 45 nm process aubrey isle core 1,024-bit ring bus 512-bit bi-directional connects processors main memory single board performance exceeded 750 gflops prototype boards support single precision floating point instructions initial developers included cern korea institute science technology information kisti leibniz supercomputing centre hardware vendors prototype boards included ibm sgi hp dell others knights corner product line made 22 nm process size using intel tri-gate technology 50 cores per chip intel first many-cores commercial product june 2011 sgi announced partnership intel use mic architecture high performance computing products september 2011 announced texas advanced computing center tacc use knights corner cards 10 petaflops stampede supercomputer providing 8 petaflops compute power according stampede comprehensive petascale computing environment second generation intel knights landing mics added become available increasing stampede aggregate peak performance least 15 petaflops 15 november 2011 intel showed early silicon version knights corner processor 5 june 2012 intel released open source software documentation regarding knights corner 18 june 2012 intel announced 2012 hamburg international supercomputing conference xeon phi brand name used products based many integrated core architecture june 2012 cray announced would offering 22 nm 'knight corner chips branded 'xeon phi co-processor 'cascade systems june 2012 scalemp announced virtualization update allowing xeon phi transparent processor extension allowing legacy mmx/sse code run without code changes important component intel xeon phi coprocessor core vector processing unit vpu vpu features novel 512-bit simd instruction set officially known intel initial many core instructions intel imci thus vpu execute 16 single-precision sp 8 double-precision dp operations per cycle vpu also supports fused multiply-add fma instructions hence execute 32 sp 16 dp floating point operations per cycle also provides support integers vpu also features extended math unit emu execute operations reciprocal square root logarithm thereby allowing operations executed vector fashion high bandwidth emu operates calculating polynomial approximations functions 12 november 2012 intel announced two xeon phi coprocessor families using 22 nm process size xeon phi 3100 xeon phi 5110p xeon phi 3100 capable 1 teraflops double precision floating point instructions 240 gbit/s memory bandwidth 300 w. xeon phi 5110p capable 1.01 teraflops double precision floating point instructions 320 gbit/s memory bandwidth 225 w. xeon phi 7120p capable 1.2 teraflops double precision floating point instructions 352 gbit/s memory bandwidth 300 w. 17 june 2013 tianhe-2 supercomputer announced top500 world fastest tianhe-2 used intel ivy bridge xeon xeon phi processors achieve 33.86 petaflops fastest list two half years lastly november 2015 cores knights corner based modified version p54c design used original pentium basis intel mic architecture leverage x86 legacy creating x86-compatible multiprocessor architecture use existing parallelization software tools programming tools include openmp opencl cilk/cilk plus specialised versions intel fortran c++ math libraries design elements inherited larrabee project include x86 isa 4-way smt per core 512-bit simd units 32 kb l1 instruction cache 32 kb l1 data cache coherent l2 cache 512 kb per core ultra-wide ring bus connecting processors memory knights corner instruction set documentation available intel code name second generation mic architecture product intel intel officially first revealed details second generation intel xeon phi products 17 june 2013 intel said next generation intel mic architecture-based products available two forms coprocessor host processor cpu manufactured using intel 14 nm process technology knights landing products include integrated on-package memory significantly higher memory bandwidth knights landing contains 72 airmont atom cores four threads per core using lga 3647 socket supporting 384 gb far ddr4 2133 ram 8–16 gb stacked near 3d mcdram version hybrid memory cube core two 512-bit vector units supports avx-512 simd instructions specifically intel avx-512 foundational instructions avx-512f intel avx-512 conflict detection instructions avx-512cd intel avx-512 exponential reciprocal instructions avx-512er intel avx-512 prefetch instructions avx-512pf national energy research scientific computing center announced phase 2 newest supercomputing system cori would use knights landing xeon phi coprocessors 20 june 2016 intel launched intel xeon phi product family x200 based knights landing architecture stressing applicability traditional simulation workloads also machine learning model lineup announced launch included xeon phi bootable form-factor two versions standard processors processors integrated intel omni-path architecture fabric latter denoted suffix f model number integrated fabric expected provide better latency lower cost discrete high-performance network cards 14 november 2016 48th list top500 contained 10 systems using knights landing platforms pcie based co-processor variant knight landing never offered general market discontinued august 2017 included 7220a 7240p 7220p coprocessor cards intel announced discontinuing knights landing summer 2018 models boost peak speeds adding 200 mhz base frequency running one two cores running three maximum number cores chips boost 100 mhz base frequency chips run high-avx code frequency reduced 200 mhz knights hill codename third-generation mic architecture intel announced first details sc14 manufactured 10 nm process knights hill expected used united states department energy aurora supercomputer deployed argonne national laboratory however aurora delayed favor using advanced architecture focus machine learning 2017 intel announced knights hill canceled favor another architecture built ground enable exascale computing future new architecture expected 2020–2021 terms exascale computing high performance computing hpc got meanwhile linked intel towards term omni-path architecture opa publications knights mill intel codename xeon phi product specialized deep learning initially released december 2017 nearly identical specifications knights landing knights mill includes optimizations better utilization avx-512 instructions enables 4-way hyperthreading single-precision variable-precision floating-point performance increased expense double-precision floating-point performance empirical performance programmability study performed researchers authors claim achieving high performance xeon phi still needs help programmers merely relying compilers traditional programming models still far reality however research various domains life sciences deep learning computer-aided engineering demonstrated exploiting thread- simd-parallelism xeon phi achieves significant speed-ups
|
Computer architecture
|
self-xss self-xss social engineering attack used gain control victims web accounts self-xss attack victim attack unknowingly runs malicious code web browser thus exposing attacker self-xss operates tricking users copying pasting malicious content browsers web developer console usually attacker posts message says copying running certain code user able hack another user account fact code allows attacker hijack victim account past similar attack took place users tricked pasting malicious javascript address bar browser vendors stopped preventing easily running javascript address bar attackers started using self-xss current form web browser vendors web sites taken steps mitigate attack mozilla firefox google chrome begun implementing safeguards warn users self-xss attacks facebook google+ others display warning message users open web developer console link pages explaining attack detail self part name comes fact user attacking themself xss part name comes abbreviation cross-site scripting attacks result malicious code running legitimate site however attacks n't much else common xss attack website users protect fixed site operator making site secure whereas self-xss social engineering attack user savvy users protect site operator anything
|
Computer security
|
adobe atmosphere adobe atmosphere informally abbreviated atmo software platform interacting 3d computer graphics 3d models created commercial program could explored socially using browser plugin available free charge atmosphere originally developed attitude software 3d anarchy later bought adobe systems product spent majority lifetime beta testing adobe released last version atmosphere version 1.0 build 216 february 2004 discontinued software december year atmosphere focused explorable worlds later officially called environments linked together portals analogous world wide web hyperlinks portals represented spinning squares red green blue revolved around floated ground portals indicative atmosphere team desire mirror functionality web pages although world described codice_1 codice_2 file images sounds kept separately usually gif wav mp3 format objects worlds scriptable using specialized dialect javascript allowing immersive environment worlds could generated dynamically using php using javascript world author could link object web page user could example launch web page clicking billboard advertisement ctrl+shift+click earlier versions version 1.0 atmosphere also boasted support using macromedia flash animations windows media video textures atmosphere-based worlds consisted mainly parametric primitives floors walls cones primitives could painted solid color given image-based texture made subtractive invisible subtractive primitives could used cut holes primitives build complex shapes many worlds also contained animated polygon meshes made possible atmosphere implementation subcomponent viewpoint corporation viewpoint media player however viewpoint stopped supporting atmosphere subcomponent time atmosphere discontinued unlike centralized structure active worlds environments primarily built within alphaworld atmosphere worlds spread throughout internet usually hosted author web site codice_1 files binary ascii versions codice_1 file format though ascii format phased later releases codice_1 files could generated dynamically using server-side content management systems demonstrated atmoworlds.com worlds directory users represented worlds avatars later builds option allowed user see avatar early quirk atmosphere displayed users whose avatars yet loaded colorful slanted cylinders announced arrival users bug zapper sound whereas activeworlds possible communicate users within 200-meter radius atmosphere users could chat users world model appropriate atmosphere considering smaller sizes worlds technically users could chat anyone yacp channel reference irc protocol see exception worlds would receive many visitors often case homeworld worlds would clone creating duplicate channels world would often cause confusion users. ref name= patent 9/788526 /ref world developers wrote scripts limited communication users within certain distance greater realism built-in havok physics engine detailed rendering dynamic lighting support lighting effects like radiosity distance fog glare also contributed realism atmosphere worlds many world authors wanted create large worlds order build realistic cities example worlds would often take excessive amount time load visitor web browser especially visitor using slower dial-up connection alleviate issue atmosphere supported pattern reminiscent inline frames html sections world – subworlds models – would load user neared city could load block block rather one atmosphere problems however excessive memory usage exacerbated use advanced features embedded models flash movies many worlds atmosphere chat console used windows-1252 character encoding inception adobe photoshop album included 3d gallery feature could publish photo album atmosphere world adobe atmosphere began 3d anarchy attitude software originally relied irc chat functionality original user interface rather eccentric featuring two ever-present eyeballs would occasionally blink later versions adopted conventional interface although one pre-supplied avatars based eyes adobe bought technology attitude november 1999 announced first public beta version new name march 26 2001 atmosphere came two stand-alone applications builder used build online worlds player allowed users explore worlds 3d anarchy components called editor chat respectively addition applications adobe provided browser plugin explore worlds within web browser companion chat server called adobe community server ran irc-like protocol known yet another chat protocol yacp beta-testing three components atmosphere available free charge adobe distributed server software atmosphere open source license permissive open source license beta versions builder notoriously unstable program crashed frequently user wrote program automatically saved worlds opened builder fixed interval preventing users losing hours work august 2002 adobe began scrap stand-alone player instead devoting resources develop atmosphere plugin time viewed buggy less attractive alternative player company focus plugin viewed attempt compete flash developer macromedia purchased adobe part plugin ran internet explorer windows despite frequent requests community members expand atmosphere support mozilla-based browsers linux mac os unofficially plugin ran mozilla-based browsers limited functionality one user able run stand-alone player linux using wine albeit less-than-usable state part efforts garner commercial interest software adobe introduced support embedding atmosphere worlds pdf documents viewing acrobat reader company also distanced atmosphere reputation platform online chat first disabling chat various official adobe-hosted worlds deleting worlds version 1.0 released october 22 2003 point adobe decided charge builder simply renamed atmosphere continue provide plugin server free beta-testing program ended adobe sent free copies builder registered beta-testers late 2003 early 2004 via airborne express dhl following long period relative silence developers adobe announced december 2004 would continue development software according faq adobe adobe retains copyright atmosphere give permission others distribute copies software company decision stop making builder available purchase essentially halted creation new worlds plugin remains available free download adobe ftp site however adobe still provides 3d capabilities popular adobe acrobat product features developed using technology new zealand right hemisphere rather using atmosphere nearly atmosphere development team went work acrobat team atmosphere component still use adobe scripting api atmosphere components including scene graphs physics engine licensed companies viewpoint atmosphere dedicated beta-testing community whose members constructed many worlds avatars promoted software word mouth conducted community events world tours building contests largest contests star wars 3d large-scale effort create comprehensive set worlds avatars based star wars trilogy creations unveiled july 4 2003 festivities officially continued july 6 another large effort held themed lord rings trilogy community members also organized attended events world tours featured innovative worlds week tech talks originally weekly event intended world avatar developers initially community discussion occurred either worlds appropriate adobe user-to-user forums later supplement official atmosphere product web site discussion forums community created large number resource web sites listed beta-testers dubbed atmosphere developers zombies recognition long hours adobe employees apparently spent developing software running joke team instead typical meal brains atmosphere zombies ingested eyeballs due visual nature product beta-testing community eagerly awaited new releases development team developers invariably answered would take two weeks response became euphemism ready despite decentralized structure atmosphere popularity world-building contests atmosphere community still preferred gather worlds created adobe partner digitalspace adobe annually-revamped homeworld digitalspace atmospherians community homeworld primary starting place new users community found easier establish lively crowds adobe shut homeworld along number adobe-hosted worlds many builders made attempts emulating success homeworld starting points however without constant stream new users homeworld experienced attempts failed attract small group regulars years adobe ended support atmosphere worlds remain online though maintained fewer still continue support multi-user chat nonetheless software continues enjoy small fanbase meets online year halloween
|
Web technology
|
wireless mesh network wireless mesh network wmn communications network made radio nodes organized mesh topology also form wireless ad hoc network mesh refers rich interconnection among devices nodes wireless mesh networks often consist mesh clients mesh routers gateways mobility nodes less frequent nodes constantly frequently move mesh spends time updating routes delivering data wireless mesh network topology tends static routes computation converge delivery data destinations occur hence low-mobility centralized form wireless ad hoc network also sometimes relies static nodes act gateways truly all-wireless ad hoc network mesh clients often laptops cell phones wireless devices mesh routers forward traffic gateways may need connected internet coverage area radio nodes working single network sometimes called mesh cloud access mesh cloud depends radio nodes working together create radio network mesh network reliable offers redundancy one node longer operate rest nodes still communicate directly one intermediate nodes wireless mesh networks self form self heal wireless mesh networks work different wireless technologies including 802.11 802.15 802.16 cellular technologies need restricted one technology protocol see also mesh networking wireless mesh architecture first step towards providing cost effective low mobility specific coverage area wireless mesh infrastructure effect network routers minus cabling nodes built peer radio devices cabled wired port like traditional wlan access points ap mesh infrastructure carries data large distances splitting distance series short hops intermediate nodes boost signal cooperatively pass data point point b making forwarding decisions based knowledge network i.e perform routing first deriving topology network wireless mesh networks relatively stable-topology network except occasional failure nodes addition new nodes path traffic aggregated large number end users changes infrequently practically traffic infrastructure mesh network either forwarded gateway wireless ad hoc networks client mesh networks traffic flows arbitrary pairs nodes rate mobility among nodes high i.e. link breaks happen frequently wireless mesh networks start break low communication performance type infrastructure decentralized central server centrally managed central server relatively inexpensive reliable resilient node needs transmit far next node nodes act routers transmit data nearby nodes peers far away reach single hop resulting network span larger distances topology mesh network must relatively stable i.e. much mobility one node drops network due hardware failure reason neighbors quickly find another route using routing protocol mesh networks may involve either fixed mobile devices solutions diverse communication needs example difficult environments emergency situations tunnels oil rigs battlefield surveillance high-speed mobile-video applications board public transport real-time racing-car telemetry self-organizing internet access communities important possible application wireless mesh networks voip using quality service scheme wireless mesh may support routing local telephone calls mesh applications wireless mesh networks similar wireless ad hoc networks current applications principle similar way packets travel around wired internet—data hops one device another eventually reaches destination dynamic routing algorithms implemented device allow happen implement dynamic routing protocols device needs communicate routing information devices network device determines data receives – either pass next device keep depending protocol routing algorithm used attempt always ensure data takes appropriate fastest route destination multi-radio mesh refers different radios operating different frequencies interconnect nodes mesh means unique frequency used wireless hop thus dedicated csma collision domain radio bands communication throughput likely increase result available communication channels similar providing dual multiple radio paths transmit receive data one often cited papers wireless mesh networks identified following areas open research problems 2005 70 competing schemes routing packets across mesh networks include ieee developed set standards title 802.11s less thorough list found ad hoc routing protocol list standard autoconfiguration protocols dhcp ipv6 stateless autoconfiguration may used mesh networks mesh network specific autoconfiguration protocols include
|
Distributed computing architecture
|
shiftboard shiftboard community online scheduling recruitment time management tool lets individuals groups participating organizations within community collaborate participation overall staff work coverage general accountability employee scheduling software similar job board communications online forum shiftboard provides work portals used large small civic non-profit/arts charity global healthcare municipal staffing organizations shiftboard active member open source software community located seattle washington united states
|
Web technology
|
apple icon image format apple icon image format icon format used apple inc. macos supports icons 16 × 16 32 × 32 48 × 48 128 × 128 256 × 256 512 × 512 1024 × 1024 pixels 1- 8-bit alpha channels multiple image states example open closed folders fixed-size icons scaled operating system displayed intermediate size file format consists 8 byte header followed number icons time format improved support compression parts pixel data 32-bit is32 il32 ih32 it32 argb ic04 ic05 pixel data often compressed per channel format similar packbits sources mentioned os supports compressed uncompressed data chunks following pseudocode decompresses data example decompress various image viewers load *.icns files free open source converters png also exist gtk+ load *.icns resources since 2007 tools supporting format include apple icon composer icns browser iconfactory iconbuilder br macos offers built-in codice_1 command line tool pack unpack *.icns files
|
Operating systems
|
index articles related blackberry os list blackberry-related topics
|
Operating systems
|
fastpos fastpos variant pos malware discovered trend micro researchers new pos malware foregrounds speed credit card data stolen sent back hackers researchers trend micro named new malware variant tspy_fastpos.smztda malware used hackers target small mid-sized businesses smbs many countries like france taiwan japan brazil hong kong united states unlike pos malware fastpos store information locally send cyber thieves periodically variant pos malware executes attack target infected websites virtual network computing vnc via file sharing service stolen data instantly transferred control command server hardcoded hacker pos malware consists two components– keylogger ram scraper logged keystrokes stored memory transmitted attacker enter key pressed stored file infected system stolen data user credentials payment information depends business procedures ram scraper devised steal credit card data memory scraper designed verify service code credit card help remove cards demands pins
|
Computer security
|
clips clips public domain software tool building expert systems name acronym c language integrated production system syntax name inspired charles forgy ops5 first versions clips developed starting 1985 nasa-johnson space center alternative existing system art*inference mid-1990s development group responsibilities ceased focus expert system technology original name project nasa ai language nail clips probably widely used expert system tool clips written c extensions written c clips called c. syntax resembles programming language lisp clips incorporates complete object-oriented language writing expert systems cool combines programming paradigms procedural object oriented logical theorem proving languages clips uses forward chaining like expert system languages clips deals rules facts various facts make rule applicable applicable rule fired facts rules created first defining shown set reset command causes clips read facts rules case would lead three trouble_shooting facts asserted run command used given two facts listed rule1 asserted conditions action met additional fact asserted result run clips salience allows user assign priority weight rule descendants clips language include jess rule-based portion clips rewritten java later grew different direction fuzzyclips adds concept relevancy language
|
Programming language topics
|
cloudreach cloudreach international cloud computing consultancy specialises planning implementation operational support public cloud services including amazon web services microsoft azure google cloud platform also blackstone group portfolio company company headquartered london uk offices multiple countries around world including canada france germany india netherlands united states switzerland cloudreach advisor integrator enterprises greater 1 billion revenues wish move functions public cloud environments customers include bp hearst met office skyscanner ströer time inc. cloudreach also developed two in-house systems sceptre infrastructure automation suite aws connect integration platform service ipaas whilst competitors connect mulesoft offer cloud-based integration focussed apis online services cloudreach also offers solutions focused purely integration services cloud environments cloudreach founded london 2009 pontus noren james monico three years later 2012 company opened second office edinburgh 2015 report research group fast track said cloudreach among 20 fastest-growing british technology companies february 2017 cloudreach acquired major global investor blackstone undisclosed amount noren cofounder remain ceo dave johnson senior blackstone advisor becoming chairman board directors august 2017 cloudreach acquired two us-based businesses emerging technology advisors cloud professional services company cloudamize cloud migration specialist cloudamize cloud computing analytics platform provides data analysis recommendations speed simplify cloud migration management july 2017 cloudreach announced partnership t-systems subsidiary deutsche telekom july 2018 aaron painter named new ceo cloudreach replacing co-founder pontus noren became vice chairman board directors management change comes cloudreach acquired private equity firm blackstone 2017 august 2018 cloudreach acquired relus cloud atlanta based data analytics specialist acquisition relus cloud cloudreach employs 700 people acquisition cloudreach third since investment firm blackstone bought majority stake company last year
|
Distributed computing architecture
|
interrupt storm operating systems interrupt storm event processor receives inordinate number interrupts consume majority processor time interrupt storms typically caused hardware devices support interrupt rate limiting interrupt processing typically non-preemptible task time-sharing operating systems interrupt storm cause sluggish response user input even appear freeze system completely state commonly known live lock state system spending resources processing interrupts instead completing work end-user appear processing anything often output interrupt storm sometimes mistaken thrashing since similar symptoms unresponsive sluggish response user input little output common causes include misconfigured faulty hardware faulty device drivers flaws operating system metastability one components latter condition rarely occurs outside prototype amateur-built hardware modern hardware operating systems methods mitigating effect interrupt storm example ethernet controllers implement interrupt rate limiting causes controller wait programmable amount time interrupt generates present within device similar functionality usually written device driver and/or operating system common cause device behind another signals interrupt apic advanced programmable interrupt controller computer peripherals generate interrupts apic number interrupts always less typically 15 modern pc number devices os must query driver registered interrupt ask interrupt originated hardware faulty drivers may always claim yes causing os query drivers registered interrupt one interrupt processed time device originally requested interrupt therefore get interrupt serviced new interrupt generated cleared processor becomes swamped continuous interrupt signals operating system live lock interrupt storm caused fault kernel debugger usually break storm unloading faulty driver allowing driver underneath faulty one clear interrupt user input still possible drivers often implemented 3rd party operating systems also polling mode queries pending interrupts fixed intervals round-robin fashion mode set globally per-driver per-interrupt basis dynamically os detects fault condition excessive interrupt generation polling mode may enabled dynamically number interrupts resource use caused interrupt passes certain thresholds thresholds longer exceeded os may change interrupting driver interrupt interrupt handling globally interrupt mode polling mode interrupt rate limiting hardware usually negates use polling mode still happen normal operation intense i/o processor unable switch contexts quickly enough keep pace perhaps first interrupt storm occurred apollo 11 lunar descent 1969 interrupt rate limiting must carefully configured optimum results example ethernet controller interrupt rate limiting buffer packets receives network interrupt rate set low controller buffer overflow packets dropped rate must take account fast buffer may fill interrupts interrupt latency interrupt transfer buffer system hardware-based software-based approaches problem example freebsd detects interrupt storms masks problematic interrupts time response system used napi example hardware-based approach system driver starts interrupt enabled state interrupt handler disables interrupt lets thread/task handle event task polls device processing number events enabling interrupt another interesting approach using hardware support one device generates interrupt event queue state changes empty empty free dma descriptors rx fifo tail device drops event event added tail fifo entry marked occupied point entry tail−1 free cleared interrupt generated level interrupt tail pointer incremented hardware requires interrupt acknowledged cpu interrupt handler handle valid dma descriptors head return interrupt
|
Computer architecture
|
puremessage sophos puremessage anti-spam program sophos plc aimed primarily corporate environments sophos puremessage microsoft exchange — part email security data protection — blocks spam viruses spyware phishing scanning inbound outbound internal email exchange message stores proactively protects email-borne threats prevents confidential data lost
|
Computer security
|
bluebottle os bluebottle formerly known active object system aos recently a2 modular object-oriented operating system originally developed eth zurich unconventional features including automatic garbage-collected memory management zooming user interface a2 next generation native oberon x86 pc version niklaus wirth oberon operating system small fast supports multiprocessor computers provides soft real-time operation entirely written upward-compatible dialect oberon programming language called active oberon oberon active oberon members pascal family along modula-2 a2 design allows development efficient systems based active objects run directly hardware active objects represent combination traditional oops notion object combined thread executes context object active oberon implementation active object may include addition activity activity ancestor objects differences a2 mainstream operating systems extremely minimalistic design completely implemented type-safe language automatic memory management combined powerful flexible set primitives level programming language runtime system synchronisation access internal properties objects competing execution contexts kernel layer a2 provides flexible collection modules providing unified abstractions devices services file systems user interfaces network connections media codecs etc bluebottle os replaces older oberon os unique tui zooming user interface zui significantly like conventional graphical user interfaces like oberon though user interface supports point-and-click metaphor execute commands directly text similar clicking hyperlinks browser
|
Operating systems
|
data administration data administration data resource management organizational function working areas information systems computer science plans organizes describes controls data resources data resources usually stored databases database management system software electronic spreadsheets many smaller organizations data administration performed occasionally small component database administrator ’ work context information systems development data administration ideally begins system conception ensuring data dictionary help maintain consistency avoid redundancy model database make logical usable means data modeling including database normalization techniques according data management association dama data resource management development execution architectures policies practices procedures properly manage full data lifecycle needs enterprise data resource management may thought managerial activity applies information system data management tools task managing organization ’ data resource meet company ’ business needs information provide shareholders since beginning information age businesses need types data business activity data created business transaction made need data created data new direction needed focuses managing data critical resource organization directly support business activities data resource must managed intensity formality critical resources managed organizations must emphasize information aspect information technology determine data needed support business use appropriate technology build maintain high-quality data resource provides support data resource quality measure well organization data resource supports current future business information demand organization data resource support current business information demand sacrificing future business information demand must support current future business information demand ultimate data resource quality stability across changing business needs changing technology corporate data resource must developed within single organization-wide common data architecture data architecture science method designing constructing data resource business driven based real-world objects events perceived organization implemented appropriate operating environments overall structure data resource provides consistent foundation across organizational boundaries provide easily identifiable readily available high-quality data support business information demand common data architecture formal comprehensive data architecture provides common context within data organization disposal understood integrated subject oriented meaning built data subjects represent business objects business events real world interest organization data captured maintained
|
Databases
|
quick look quick look quick preview feature developed apple inc. introduced operating system mac os x 10.5 leopard feature announced worldwide developers conference jun 11 2007 os x finder always icon previews quick look allows users look contents file finder full near-full size depending size document relative screen resolution preview files pdfs html quicktime readable media plain text rtf text documents iwork keynote pages numbers documents odf documents microsoft office word excel powerpoint files including ooxml raw camera images quick look also opened full screen launched command line additionally multi-page documents like powerpoint slide shows navigated using slide previews side preview window quick look technology implemented throughout apple suite software starting mac os x 10.5 including ichat theater time machine finder cover flow quick look apis available developers via quick look framework ios part quartz framework mac since debut quick look included number generators common file types plug-ins added quick look allow previewing content file formats plug-ins also used add additional functionality quick look syntax highlighting source code files add plug-in quick look needs placed folder codice_1 activate plug-in either computer needs restarted quick look needs reset command multiple ways invoke quick look keyboard shortcuts command line menu quick look exploited conducting forensic examination computer contents thumbnail cache created user random subfolder codice_2 called com.apple.quicklook.thumbnailcache cache contains two files quick look thumbnails stored documents internal disks also documents located removable disks including encrypted pose significant security hole document may well number thumbnails different dimensions range large small cache reset invoking codice_3 command via terminal window
|
Operating systems
|
mr. castle mr. castle arcade game released universal september 1983 asian title game mr. versus unicorns though marketed sequel original mr released one year earlier game bears far closer resemblance space panic second mr. series video games although n't intended began game called knights vs. unicorns u.s. division universal persuaded japanese arm modify graphics mr. game taking account first game popularity object mr. castle score many points possible collecting cherries defeating unicorn-like monsters game takes place castle filled platforms ladders flipped one platform another player controls mr. collects cherries using hammer knock blocks contain various platforms empty holes left knocked-out blocks serve traps monsters monster falls hole player defeat causing block monster fall top player takes long complete level monsters transform faster difficult forms occasionally multiply game advances next level cherries level collected enemies defeated player loses life mr. caught monster game ends player runs lives mr player earn extra life collecting letters word extra regular monsters changed monsters bearing extra letters collecting three keys distributed around playfield picking magic shield top floor monsters state easier defeat normal simple hammer strike job brief interval change back normal forms game also offers bonus credit collecting rare diamond appears playfield random intervals cherry blocks absent mr. vs. unicorns early revisions mr. castle instead blocks keys skulls start stage fill blocks left behind unicorns fall holes left alone time three ways complete level version versus four ways complete levels mr. castle addition early revisions fill blocks change colors every two stages mr. castle ported colecovision msx atari 2600 atari 5200 commodore 64 sharp x68000 atari commodore colecovision published parker bros. version atari 8-bit family released mr. castle followed mr. wild ride run run released 1984
|
Computer architecture
|
cascade lake microarchitecture cascade lake intel codename 14nm server enthusiast processor microarchitecture cascade lake optimization intel process-architecture-optimization model intel states first microarchitecture support 3d xpoint-based memory modules also feature deep learning boost instructions cascade lake-ap branded xeon platinum 9200 series skus soldered motherboard cpus n't support optane memory
|
Computer architecture
|
database administrator database administrators dbas use specialized software store organize data role may include capacity planning installation configuration database design migration performance monitoring security troubleshooting well backup data recovery list skills required become database administrators database administrators benefit bachelor degree master degree computer science associate degree certificate may sufficient work experience many certifications available becoming certified database administrator try share best many certifications offered database vendors database administrator certifications may earned passing series tests sometimes requirements schools offering database administration degrees also found example database administrator responsibilities include following tasks
|
Databases
|
jericho forum commandments jericho forum® commandments define areas principles must observed planning de-perimeterised future whilst building “ good security ” commandments specifically address areas security necessary deliver de-perimeterised vision commandments serve benchmark concepts solutions standards systems assessed measured jericho forum commandments issued creative commons license found https //collaboration.opengroup.org/jericho/commandments_v1.2.pdf
|
Computer security
|
microsoft rpc microsoft rpc microsoft remote procedure call modified version dce/rpc additions include partial support ucs-2 unicode strings implicit handles complex calculations variable-length string structure paradigms already present dce/rpc dce 1.0 reference implementation allows constructs size_is len possibly size_is len-1 msrpc allows much complex constructs size_is len 2 1 even length_is max ~0x7 0x7 common expression dcom idl files msrpc used microsoft seamlessly create client/server model windows nt little effort example windows server domains protocols entirely msrpc based microsoft dns administrative tool microsoft exchange server 5.5 administrative front-ends msrpc client/server applications mapi made secure proxying mapi set simple msrpc functions enable encryption msrpc layer without involving mapi protocol msrpc derived distributed computing environment 1.2 reference implementation open software foundation copyrighted microsoft dce/rpc originally commissioned open software foundation industry consortium set vendor- technology-neutral open standards computing infrastructure none unix vendors represented open group wanted use complex dce components dce/rpc time microsoft component object model based heavily msrpc adding interfaces inheritance marshalling semantics dce/rpc used serialize method calls results processes separate address spaces albeit com initially allow network calls different machines distributed component object model dcom com extended software components distributed across several networked computers dcom originally called network ole extends microsoft com provides communication substrate microsoft com+ application server infrastructure microsoft donated dcom open group
|
Operating systems
|
motorola one motorola one stylised motorolaone series android smartphones developed motorola mobility motorola phone series uses android one version android motorola mobile phones run android one called motorola one three models released first 2018 motorola ones phones shipped near stock version android guaranteed receive two upgrades version android security updates minimum 3 years release first release series simply named motorola one however carry alternative name p30 play areas asia released october 2018 available two different colours white black came market price 180 euros making low mid range phone second iteration mobile phone series named motorola one vision released may 2019 boasted larger previous screen 48mp camera well upto 1tb sd card slot came market price 300 euros making mid range phone expensive series third release series named motorola one action released august 2019 first phone market record landscape video footage held portrait position due array three camera came market price 260 euros making mid range phone
|
Operating systems
|
kimble app kimble cloud-based psa software application kimble founded 2010 sean hoban mark robinson david scott company headquartered london england offices united states including boston park city chicago atlanta 2018 kimble secured investment accel-kkr technology-focused investment firm based silicon valley kimble provides professional services automation psa solution known kimble psa built salesforce platform recognized salesforce premier partner kimble app automates pipeline forecasting resource planning delivery management project accounting kimble applications helps professional service organizations run project-based businesses better global leaders consulting software hi-tech ntt data tcs sage canon use kimble optimize resource utilization profitability business scalability kimble leading software vendor focuses exclusively professional services automation psa putting energy innovating features easy-to-use functionality improve team collaboration efficiency around key services processes built work seamlessly crm kimble drives forward-looking focus timely decision making intelligent insights guidance 2018 ranked best professional services automation software g2 crowd momentum grid
|
Distributed computing architecture
|
great firewall great firewall china gfw combination legislative actions technologies enforced people republic china regulate internet domestically role internet censorship china block access selected foreign websites slow cross-border internet traffic effect includes limiting access foreign information sources blocking foreign internet tools e.g google search facebook twitter wikipedia others mobile apps requiring foreign companies adapt domestic regulations besides censorship gfw also influenced development china internal internet economy nurturing domestic companies reducing effectiveness products foreign internet companies great firewall operated golden shield project bureau public information network security supervision mentioned one country two systems principle china special administrative regions hong kong macau affected project sars governmental legal systems therefore enjoy high degree autonomy nevertheless u.s. state department reported central government authorities closely monitored internet use regions term great firewall china portmanteau firewall great wall china first used print geremie barmé 1997 term started use beijing 1996 stephen guerin redfish group beijing-based web consultancy 1996 interviews guerin cnn andrea koppel npr marky kay magistad included guerin discussing china reversing firewall political ideological background gfw project considered one deng xiaoping ’ favorite sayings early 1980s open window fresh air flies blown saying related period economic reform china became known socialist market economy superseding political ideologies cultural revolution reform led china towards market economy opened market foreign investors nonetheless despite economic freedom values political ideas communist party china protected swatting flies unwanted ideologies internet china arrived 1994 inevitable consequence supporting tool socialist market economy gradually internet availability increasing internet become common communication platform tool trading information ministry public security took initial steps control internet use 1997 issued comprehensive regulations governing use key sections articles 4–6 1998 communist party china feared china democracy party cdp would breed powerful new network party elites might able control cdp immediately banned followed arrests imprisonment year gfw project started first part project lasted eight years completed 2006 second part began 2006 ended 2008 6 december 2002 300 people charge gfw project 31 provinces cities throughout china participated four-day inaugural comprehensive exhibition chinese information system exhibition many western high-tech products including internet security video monitoring human face recognition purchased estimated around 30,000–50,000 police employed gigantic project fang binxing known substantial contribution china internet censorship infrastructure dubbed father china great fire wall china view internet internet sovereignty notion internet inside country part country sovereignty governed country united states several western countries passed laws creating computer crimes beginning 1970s china legislation 1997 year china sole legislative body national people congress npc passed cl97 law criminalizes cyber crimes divided two broad categories crimes target computer networks crimes carried computer networks behavior illegal latter category includes among many things dissemination pornographic material usurping state secrets chinese judges critical cl97 calling ineffective unenforceable however npc claimed intentionally left law flexible could open future interpretation development given gaps law central government china relies heavily administrative body state council determine falls definitions determinations required go npc legislative process result cpc ended relying heavily state regulation carry cl97 latter definition online activities punishable cl97 crimes carried computer networks used justification great firewall cited government blocks isp gateway connections access anything internet definition also includes using internet distribute information considered harmful national security using internet distribute information considered harmful public order social stability chinese morality central government relies heavily state council regulators determine specific online behavior speech fall definitions reasons behind internet censorship china include part great firewall beginning 2003 china started golden shield project massive surveillance censoring system hardware provided mostly u.s. companies including cisco systems project completed 2006 carried buildings machines manned civilians supervised china national police force public security bureau psb main operating activities gatekeepers golden shield project include monitoring domestic websites email searching politically sensitive language calls protest damaging content found local psb officials dispatched investigate make arrests however late 2007 golden shield project proved operate sporadically best users long adapted internet blocking using proxy servers among strategies make communications circumnavigate blocked content february 2008 chinese government announced operation tomorrow effort crack youth usage internet cafés play online games view content declared illegal internet cafés extremely popular way getting online developing countries fewer people afford personal computer regulated chinese government local chinese government officials minors china age 18 allowed internet cafés although law widely ignored enforced spurred creation underground black web bars visited underage 2008 internet cafés required register every customer log used internet records may confiscated local government officials psb illustrate local regulation internet cafés one instance government official town gedong lawfully banned internet cafés operating town believed harmful minors frequented play online games including considered violent surf internet however internet cafés town simply went underground minors deterred visiting may 2015 china indefinitely blocked access chinese-language wikipedia contrast 2018 english-language wikipedia blocked rarely intermittently china 2017 discussed plans version wikipedia may 2019 language versions wikipedia blocked chinese government system blocks content preventing ip addresses routed consists custom dns proxy servers filtering mechanism researchers university california davis university new mexico said censorship system true firewall since banned material sometimes able pass several routers entire system without blocked filtering mechanism may differ one chinese isp another tend common possible reported methods included research evidence indicated suspicion great firewall china sense one surveilled online leads chilled speech self-censorship effective blocking internet content great firewall great firewall form trade protectionism allowed china grow internet giants tencent alibaba baidu china version many foreign web properties example tencent video youtube tencent weibo twitter qzone facebook wechat whatsapp ctrip orbitz others zhihu quora nearly one quarter global internet population 700 million users internet behind gfw considered parallel universe internet exists outside mainland chinese internet censorship programs censored web sites include among things blocked web sites indexed lesser degree chinese search engines sometimes considerable impact search results according new york times google set computer systems inside china try access web sites outside country site inaccessible added google china blacklist however unblocked web sites reindexed referring google first-hand experience great firewall hope international community reveal secrets simon davies founder london-based pressure group privacy international challenging google reveal technology used china behest way understand nature beast perhaps develop circumvention measures opening communications would dossier extraordinary importance human rights davies says google yet respond call great firewall blocks destination ip addresses domain names inspects data sent received basic censorship circumvention strategy use proxy nodes encrypt data circumvention tools combine two mechanisms 2008 english-language bbc website chinese language website unblocked 2017 china censored google including google maps alternate map applications available reporters without borders suspects countries cuba vietnam zimbabwe belarus obtained surveillance technology china although censorship countries less stringent china even one see booming sector well one dynamic china second largest information communication technology market according international data corporation market reach us 844 billion 2020 market big data expected become part industrial world china 2025 regardless strictness industrial internet architecture already place despite strict government regulations chinese people continue protest government attempt censor internet covert protesters set secure ssh vpn connections using tools ultrasurf also utilize widely available proxies virtual private networks fanqiang 翻墙 climb wall bypass gfw active protest absent chinese people post grievances online occasions successful 2003 death sun zhigang young migrant worker sparked intense widespread online response chinese public despite risk government punishment months later premier wen jiabao abolished chinese law led death sun ever since dissent regularly created turmoil internet china also january 2010 google announced longer censor web search results china even means might shut chinese operations altogether many chinese people went company chinese offices display grievances offer gifts flowers fruits cigarettes chinese corporate statutes mandate domestic foreign internet companies business mainland china cooperate great firewall efforts companies responsible content put websites well content users post website helps china promote self-censorship making censoring job less difficult allowing keep state licenses media chinese subsidiaries american companies yahoo google google services blocked google still presence china microsoft comply condition operating leadership companies regularly express distaste china great firewall policies vein consider necessary part business china better alternative would china business jerry yang founder yahoo additionally implied presence foreign internet companies china eventually help bring less internet restriction china critics argue gfw consequence china paranoia potential internet spreading opposition one-party rule arguments given china method limited internet impedes freedom speech holds economically speaking discouraging innovation disapproving communication important ideas prohibiting firms use certain services use also thought detrimental approach students professors since access resources promote sharing work ideas comprehensive learning another important argument gfw fear critics big countries begin following china approach whole purpose creation internet could put jeopardy like-minded countries successful imposing restrictions inhabitants globalized online companies free global exchange information could cease exist united states trade representative ustr “ national trade estimate report ” 2016 referred china digital great firewall china filtering cross-border internet traffic posed significant burden foreign suppliers claude barfield american enterprise institute expert international trade suggested u.s. government bring case firewall huge trade barrier world trade organization january 2017 8 24 trafficked websites china blocked great firewall created burden foreign suppliers rely websites sell products services.the lobby 2016 business climate survey showed 79 percent members reported negative impact business due internet censorship according stephen rosen gfw reflective chinese government fear civil disobedience rebellion among chinese population chinese communist party rule
|
Computer security
|
rob savoye rob savoye primary developer gnash developer gnu project worked debian red hat dozens free/open source software projects among first employees cygnus support sold red hat 2001 began programming computers 1977 using fortran 4 projects worked include gcc gdb dejagnu cygwin ecos ctas rob savoye manages unofficial website rainbow family living light resides outside nederland colorado avid ice climber outdoorsman additionally rob involved search rescue lost stranded hikers climbers founding member imsar ilchester mountain search rescue organization libre planet 2011 savoye received individual achievement fsf award advancement free software work gnash
|
Operating systems
|
naslite naslite free commercial linux distribution designed turn conventional x86-based computers pci interface simple network-attached storage device fits onto single 3½-inch high density floppy disk formatted 1.72mb naslite boots floppy disk runs 4mb ram disk allowing full capacity hard disk drives used storage naslite supports serving files clients running windows linux mac os x well others versions available support different networking protocols booting operating system cd-rom usb mass storage device hard disk drive versions naslite variants contain gpl 'd proprietary components gpl 'd components available end user per gplv2 naslite runs well obsolete hardware requires least computer pci interface minimum requirements 486dx pentium cpu 16 mb ram pci ethernet card ide hard disk drive floppy disk drive naslite turns target machine simple file server since file serving takes little processing speed opposed network speed hard drive speed able run comparatively old computers little processing power runs floppy disk hypothetically usually four ide channels used hard drives naslite three variants supporting different file serving protocols samba support serving microsoft windows client machines nfs serve unix based operating systems ftp anonymous ftp also supports remote administration via telnet though ssh includes web server display usage error logs since based linux naslite like linux distributions supports new larger hard drives often supported older machines bypassing bios directly accessing hard drive greatly increasing usefulness older computer serving large amounts data
|
Operating systems
|
master lamps master lamps one first music video games activision published game 1985 several home computer systems master lamps death arabian prince father king shatters three enchanted oil lamps freeing three genies trapped within genies overrun palace contain prince must reassemble three broken lamps player role prince wearing white thawb red keffiyeh must journey seven dens genie den contains one lamp pieces gameplay alternates two modes first prince maneuvers flying carpet winding tunnel genie den practice requires player direct carpet diamond-shaped gates appear failure returns prince beginning tunnel den second mode player strikes gong thrice summon genie genie draws hookah blows ball smoke smoke emerges sequence tones player must repeat call-and-response pattern order play tone player must strike corresponding gong player strikes incorrect gong strikes correct gong early genie magic transports prince beginning tunnel seven dens first genie tone audible manifests colored quaver eighth note floats toward ground seven dens second genie tone inaudible player must match color note color corresponding gong seven dens third genie tone audible note appears player must recognize note pitch strike correct gong player passes trial gateway another tunnel opens passing musical trials three genies player navigates one final tunnel palace player succeeds prince reclaims palace antic 1986 called master lamps offbeat game program number unique elements stating become little monotonous magazine approved non-violent gameplay
|
Computer architecture
|
ninite ninite codenamed volery private beta stage package management system offering lets users automatically install popular applications windows operating system allows users make selection list applications bundles selection single installer package free personal use paid version ninite pro available professional use alternatively cheaper albeit less robust version ninite pro known ninite updater available users want ability one-click updates without features offered ninite pro ninite works windows 7 later presents user list programs generates custom installer executable based user selection run installer downloads installs selected programs ninite installer always downloads latest version program accomplished downloading regularly-updated list applications download urls ninite servers time program run benefits using ninite rather individual applications installers include toolbar/adware free installations ability update multiple applications automatic selection architecture 64-bit vs 32-bit language selection based operating system language error reporting one installations fail austrian magazine der standard wrote ninite gets good basic package software computer computerwoche listed ninite number 11 28 reviewed freeware tools pc magazine listet batch-installer software installation one ninite webpage user chooses software preference activating checkboxes continues downloading executable installer preconfigured users custom selection executing installer previously chosen software unattended without requested user interaction installed computer chrome opera firefox discord skype pidgin thunderbird trillian itunes vlc aimp foobar2000 winamp musicbee audacity k-lite codec pack gom spotify cccp mediamonkey handbrake java adoptopenjdk x64 version 8 11 java adoptopenjdk 8 .net silverlight adobe air krita blender paint.net gimp irfanview xnview inkscape faststone greenshot sharex foxit reader libreoffice sumatrapdf cutepdf pdfcreator openoffice ms essentials malwarebytes avast avg spybot 2 avira superantispyware qbittorrent dropbox google backup sync onedrive sugarsync evernote google earth steam keepass 2 everything nv access teamviewer 14 imgburn realvnc teracopy cdburnerxp revo launchy windirstat glary infrarecorder classic start 7-zip peazip winrar python filezilla notepad++ jdk adoptopenjdk x64 8 11 jdk adoptopenjdk 8 jdk amazon corretto x64 8 11 jdk amazon corretto 8 winscp putty winmerge eclipse visual studio code ninite installer/updater includes software latest version discontinued software longer maintained software author ninite continues install python v2 despite python v3 preferred version recommended python users upgrade python v3 end 2019 july 2019 ninite offer python v3 option microsoft silverlight deprecated final update released beginning 2019 microsoft security essentials discontinued january 2020 time windows 7 newer versions windows functionality already install operating system feature name windows defender classic start discontinued end 2017 following software updated 3 years cutepdf sumatrapdf cccp imgburn infrarecorder launchy
|
Operating systems
|
socket fm2 socket fm2 cpu socket used amd desktop trinity richland apus connect motherboard well athlon x2 athlon x4 processors based fm2 launched september 27 2012 motherboards feature new fm2 cpu socket also utilize amd new a85x chipset socket similar fm1 based 31×31 grid pins 5×7 central void 3 pins missing corner additional key pins missing compared socket fm1 two key pins moved one removed leaving 904 pins available chipsets consult fusion controller hubs fch steamroller-based kaveri apus supported see socket fm2+ fm2r2 socket fp3 bga- 4 holes fastening heatsink motherboard placed rectangle lateral lengths 48 mm 96 mm amd sockets socket am2 socket am2+ socket am3 socket am3+ socket fm2 cooling solutions therefore interchangeable
|
Computer architecture
|
craig federighi craig federighi born may 27 1969 apple senior vice president software engineering federighi oversees development ios ipados macos apple common operating system engineering teams teams responsible delivering software heart apple products including user interface applications frameworks graduating acalanes high school lafayette california federighi earned master science degree computer science bachelor science electrical engineering computer science university california berkeley italian descent federighi married 2014 federighi worked steve jobs next led development enterprise objects framework joined apple acquired next 1996 left 1999 enterprise company ariba chief technology officer returned apple 2009 led macos engineering march 23 2011 federighi succeeded bertrand serlet vice president mac software engineering apple august 27 2012 promoted senior vice president reporting ceo tim cook october 29 2012 upon announcement scott forstall departure apple role expanded encompass ios addition mac software engineering september 2016 federighi reported 500,000 shares apple stock worth us 100 million july 2019 within community apple users developers federighi known energetic presentations new apple software frequently featuring absurdist humor references somewhat bouffant hair use new software features organize events office karaoke parties camping trips claimed love band rush federighi notable nicknames around apple hair force one ” additionally apple ceo tim cook called superman first appearance onstage major apple event wwdc 2009 helped bertrand serlet introduce mac os x snow leopard made another appearance 2010 'back mac presentation showing mac os x lion introduced ios 7 os x mavericks apple wwdc 2013 developer conference ios 8 os x yosemite wwdc 2014 wwdc 2015 delivered apple 2-hour main opening-day presentation introducing ios 9 os x 10.11 el capitan revealing plans release apple new programming language swift open-source project september 2015 demoed 3d touch new iphone 6s wwdc 2016 federighi introduced ios 10 macos 10.12 sierra said 15-year-old os x would rebranded macos tune naming scheme used ios tvos watchos emphasized use widgets ios lock screen announced new apis siri imessage would open developers apple special event september 2017 federighi faced controversy initially failing properly demo face id feature iphone x. consequently people became skeptical reliability face id apple stated prior event apple employees inadvertently triggered face id one demonstration phones causing prompt passcode federighi attempted unlock it..
|
Operating systems
|
webmethods integration server webmethods integration server one core application servers webmethods platform java-based multiplatform enterprise integration server supports integration diverse services mapping data formats communication systems integration server may also known core webmethods enterprise service bus integration server supports java c/c++ programming languages writing services well proprietary graphical language known flow also supports graphical configuration 3rd party system operations via concept adapter services integration server exposes administration configuration auditing facilities user via html web interface programming languages protocols/standards core protocols/standards additional packages following list significant releases webmethods integration server webmethods integration server certified run following platforms application server runs top java 1.4.x version 6.x 1.7.x version 9.5 1.8.x version 9.10 integration server installation product via webmethods installer program webmethods acquired software ag
|
Web technology
|
hiawatha web server hiawatha web server available multiple platforms developed hugo leisink since 2002 hiawatha started january 2002 small web server suitable servers old hardware leisink computer science student time initially created server support internet servers student houses delft south holland netherlands server designed improved security focus leisink states lot security features hiawatha wo n't find webserver author said know long time vulnerabilities exist web servers one thing bothers runtime cgi cgi process web servers run forever single cgi script dos webserver system administrator needed kill script client hacker keeps guessing passwords http authentication kind issues inspired create hiawatha settings maximum request sending time maximum cgi run time client banning etc features opinion every daemon january 2009 edition linux magazine included article hiawatha web server describing light web server good performance innovative security functions hiawatha frequently cited lightweight alternative apache prioritizes easy installation reduced storage including many additional features february 2019 leisink simultaneously announced release version 10.9 end major development pair blog posts hiawatha web server implements important functions modern web server hiawatha many security features web server like preventing sql-injection cross-site scripting xss cross-site request forgery csrf prevention denial-of-service protection control external image linking banning potential hackers limiting runtime cgi applications author worked rfc3546 support openssl documentation subject extremely poor progress difficult although rfc3546 support included since v8.6 version developed polarsslv1.2 although security main focus hiawatha users also speak highly speed performance according performance test carried independent researcher saltwaterc hiawatha faster ten servers tested drupal static content performing comparably rest metrics hiawatha supports load-balanced fastcgi php-fastcgi utility although latter deprecated replaced php project fastcgi process manager php-fpm makes fast scalable handling dynamic content
|
Web technology
|
vector processor computing vector processor array processor central processing unit cpu implements instruction set containing instructions operate one-dimensional arrays data called vectors compared scalar processors whose instructions operate single data items vector processors greatly improve performance certain workloads notably numerical simulation similar tasks vector machines appeared early 1970s dominated supercomputer design 1970s 1990s notably various cray platforms rapid fall price-to-performance ratio conventional microprocessor designs led vector supercomputer demise later 1990s cpu designs include multiple instructions vector processing multiple vectorised data sets typically known mimd multiple instruction multiple data realized vliw long instruction word fujitsu fr-v vliw/ vector processor combines technologies vector processing development began early 1960s westinghouse solomon project solomon goal dramatically increase math performance using large number simple math co-processors control single master cpu cpu fed single common instruction arithmetic logic units alus one per cycle different data point one work allowed solomon machine apply single algorithm large data set fed form array 1962 westinghouse cancelled project effort restarted university illinois illiac iv version design originally called 1 gflops machine 256 alus finally delivered 1972 64 alus could reach 100 150 mflops nevertheless showed basic concept sound used data-intensive applications computational fluid dynamics illiac fastest machine world illiac approach using separate alus data element common later designs often referred separate category massively parallel computing computer operations functions presented developed kartsev 1967 first successful implementation vector processing appears control data corporation star-100 texas instruments advanced scientific computer asc basic asc i.e. one pipe alu used pipeline architecture supported scalar vector computations peak performance reaching approximately 20 mflops readily achieved processing long vectors expanded alu configurations supported two pipes four pipes corresponding 2x 4x performance gain memory bandwidth sufficient support expanded modes star otherwise slower cdc supercomputers like cdc 7600 data related tasks could keep much smaller less expensive however machine also took considerable time decoding vector instructions getting ready run process required specific data sets work actually sped anything vector technique first fully exploited 1976 famous cray-1 instead leaving data memory like star asc cray design eight vector registers held sixty-four 64-bit words vector instructions applied registers much faster talking main memory cray design used pipeline parallelism implement vector instructions rather multiple alus addition design completely separate pipelines different instructions example addition/subtraction implemented different hardware multiplication allowed batch vector instructions pipelined technique called vector chaining cray-1 normally performance 80 mflops three chains running could peak 240 mflops – far faster machine era examples followed control data corporation tried re-enter high-end market eta-10 machine sold poorly took opportunity leave supercomputing field entirely early mid-1980s japanese companies fujitsu hitachi nippon electric corporation nec introduced register-based vector machines similar cray-1 typically slightly faster much smaller oregon-based floating point systems fps built add-on array processors minicomputers later building minisupercomputers throughout cray continued performance leader continually beating competition series machines led cray-2 cray x-mp cray y-mp since supercomputer market focused much massively parallel processing rather better implementations vector processors however recognising benefits vector processing ibm developed virtual vector architecture use supercomputers coupling several scalar processors act vector processor although vector supercomputers resembling cray-1 less popular days nec continued make type computer present day sx series computers recently sx-aurora tsubasa places processor either 24 48 gigabytes memory hbm 2 module within card physically resembles graphics coprocessor instead serving co-processor main computer pc-compatible computer plugged serving support functions modern graphics processing units gpus include array shader pipelines may driven compute kernels considered vector processors using similar strategy hiding memory latencies general terms cpus able manipulate one two pieces data time instance cpus instruction essentially says add b put result c data b c could be—in theory least—encoded directly instruction however efficient implementation things rarely simple data rarely sent raw form instead pointed passing address memory location holds data decoding address getting data memory takes time cpu traditionally would sit idle waiting requested data show cpu speeds increased memory latency historically become large impediment performance see memory wall order reduce amount time consumed steps modern cpus use technique known instruction pipelining instructions pass several sub-units turn first sub-unit reads address decodes next fetches values addresses next math pipelining trick start decoding next instruction even first left cpu fashion assembly line address decoder constantly use particular instruction takes amount time complete time known latency cpu process entire batch operations much faster efficiently one time vector processors take concept one step instead pipelining instructions also pipeline data processor fed instructions say add b add numbers numbers instead constantly decode instructions fetch data needed complete processor reads single instruction memory simply implied definition instruction instruction operate another item data address one increment larger last allows significant savings decoding time illustrate difference make consider simple task adding two groups 10 numbers together normal programming language one would write loop picked pairs numbers turn added cpu would look something like vector processor task looks considerably different several savings inherent approach one two address translations needed depending architecture represent significant savings another saving fetching decoding instruction done one time instead ten code also smaller lead efficient memory use vector processor may multiple functional units adding numbers parallel checking dependencies numbers required vector instruction specifies multiple independent operations simplifies control logic required improve performance avoiding stalls mentioned earlier cray implementations took step allowing several different types operations carried time consider code adds two numbers multiplies third cray would fetched added multiplied single operation using pseudocode cray math operations thus completed far faster overall limiting factor time required fetch data memory problems attacked sort solution including types instructions necessarily adds complexity core cpu complexity typically makes instructions run slower—i.e. whenever adding many numbers row complex instructions also add complexity decoders might slow decoding common instructions normal adding fact vector processors work best large amounts data worked reason sorts cpus found primarily supercomputers supercomputers general found places weather prediction centers physics labs huge amounts data crunched let r vector speed ratio f vectorization ratio time taken vector unit add array 64 numbers 10 times faster equivalent scalar counterpart r 10 also total number operations program 100 10 scalar vectorization f 0.9 i.e. 90 work done vector unit follows achievable speed formula_1 even performance vector unit high formula_2 get speedup less formula_3 suggests ratio f crucial performance ratio depends efficiency compilation like adjacency elements memory various machines designed include traditional processors vector processors fujitsu ap1000 ap3000 programming heterogeneous machines difficult since developing programs make best use characteristics different processors increases programmer burden increases code complexity decreases portability code requiring hardware specific code interleaved throughout application code balancing application workload across processors problematic especially given typically different performance characteristics different conceptual models deal problem example using coordination language program building blocks programming libraries higher order functions block different native implementation processor type users simply program using abstractions intelligent compiler chooses best implementation based context
|
Computer architecture
|
open control architecture open control architecture oca communications protocol architecture control monitoring connection management networked audio video devices networks referred media networks official specification oca audio engineering society aes standard known aes70-2015 aes70 document use newer term aes70 refer standard architecture specifies aes70 open standard may used freely without licenses fees organization memberships aes70 intended support media networks combine devices diverse manufacturers targeted professional applications aes70 suitable media networks 2 10,000 devices including networks mission-critical and/or life-safety roles aes70 device control monitoring connection management provide transport media program material however aes70 designed work virtually media transport scheme application requires aes70 parts separable may used independently example device may implement aes70 connection management use means operational control monitoring aes70 termed architecture provides basis definition multiple control protocols protocols share common programming model vary signalling detail depending form underlying data transport mechanism aes70 application use whichever aes70 protocol appropriate communications method available oca architecture aes70 developed oca alliance trade association beginning 2011 oca based existing control protocol named ocp created bosch communications systems 2009 2010 ocp turn based embryonic control protocol standard named aes-24 developed aes early 1990s outset intention involved oca rendered open public standard alliance completed oca development fall 2014 transferred specification aes rendering formal standard aes70 formal standard published january 4 2016 today oca alliance works develop enhance functionality aes70 promote aes70 adoption throughout professional media systems industry alliance promotes understanding adoption aes70 facilitates creation aes70 implementations related tools technologies develops future functional enhancements aes70 standard aes70 defines control interface media device presents network connected thus aes70 concerned representation device functions systematic way control monitoring functions via well-defined family protocols media networks normally include one devices called controllers user interfaces allow humans control monitor audio and/or video functioning networked devices aes70-compliant networks controllers use aes70 protocols communicate devices control aes70 defines control protocol used controllers devices scope extend cover design construction controllers user interfaces aes70 intended used professional applications technical requirements applications detailed elsewhere oca scope excludes applications homes automobiles consumer areas aes70 device model canonical description control interface aes70-compliant device presents network aes70 device model object-oriented defines required optional set objects oca objects device control interface implements using aes70 protocol controllers may access properties objects perform control monitoring connection management operations oca objects abstractions represent device control monitoring points media connections may may correspond actual programming objects hardware components inside device device correctly implements aes70 protocol aes70-compliant aes70 define may accomplished generally speaking aes70 device model tends differ device models control architectures several ways aes70 class structure defines set classes oca classes devices may use instantiate oca objects three kinds classes oca classes may broadly grouped three functional sets noted aes70 architecture supports multiple protocols depending nature network medium used present aes70 defines one protocol named ocp.1 ocp.1 aes70 protocol tcp/ip networks future plans include ocp.2 byte-serial version usb networks bluetooth connections point-to-point links ocp.3 text version json aes70 protocol defines three kinds messages follows aes70 control repertoire covers control monitoring connection management audio devices future versions expand audio control repertoire may address video devices well aes70 includes features allow manufacturers extend oca class structure address functions standard repertoire extensions may public confidential manufacturer chooses table 1 summarizes aes70-2015 control repertoire although aes70 provide media transport functions designed interface modern media transport standards control signal routing connection setup functions interface network directory/discovery services capacity aes70 provides useful level abstraction applications allowing controllers devices use one common software model managing stream connections various transport architectures oca alliance defines recommended practices interfacing aes70 various well-known media transport architectures specification interfacing aes70 given media transport scheme called aes70 adaptation aes70 includes architectural solution problems control grouping i.e use single control input effect multiple operating parameters example control grouping master gain control covering multiple device channels one devices control grouping poses difficult problems especially systems given operating parameter may affected multiple control groups example stereophonic multiway sound system gain left-channel high-frequency amplifier may affected settings master controls overall high-frequency level b left-channel level c overall level entire system systems machine intelligence required manage cumulative settings effects lead overrange underrange parameter values aes70 grouping mechanism provides basis management one many devices aes70 includes powerful general mechanism applying storing recalling uploading downloading sets operating parameter values partial full snapshots supported aes70 includes complete support managing configurations reconfigurable dsp devices i.e software-based devices whose signal processing topologies defined redefined runtime external controllers devices aes70 supports creation configuration deletion signal processing elements internal signal paths connect aes70 designed support proprietary extensions maximum compatibility manufacturers may define extensions control repertoire coexist peacefully standard elements aes70 devices controllers continue interoperate aes70 evolves years devices use various versions oca generally intermixable one media network without problems aes70 protocols offer encryption authentication options allow construction secure control monitoring networks completely secure media networks require encryption transmitted program content well mechanisms encryption lie outside scope ocaaes70 although aes70 may used configure control aes70 defines primitives allow reliable update device firmware network primitives may used maintenance software ensure incomplete firmware updates render critical devices networks inoperative aes70 open license-free standard may freely used products manufacturers choose although aes70 nurtured promoted oca alliance membership alliance required order use aes70 aes70 documents available audio engineering society aes standards store standard three parts two significant appendices follows 1 aes70 framework 2 aes70 class structure 3 aes70 protocols two appendices listed universal modeling language uml specifications uml files two forms oca alliance non-profit corporation originally formed secure standardization oca publication aes70 standard 2016 alliance ’ purposes evolved alliance members large small companies desire steer evolution aes70 benefit exchange technology business information trade association provide new members always welcome number development tools open source code available helps start developing aes70 compatible products
|
Internet protocols
|
common lisp interface manager common lisp interface manager clim common lisp-based programming interface creating user interfaces i.e. graphical user interfaces guis fully object-oriented programming user interface management system using common lisp object system clos based idea stream input output also facilities output device independence descended gui system dynamic windows symbolics lisp machines main development 1988 1993 clim 2.0 released 1993 clim designed portable across different common lisp implementations different windowing systems uses reflective architecture window system interface clim supports like dynamic windows so-called presentations clim available allegro cl lispworks macintosh common lisp symbolics genera free software implementation clim named mcclim several extensions clim used several applications like climacs emacs-like editor also provides mouse-sensitive lisp listener read–eval–print loop repl common lisp
|
Programming language topics
|
usb flash drive security secure usb flash drives protect data stored access unauthorized users usb flash drive products market since 2000 use increasing exponentially consumers businesses increased demand drives manufacturers producing faster devices greater data storage capacities increasing number portable devices used business laptops notebooks personal digital assistants pda smartphones usb flash drives mobile devices companies particular risk sensitive data stored unsecured usb flash drives employees use devices transport data outside office consequences losing drives loaded information significant including loss customer data financial information business plans confidential information associated risk reputation damage usb flash drives pose two major challenges information system security data leakage owing small size ubiquity system compromise infections computer viruses malware spyware large storage capacity usb flash drives relative small size low cost means using data storage without adequate operational logical controls may pose serious threat information availability confidentiality integrity following factors taken consideration securing important assets average cost data breach source necessarily flash drive ranges less 100,000 2.5 million sandisk survey characterized data corporate end users frequently copy examples security breaches resulting usb drives include early days computer viruses malware spyware primary means transmission infection floppy disk today usb flash drives perform data software storage transfer role floppy disk often used transfer files computers may different networks different offices owned different people made usb flash drives leading form information system infection piece malware gets onto usb flash drive may infect devices drive subsequently plugged prevalence malware infection means usb flash drive documented 2011 microsoft study analyzing data 600 million systems worldwide first half 2011 study found 26 percent malware infections windows system due usb flash drives exploiting autorun feature microsoft windows finding line statistics monthly reporting commonly detected malware antivirus company eset lists abuse autorun.inf first among top ten threats 2011 windows autorun.inf file contains information programs meant run automatically removable media often usb flash drives similar devices accessed windows pc user default autorun setting windows versions prior windows 7 automatically run program listed autorun.inf file access many kinds removable media many types malware copy removable storage devices always program ’ primary distribution mechanism malware authors often build additional infection techniques examples malware spread usb flash drives include since security physical drive guaranteed without compromising benefits portability security measures primarily devoted making data compromised drive inaccessible unauthorized users unauthorized processes may executed malware one common approach encrypt data storage routinely scan usb flash drives computer viruses malware spyware antivirus program although methods possible software solutions bitlocker diskcryptor popular veracrypt allow contents usb drive encrypted automatically transparently also windows 7 enterprise windows 7 ultimate windows server 2008 r2 provide usb drive encryption using bitlocker go apple computer mac os x operating system provided software disc data encryption since mac os x panther issued 2003 see also disk utility additional software installed external usb drive prevent access files case drive becomes lost stolen installing software company computers may help track minimize risk recording interactions usb drive computer storing centralized database usb drives utilize hardware encryption microchips within usb drive provide automatic transparent encryption manufacturers offer drives require pin code entered physical keypad device allowing access drive cost usb drives significant starting fall due type usb drive gaining popularity hardware systems may offer additional features ability automatically overwrite contents drive wrong password entered certain number times type functionality provided software system since encrypted data simply copied drive however form hardware security result data loss activated accidentally legitimate users strong encryption algorithms essentially make functionality redundant encryption keys used hardware encryption typically never stored computer memory technically hardware solutions less subject cold boot attacks software-based systems reality however cold boot attacks pose little threat assuming basic rudimentary security precautions taken software-based systems security encrypted flash drives constantly tested individual hackers well professional security firms times january 2010 flash drives positioned secure found poorly designed provide little actual security giving access data without knowledge correct password flash drives compromised claimed fixed include companies reacted immediately kingston offered replacement drives different security architecture sandisk verbatim trek released patches commercial environments secure usb drives used central/remote management system may provide organizations additional level asset control significantly reducing risks harmful data breach include initial user deployment ongoing management password recovery data backup remote tracking sensitive data termination issued secure usb drives management systems available software service saas internet connectivity allowed behind-the-firewall solutions
|
Computer file systems
|
powerbuilder foundation classes powerbuilder foundation class library pfc set powerbuilder objects customized used develop class libraries objects used provide corporate departmental application consistency pfc also includes objects used utility purposes debugging pfc written powerbuilder delivered powerbuilder objects supporting powerscript source code uses advanced powerbuilder object oriented coding techniques features service-oriented design ensures application uses minimum amount computer resources library initially developed powersoft introduced powerbuilder 5 released library later open sourced sybase powerbuilder 10 released since couple forks occurred including one specifically support appeon web enabling tool powerbuilder sr. vendor product architecture
|
Programming language topics
|
rtp audio video profile rtp audio/video profile rtp/avp profile real-time transport protocol rtp specifies technical parameters audio video streams rtp specifies general-purpose data format n't specify encoded data utilize features rtp payload type value put rtp header sampling rate clock rate rate rtp timestamp increments use etc. rtp profile specifies details rtp audio/video profile specifies mapping specific audio video codecs sampling rates rtp payload types clock rates encode data format rtp data payload well specifying describe mappings using session description protocol sdp rfc 3551 lists details payload format reference details provided payload identifiers 96–127 used payloads defined dynamically session document recommends dynamically assigned port numbers although port numbers 5004 5005 registered use profile dynamically assigned port required standard also describes process registering new payload types iana applications operating profile always support pcmu payload type 0 previously dvi4 payload type 5 also recommended recommendation removed august 2013 rfc 7007 many rtp deployments support dvi4 little reason use much modern codecs available
|
Internet protocols
|
sunway sw26010 sw26010 260-core manycore processor designed national high performance integrated circuit design center shanghai implements sunway architecture 64-bit reduced instruction set computing risc architecture designed china sw26010 four clusters 64 compute-processing elements cpes arranged eight-by-eight array cpes support single instruction multiple data simd instructions capable performing eight double-precision floating-point operations per cycle cluster accompanied conventional general-purpose core called management processing element mpe provides supervisory functions cluster dedicated ddr3 sdram controller memory bank address space processor runs clock speed 1.45 ghz cpe cores feature 64 kb scratchpad memory data 16 kb instructions communicate via network chip instead traditional cache hierarchy mpe traditional setup 32 kb l1 instruction data caches 256 kb l2 cache finally on-chip network connects single system interconnection interface connects chip outside world sw26010 used sunway taihulight supercomputer march june 2018 world fastest supercomputer ranked top500 project system uses 40,960 sw26010s obtain 93.01 pflops linpack benchmark
|
Computer architecture
|
freemat freemat free open-source numerical computing environment programming language similar matlab gnu octave addition supporting many matlab functions idl functionality features codeless interface external c c++ fortran code parallel distributed algorithm development via mpi plotting 3d visualization capabilities community support takes place moderated google groups
|
Programming language topics
|
paper key paper key machine-readable print cryptographic key printed key used decrypt data e.g archives backup data paper key result offline private key protocol offline private key also function token two-factor authentication idea digital key decrypt recover sensitive personal data long-term durability stored computer network length secure cryptographic keys restricts memorization secret key takes form 2d barcode machine-readable print early implementations paper key company safeberg use data matrix barcode human-readable base 16 digits user stores printed key secure location avoid abuse key used combination ‘ normal ’ password user extract key creating digital photo scan paper key feeding cryptographic software extracts key decrypt data br
|
Computer security
|
sco–sgi code dispute 2003 sco forum 2003 sco group sco showed several examples allegedly illegal copying copyrighted code linux open source community quickly debunked examples shown particular one example showed code unix indeed used sgi linux contributions linux maintainers stated code question fact already removed linux example revealed — infringing code question needlessly duplicated functions already present linux sgi analysts also responded matter confirmed code question never infringed sco forum held august 17 – 19 2003 sco publicly showed several alleged examples illegal copying copyright code linux time examples available people signed nda prohibited revealing information shown sco claimed infringements divided four separate categories literal copying obfuscation derivative works non-literal transfers example used sco demonstrate literal copying also known atemalloc example name original contributor revealed sco quick analysis code question pointed sgi time also revealed code already removed linux kernel duplicated already existing functions within hours open source community started several different analyses infringing code results analyses differ slightly confirm code question derived unix code analyses also pointed code could possibly originated unix necessarily prove infringement copyrights community determined particularly bad example code question never used mainstream distributions linux present ia-64 version relative sparseness worldwide ia-64 installations combined limited time code present linux makes chance actually encountering system running code slim possible code contributed linux originated unix system v original implementation happened early 1970s comparison original unix source code unix system v source reveal substantial differences two fact dennis ritchie one creators original versions unix acknowledged either ken thompson wrote original code unix system v code derived important original versions unix copyright claim source code time law required copyright claims effectively means early unix code protected copyright law additionally santa cruz operation sco group released source code early versions unix 4-clause bsd-like license allowing use source code open source products october 1 2003 sgi responded sco ’ allegations open letter linux community letter rich altmaier vice president software claims small code fragments indeed inadvertently included linux kernel
|
Computer architecture
|
mashapps mashapps process-centric cloud applications small medium enterprises departmental deployments mashapps used solve different types business problems within enterprise integrations third party applications on-premises on-demand systems modeled without much dependency team mashup applications shared users organizations users looking mashapps business scenarios either build look similar solutions readily available google apps marketplace mashapps built online mashup enabler called mashapp composer building mashapp require programming languages like enterprise mashup markup language new mashapps assembled existing repository reusable mashup components like process library external web services
|
Distributed computing architecture
|
fujitsu fujitsu chiefly makes computing products company subsidiaries also offer diversity products services areas personal computing enterprise computing including x86 sparc mainframe compatible server products well storage products telecommunications advanced microelectronics air conditioning approximately 140,000 employees products services available 100 countries fujitsu listed tokyo stock exchange constituent nikkei 225 topix indices fujitsu second oldest company ibm hewlett packard established june 20 1935 name spin-off fuji electric company joint venture furukawa electric company german conglomerate siemens founded 1923 despite connections furukawa zaibatsu fujitsu escaped allied occupation japan second world war mostly unscathed 1954 fujitsu manufactured japan first computer facom 100 mainframe 1961 launched second generation computers transitorized facom 222 mainframe 1968 facom230 5 series marked beginning third generation computers fujitsu offered mainframe computers 1955 least 2002 fujitsu computer products included minicomputers small business computers servers personal computers 1955 fujitsu founded kawasaki frontale company football club kawasaki frontale j league football club since 1999 1967 company name officially changed contraction since 1985 company also fields company american football team fujitsu frontiers play corporate x-league appeared 7 japan x bowls winning two winning two rice bowls 1971 fujitsu signed oem agreement canadian company consolidated computers limited ccl distribute ccl data entry product key-edit fujitsu joined icl earlier began marketing key-edit british commonwealth countries well western eastern europe ccl direct marketing staff canada usa london uk frankfurt mers kutt inventor key-edit founder ccl common thread led fujitsu ’ later association icl gene amdahl 1986 fujitsu queen university belfast business incubation unit qubis ltd established joint venture called kainos privately held software company based belfast northern ireland 1990 fujitsu acquired 80 uk-based computer company international computers limited icl 1.29 billion icl renamed fujitsu services 2002 september 1990 fujitsu announced launch new series mainframe computers time fastest world july 1991 fujitsu acquired half russian company kme-cs kazan manufacturing enterprise computer systems 1992 fujitsu introduced world first 21-inch full-color plasma display hybrid based upon plasma display created university illinois urbana-champaign nhk strl achieving superior brightness 1993 fujitsu formed flash memory manufacturing joint venture amd spansion part transaction amd contributed flash memory group fab 25 texas r facilities assembly plants thailand malaysia china fujitsu provided flash memory business division malaysian fujitsu microelectronics final assembly test operations february 1989 mid-1997 fujitsu built fm towns pc variant started proprietary pc variant intended multimedia applications computer games later became compatible regular pcs 1993 fm towns marty released gaming console compatible fm towns games fujitsu agreed acquire 58 percent amdahl corporation including canada-based dmr consulting group already around 850 million july 1997 april 1997 company acquired 30 percent stake glovia international inc. el segundo calif. manufacturing erp software provider whose software begun integrating electronics plants starting 1994 june 1999 fujitsu historical connection siemens revived two companies agreed merge european computer operations new 50:50 joint venture called fujitsu siemens computers became world fifth-largest computer manufacturing company april 2000 fujitsu acquired remaining 70 glovia international april 2002 icl re-branded fujitsu march 2 2004 fujitsu computer products america lost class action lawsuit hard disk drives defective chips firmware october 2004 fujitsu acquired australian subsidiary atos origin systems implementation company around 140 employees specialized sap august 2007 fujitsu signed £500 million 10-year deal reuters group reuters outsourced majority internal department fujitsu part agreement around 300 reuters staff 200 contractors transferred fujitsu october 2007 fujitsu announced would establishing offshore development centre noida india capacity house 1,200 employees investment us 10 million october 2007 fujitsu australia new zealand subsidiary acquired infinity solutions ltd new zealand-based hardware services consultancy company undisclosed amount january 2009 fujitsu reached agreement sell hdd business toshiba transfer business completed october 1 2009 march 2009 fujitsu announced decided convert fdk corporation time equity-method affiliate consolidated subsidiary may 1 2009 tentative schedule subscribing private placement increase fdk capital april 1 2009 fujitsu agreed acquire siemens stake fujitsu siemens computers approximately eur450m fujitsu siemens computers subsequently renamed fujitsu technology solutions april 2009 fujitsu acquired australian software company supply chain consulting 48 million deal weeks purchasing telstra subsidiary kaz 200 million concerning net loss forecast amounted 95 billion yen year ending march 2013 february 2013 fujitsu announced cut 5,000 jobs 3,000 jobs japan rest overseas 170,000 employees fujitsu also merge large scale integrated chip business panasonic corporation 2015 fujitsu celebrates 80 years since establishment side currently embarked upon fujitsu 2015 world tour included 15 major cities globally visited 10,000 professionals fujitsu presenting take future hyper connectivity human centric computing april 2015 glovia international renamed fujitsu glovia inc november 2015 fujitsu limited vmware announced new areas collaboration empower customers flexible secure cloud technologies also acquired usharesoft provides enterprise-class application delivery software automating build migration governance applications multi-cloud environments january 2016 fujitsu network communications inc. announced new suite layered products advance software-defined networking sdn carriers service providers cloud builders virtuora nc based open standards described fujitsu suite standards-based multi-layered multi-vendor network automation virtualization products hands-on hardened largest global service providers fujitsu laboratories fujitsu research development division 1,300 employees capital 5 billion yen run tatsuo tomita 2012 fujitsu announced developed new technology non-3d camera phones technology allow camera phones take 3d photos fujitsu electronics europe gmbh entered market global distributor 1 january 2016 fujitsu consulting consulting services arm fujitsu group providing information technology consulting implementation management services fujitsu consulting founded 1973 montreal quebec canada original name dmr acronym three founder names pierre ducros serge meilleur alain roy next decade company established presence throughout quebec canada extending reach international markets nearly thirty years dmr consulting grew become international consulting firm changing name fujitsu consulting 2002 acquired fujitsu ltd. fujitsu operates division company india resulting acquisition north america-based company rapidigm offshore divisions noida pune hyderabad chennai bangalore pune head office fujitsu consulting india launched second 10 million development center noida october 2007 year starting operation country following expansion plan fujitsu consulting india launched fourth development center bengaluru nov 2011 fujitsu ltd. 42 shareholding fujitsu general manufactures markets various air conditioning units humidity control solutions general fujitsu brands india fujitsu general joint venture eta-ascon manufactures sells air conditioners general brand pfu limited headquartered ishikawa japan wholly owned subsidiary fujitsu limited pfu limited established 1960 approximately 4,600 employees globally 2013 turned 126.4 billion yen 1.2 billion usd pfu manufactures interactive kiosks keyboards network security hardware embedded computers imaging products document scanners pfu fujitsu brand addition hardware pfu also produce desktop enterprise document capture software document management software products pfu overseas sales marketing offices germany pfu imaging solutions europe limited italy pfu imaging solutions europe limited united kingdom pfu imaging solutions europe limited united states america fujitsu computer products america inc pfu limited responsible design development manufacture sales support document scanners sold fujitsu brand fujitsu market leaders professional document scanners best selling fi-series scansnap scanpartner product families well paperstream ip paperstream capture scansnap manager cardminder magic desktop rack2filer software products fujitsu glovia wholly owned subsidiary fujitsu ltd. discrete manufacturing enterprise resource planning software vendor based el segundo california international operations netherlands japan united kingdom company offers on-premise cloud-based erp manufacturing software glovia g2 brand software service saas brand glovia om company established 1970 xerox computer services developed inventory manufacturing financial applications fujitsu acquired 30 percent renamed glovia international 1997 remaining 70 percent stake 2000 fujitsu client computing limited fccl headquartered kawasaki kanagawa city company founded division fujitsu responsible research development design manufacturing sales consumer pc products formerly wholly owned subsidiary november 2017 fccl spun joint venture lenovo development bank japan dbj new company retains name fujitsu still responsible sales support products however lenovo owns majority stake 51 fujitsu retains 44 remaining 5 stake held dbj fujitsu computing product lines include may 2011 fujitsu decided enter mobile phone space microsoft announcing plans fujitsu would release windows phone devices fujitsu primergy eternus distributed tritech distribution limited hong kong lifebook amilo fujitsu range notebook computers tablet pcs fujitsu offers public cloud service delivered data centers japan australia singapore united states united kingdom germany based global cloud platform strategy announced 2010 platform delivers infrastructure-as-a-service iaas – virtual information communication technology ict infrastructure servers storage functionality – fujitsu data centers japan service offered on-demand virtual system service oviss launched globally fujitsu global cloud platform/s5 fgcp/s5 since july 2013 service called iaas trusted public s5 globally service operated fujitsu data centers located australia singapore united states united kingdom germany japan fujitsu also launched windows azure powered global cloud platform partnership microsoft offering delivering platform-as-a-service paas known fgcp/a5 japan since renamed fujitsu cloud paas a5 windows azure operated fujitsu data center japan offers set application development frameworks microsoft .net java php data storage capabilities consistent windows azure platform provided microsoft basic service consists compute storage microsoft sql azure windows azure appfabric technologies service bus access control service options inter-operating services covering implementation migration applications system building systems operation support fujitsu acquired runmyprocess april 2013 cloud-based integration platform-as-a-service paas specialized workflow automation business application development fujitsu launched cloud service k5 offering availability zones currently deployed japan uk deployments progressing across europe cloud service k5 based open-standard technologies consumed public cloud virtual private cloud private cloud fujitsu offers local cloud platforms australia provide ability rely domestic data centers keep sensitive financial data local jurisdiction compliance standards fujitsu produces sparc-compliant cpu sparclite venus 128 gflop sparc64 viiifx model included k computer world fastest supercomputer june 2011 rating 8 petaflops november 2011 k became first computer top 10 petaflops september 2011 fujitsu fr fr-v arm architecture microprocessors widely used additionally asics application-specific standard products assp like milbeaut customer variants named nikon expeed acquired spansion 2013 old slogan possibilities infinite found company logo major advertisements ties small logo letters j word fujitsu smaller logo represents symbol infinity april 2010 fujitsu process rolling new slogan focused entering partnerships customers retiring possibilities infinite tagline new slogan shaping tomorrow fujitsu reports notebook tablet pcs released globally comply latest energy star standard greenpeace cool leaderboard february 2012 evaluates global companies leadership fight stop climate change ranks fujitsu 3rd 21 leading manufacturers strength well-developed case study data solutions transparent methodology standing leaderboard scoring high future savings goal criterion
|
Distributed computing architecture
|
egl programming language egl enterprise generation language originally developed ibm available edt egl development tools open source project eclipse public license epl programming technology designed meet challenges modern multi-platform application development providing common language programming model across languages frameworks runtime platforms language borrows concepts familiar anyone using statically typed languages like java cobol c etc however borrows concept stereotype unified modeling language uml typically found statically typed programming languages nutshell egl higher-level universal application development language egl similar syntax common languages learned application developers similar previous programming background egl application development abstractions shield programmers technical interfaces systems middleware allowing focus building business functionality egl applications services written tested debugged egl source level satisfactorily functionally tested compiled cobol java javascript code support deployment business applications run following environments egl program part generatable logic part one entry point program part contains main function represents logic runs program start program include functions access functions outside program function main invoke functions program functions composed set egl statements variables constants egl record part defines set data elements example record name customerrecord defined 6 fields egl specialized type record called sqlrecord used exchange data relational database egl service part contains public functions meant accessed applications systems example service two functions defined main component rich ui application rich ui handler part parts generated javascript december 2008 ibm introduced new technology egl rich ui simplify creation web 2.0-style rich internet applications technology simplifies development hiding complexities ajax javascript rest soap developer enables focus business requirement underlying technologies egl programming tools available eclipse-based commercial product rational business developer also egl edition rational developer system z. egl target language modernization legacy applications language semantics affinity procedural languages legacy 4th generation languages tools searching large egl code bases comparing individual egl files changes detecting duplicated code available semantic designs
|
Programming language topics
|
ibm dppx distributed processing programming executive discontinued operating system introduced ibm pre-installed ibm 8100 later ported es/9370 dppx written programming language distributed systems pl/ds pl/i-derived systems programming language similar pl/s systems programming language used mvs vm part dppx/370 development process developing pl/ds 2 language based pl/ds changes necessitated changed instruction set pl/ds like pl/s high-level language encourages significant use inline assembly user interfaces e.g. command line dppx clean easy use syntax commands whole concept ideas dppx looked straightforward consistent command line online help etc every aspect documented online rich set well organized printed manuals dppx system could operated truly operator-less remote hence distributed part name one benefit clean design programs could written modern dialects cobol dialogs could developed interactively addition expected functions operating system dppx included several functions allowed remote administration distributed host command facility dhcf allowed host command facility hcf user mainframe log either full-screen mode line mode execute commands though logged locally distributed systems network node executive dsnx allowed distributed systems executive dsx later netview/dm job manage files separate additional products also available including cobol fortran compilers distributed transaction management system dtms command facilities extensions cfe provided easy support full-screen applications data stream capability dsc allow dppx users log applications mainframe performance tool pt
|
Operating systems
|
application packaging standard application packaging standard aps standard defines technology integrating application software hosting platforms integration application hosting platforms implemented creating aps package application aps package deployment creates aps application aps involves three types participants integration process aps went two stages aps 1 emerged way creating predominantly two types aps packages respectively two types aps applications aps 2 added flexibility integrate applications hosting platforms also aps 2 makes possible create custom user interface hosting platforms managing integrated applications following web hosting platforms allow installations aps packages aps packages available download application catalog isvs make applications publicly available uploading catalog
|
Operating systems
|
coherent operating system coherent clone unix operating system ibm pc compatibles microcomputers developed sold now-defunct mark williams company mwc historically operating system proprietary product became open source 2015 released 3-clause bsd license coherent unix mark williams company rights either unix trademark t/bell labs source code early years existence mwc received visit delegation looking determine whether mwc infringing unix property delegation included dennis ritchie concluded hard believe coherent basic applications created without considerable study os code details applications however also stated much operating system written alumni university waterloo tom duff dave conroy randall howard johann george trevor john thompson significant contributions also made people nigel bree auckland new zealand later author ghost coherent originally written pdp-11 range minicomputers 1980 ported various early 1980s microcomputer systems including ibm pc compatibles machines based zilog z8000 motorola 68000 initially sold oems starting 1983 available consumer market mwc directly point coherent 2.3 offered roughly functionality version 7 unix pc hardware including nroff formatter bsd extensions offered competing unix/clone vendors compared competitors small system distributed seven double-sided floppy disks costing us 500 license byte 1984 called coherent highly compatible unix version 7 lookalike 1985 criticized difficulty installation stated unix clone coherent amazingly complete ... easy port programs ... price 495 bargain early 1990s reviews coherent pointed system much smaller contemporary unix offerings well less expensive us 99.95 lacking functionality software support pc magazine called coherent 3.0 time capsule captured state unix late 1970s without support mice lans scsi disks good learning basic unix programming business automation review auug newsletter positive favorably comparing coherent mks toolkit minix xenix suggesting might fill niche low-end training platform coherent able run intel-based pcs intel 8088 286 386 486 processors coherent version 3 intel-based pcs required least 286 coherent version 4 intel-based pcs required least 386 like true unix coherent able multitask support multiple users version 4 released 1992 coherent also support x11 mgr windowing systems later versions coherent version 4 higher supported features common modern unix-like systems including version microemacs access dos fat16 file systems optimizing c compiler modified version taylor uucp final releases coherent also fully supported ibcs coff binary standard allowed binary compatibility sco unix applications including wordperfect lotus 1-2-3 several microsoft applications including quickbasic microsoft word multiplan last 386 versions supported virtual memory demand paging zilog z8000 port coherent also used canceled commodore 900 system 1983 ncsc subsidiary nixdorf announced port coherent ibm mainframes form unix compatibility subsystem ibm dos/vs dos/vse nixdorf edos/vs edos/vse operating systems known programmer work station/vse-advanced functions pws/vse-af short mark williams company closed 1995 january 3 2015 coherent sources released 3-clause bsd license
|
Operating systems
|
ntop ntop stylized ntop computer software probes computer network show network use way similar program top processes interactive mode displays network status user terminal web mode acts web server creating html dump network status supports netflow-sflow emitter-collector hypertext transfer protocol http based client interface creating ntop-centric monitoring applications rrdtool rrd persistently storing traffic statistics ntop available unix win32-based platforms developed luca deri italian research scientist network manager university pisa common usage linux system start ntop daemon /etc/init.d/ntopd start one use web interface ntop via visiting nowiki http //127.0.0.1:3000 /nowiki provided loopback device started /etc/init.d/net.lo start listening port ntop 3000 look -w option ps aux grep ntop
|
Computer security
|
lossless-join decomposition computer science concept lossless-join decomposition central removing redundancy safely databases preserving original data also called nonadditive decompose relation formula_1 relations formula_2 lossless-join natural join two smaller relations yields back original relation .e formula_3 formula_1 split formula_5 formula_6 decomposition lossless least one two following criteria met projecting formula_5 formula_6 joining back results relation started let formula_1 relation schema let set functional dependencies formula_1 let formula_5 formula_6 form decomposition formula_1 decomposition lossless-join decomposition formula_1 least one following functional dependencies stands closure every attribute attribute sets
|
Databases
|
lucee lucee open source software implements lightweight dynamically-typed scripting language java virtual machine jvm facilitating rapid development web applications compile directly java bytecode lucee compatible contemporary cfml script tag language variants provides configurable support legacy cfml lucee language supports multiple development paradigms including object orientation inheritance interfaces functional constructs like higher-order functions closures codice_1 codice_2 lucee created lucee association switzerland forked version 4.2 railo server developed lucee built-in support microsoft sql server mysql oracle postgresql many popular relational database engines lucee also supports database jdbc driver available lucee built-in support calling consuming data returned existing web services along ability easily configure expose web services consumed lucee supports three types web services lucee built-in support object relational mapping orm framework hibernate facilitating hibernate usage lucee code without complex explicit configuration lucee built-in support multiple caching systems including infinispan ehcache memcached extended additional systems cache implementations configured within lucee server used within application—both explicitly implicitly—for caching database results function call results external http request results serialized session storage flexible backing store in-process ram-based file-system abstraction lucee supports multiple virtual file systems—built-in abstractions various local remote resources—including zip http ftp s3 ram allow lucee server developer treat access abstracted resource manner local file system lucee derived coldfusion markup language cfml therefore support tag-based script-based versions cfml examples assign string hello world value variable codice_3 output value response buffer typically display web browser lucee project led lucee association switzerland non-profit swiss association association consists members help fund guide project project also enterprise corporate individual supporters supporters members lucee association help fund promote project exchange certain benefits
|
Programming language topics
|
cyber insurance cyber-insurance insurance product used protect businesses individual users internet-based risks generally risks relating information technology infrastructure activities risks nature typically excluded traditional commercial general liability policies least specifically defined traditional insurance products coverage provided cyber-insurance policies may include first-party coverage losses data destruction extortion theft hacking denial service attacks liability coverage indemnifying companies losses others caused example errors omissions failure safeguard data defamation benefits including regular security-audit post-incident public relations investigative expenses criminal reward funds cyber-insurance market many countries relatively small compared insurance products overall impact emerging cyber threats difficult quantify impact people businesses cyber threats also relatively broad compared scope protection provided insurance products insurance companies continue develop services insurers pay cyber-losses cyber threats develop change insurance products increasingly purchased alongside existing security services indeed underwriting criteria insurers offer cyber-insurance products also early development underwriters actively partnering security companies develop products well directly improving security cyber-insurance enormously beneficial event large-scale security breach insurance provides smooth funding mechanism recovery major losses helping businesses return normal reducing need government assistance finally insurance allows cyber-security risks distributed fairly cost premiums commensurate size expected loss risks avoids potentially dangerous concentrations risk also preventing free-riding information technology inherent facet virtually modern businesses requirement separate product exists deliberate scoping exercise excluded theft damage associated modern technologies existing product lines bruce schneier postulated existing insurance practices tend follow either flood fire model however cyber events n't appear modeled either event types led situation scope cyber insurance restricted decrease risk underwriters compounding paucity data relating actual damage correlated type event lack standards associated classification events lack evidence associated efficacy industry best practices insurance relies upon sound actuarial data largely static background risk given n't exist present unlikely either buyers products achieve value outcomes desire.this view market reflected current market state standard exclusions result situation insurer could argue apply almost data breach early works 1990s focused general merits cyber-insurance protocols borrowed digital cash enable risk reallocation distributed systems late 1990s business perspective information security became prominent visions cyber-insurance risk management tool formulated although roots 1980s looked promising battered events y2k 9/11 attacks market cyber-insurance failed thrive remained niche unusual demands coverage tightly limited clients include smbs small medium businesses need insurance qualify tenders community banks small hedge risks online banking operations first least one first cyber liability policies call developed lloyd london market 2000 policy spearheaded keith daniels rob hamesfahr attorneys chicago il law firm blatt hammesfahr eaton working closely ian hacker lloyd underwriter ted doolittle kinsey carpenter brokers kinsey carpenter san francisco ca insurance broker policy provided third-party coverage along business interruption coverage early days thought big risk would company negligently transmit virus could infect companies systems would bring suit original company well business interruption policy one first well include first-party third-party coverages form errors omissions likely happened suits organizations basis proven rare focus forms developed since 2000 business interruption payment fines penalties credit monitoring costs public relations costs cost restoring rebuilding private data continue expand evolve today addition technology errors omissions policies sold third-party coverage organizations programmers technology installers could get sued advice product fails satisfactory clients early entrants cyber market included american international group aig chubb today 80 companies competing cyber market even 2002 conservative forecast predicted global market cyber-insurance worth 2.5 billion 2005 turned five times higher size market 2008 overall relative terms market cyber-insurance shrank internet economy grew practice number obstacles prevented market cyber-insurance achieving maturity absence reliable actuarial data compute insurance premiums lack awareness among decision-makers contributing little demand well legal procedural hurdles identified first generation cyber-insurance literature 2005 latter aspect may cause frustration claiming compensation damages furthermore entities considering cyber-insurance must undergo series often invasive security evaluation procedures revealing infrastructures policies meanwhile witnessing thousands vulnerabilities millions attacks substantial improvement defining security standards computer forensics calls question validity factors causally explain lack insurance market infrastructure users services offered computer networks today subject wide variety risks posed threats include distributed denial service attacks intrusions various kinds eavesdropping hacking phishing worms viruses spams etc order counter risk posed threats network users traditionally resorted antivirus anti-spam software firewalls intrusion-detection systems idss add-ons reduce likelihood affected threats practice large industry companies like symantec mcafee etc well considerable research efforts currently centered around developing deploying tools techniques detect threats anomalies order protect cyber infrastructure users resulting negative impact anomalies spite improvements risk protection techniques last decade due hardware software cryptographic methodologies impossible achieve perfect/near-perfect cyber-security protection impossibility arises due number reasons view above-mentioned inevitable barriers near 100 risk mitigation need arises alternative methods risk management cyberspace highlight importance improving current state cyber-security us president barack obama issued cyber-security executive order february 2013 emphasizes need reduce cyber-threats resilient regard security researchers recent past identified cyber-insurance potential tool effective risk management cyber-insurance risk management technique via network user risks transferred insurance company return fee i.e. insurance premium examples potential cyber-insurers might include isp cloud provider traditional insurance organizations proponents cyber-insurance believe cyber-insurance would lead design insurance contracts would shift appropriate amounts self-defense liability clients thereby making cyberspace robust term ‘ self-defense implies efforts network user secure system technical solutions anti-virus anti-spam software firewalls using secure operating systems etc cyber-insurance also potential market solution align economic incentives cyber-insurers users individuals/organizations policy makers security software vendors i.e. cyber-insurers earn profit appropriately pricing premiums network users seek hedge potential losses jointly buying insurance investing self-defense mechanisms policy makers would ensure increase overall network security security software vendors could experience increase product sales via forming alliances cyber-insurers key area manage risk establish acceptable risk organization practicing 'duty care helps protect interested parties executives regulators judges public affected risks duty care risk analysis standard docra provides practices principles help balance compliance security business objectives developing security controls consequently 2005 “ second generation cyber-insurance literature emerged targeting risk management current cyber-networks authors literature link market failure fundamental properties information technology specially correlated risk information asymmetries insurers insureds inter-dependencies information asymmetry significant negative effect insurance environments typical considerations include inability distinguish users different high low risk types i.e. so-called adverse selection problem well users undertaking actions adversely affect loss probabilities insurance contract signed i.e. so-called moral hazard problem challenge due interdependent correlated nature cyber-risks particular cyber-insurance differentiates traditional insurance scenarios e.g. car health insurance former large distributed system internet risks span large set nodes correlated thus user investments security counter risks generate positive externalities users network aim cyber-insurance enable individual users internalize externalities network user optimally invests security solutions thereby alleviating moral hazard improving network security traditional insurance scenarios risk span quite small sometimes spans one two entities uncorrelated thus internalizing externalities generated user investments safety much easier like insurance policies cyber insurance typically includes war exclusion clause explicitly excluding damage acts war majority cyber insurance claims relate simple criminal behaviour increasingly companies likely fall victim cyberwarfare attacks nation states terrorist organisations whether specifically targeted simply collateral damage us uk governments characterised notpetya attack russian military cyber-attack insurers arguing cover events current work regarding existence cyber-insurance markets among important ones works lelarge bolot ii pal golubchik psounis hui iii johnson et al. iv shetty et al works first comment free riding behavior internet users without presence cyber-insurance works lelarge et al shetty et al present benefits cyber-insurance incentivizing internet users invest appropriately security however works address restricted market types lelarge et al model information asymmetry work shetty et al prove cyber-insurance markets inefficient conditions information asymmetry johnson et al discuss role joint existence self-insurance market insurance adoption different types insurance users recent work pal et al prove inefficiency cyber-insurance markets conditions partial information asymmetry correlated risks show existence efficient markets regulated unregulated premium discrimination 2014 90 cyber-insurance premium volume covering exposure united states although least 50 insurance companies cyber-insurance product offerings actual writing concentrated within group five underwriters many insurance companies hesitant enter coverage market sound actuarial data cyber exposure non-existent hampering development actuarial data inadequate disclosure regarding cyber attacks affected significant malware incident 2017 however reckitt benckiser released information much cyberattack would impact financial performance leading analysts believe trend companies transparent data cyber incidents cyber insurance premiums expected grow around 2 billion 2015 estimated 20 billion 2025 insurers reinsurers continuing refine underwriting requirements market immaturity lack standardization two reasons underwriting cyber products today make interesting place insurance world insurance marketplace ’ trying reach standard accommodate needs today ’ insured also time rapidly developing exposure landscape capacity available
|
Computer security
|
tcp/ip stack fingerprinting tcp/ip stack fingerprinting passive collection configuration attributes remote device standard layer 4 network communications combination parameters may used infer remote machine operating system aka os fingerprinting incorporated device fingerprint certain parameters within tcp protocol definition left implementation different operating systems different versions operating system set different defaults values collecting examining values one may differentiate among various operating systems implementations tcp/ip tcp/ip fields may vary include following values may combined form 67-bit signature fingerprint target machine inspecting initial ttl window size fields often enough order successfully identify operating system eases task performing manual os fingerprinting protection fingerprint doorway attack achieved limiting type amount traffic defensive system responds examples include blocking address masks timestamps outgoing icmp control-message traffic blocking icmp echo replies security tool alert potential fingerprinting match another machine fingerprinter configuration detecting fingerprint disallowing tcp/ip fingerprinting provides protection vulnerability scanners looking target machines running certain operating system fingerprinting facilitates attacks blocking icmp messages one array defenses required full protection attacks targeting icmp datagram obfuscator running top ip internet layer acts scrubbing tool confuse tcp/ip fingerprinting data exist ms windows linux freebsd list tcp/os fingerprinting tools
|
Internet protocols
|
associative model data associative model data data model database systems data models relational model object data model record-based models involve encompassing attributes thing car record structure attributes might registration colour make model etc associative model everything “ discrete independent existence ” modeled entity relationships modeled associations granularity data represented similar schemes presented chen entity-relationship model bracchi paolini pelagatti binary relations senko entity set model number claims made model simon williams book associative model data distinguish associative model traditional models associative database management system data metadata data data stored two types things associative model would use two structures store piece information flight ba1234 arrived london heathrow 12-dec-05 10:25 seven items four nouns flight ba1234 london heathrow 12-dec-05 10:25 three verbs arrived three links needed store data first link flight ba1234 source arrived verb london heathrow target second link first link source verb item 12-dec-05 target link begins ellipsis ... previous link source third link second link source verb 10:25 target alternative way write thing using parentheses associative database may regarded comprising two tables one items one links item link arbitrary number called surrogate identifier
|
Databases
|
georg c. f. greve georg c. f. greve born 10 march 1973 helgoland germany software developer physicist author currently co-founder president vereign working technology politics since founded free software foundation europe fsfe 2001 greve working full-time president fsfe since early 2001 june 2009 handed presidency fsfe karsten gerloff responsibilities fsfe included coordination general assembly supporting local representatives work working political legal issues well projects giving speeches informing journalists spread knowledge free software addition georg greve also worked consultant representing google ooxml standardisation process iso project reviewer european commission greve married currently lives switzerland 2010 greve awarded cross merit ribbon federal republic germany verdienstkreuz bande greve degree physics biophysics physical oceanography astronomy minor fields study computer science department university hamburg interdisciplinary diploma thesis written field nanotechnology scanning probe microscopy greve first software development 12 years old first publication program professional journal 1992 partly financed studies managed software development evaluate squid-sensor data biomagnetometic laboratory university medical center hamburg-eppendorf hamburg germany 1993 came across free software gnu project linux 1998 european speaker gnu project began writing brave gnu world monthly column free computer software featuring interesting gnu projects month published internet many ten languages international printed magazines including german linux-magazin name brave gnu world reference aldous huxley novel brave new world early 2001 initiated free software foundation europe fsfe fsf europe first free software foundation outside united states america transnational free software foundation greve invited expert “ commission intellectual property rights ” uk government represented coordination circle german civil society first phase united nations un world summit information society wsis part german governmental delegation also networked civil society working groups european level well thematic working group patents copyrights trademarks pct free software 2010 2017 served ceo well president later member board kolab systems ag küsnacht switzerland developers kolab server late 2017 greve known advocate open source co-founded company called vereign enable authentic communication blockchain federated networks claus h. bressmer
|
Operating systems
|
mindnet mindnet name several automatically acquired databases lexico-semantic relations developed members natural language processing group microsoft research 1990s considered one world largest lexicons databases could make automatic semantic descriptions along wordnet framenet hownet integrated linguistic database particularly distinguished wordnet way created automatically dictionary mindnet designed continuously extended first built longman dictionary contemporary english ldoce later included american heritage full text microsoft encarta system analyze linguistic representations arbitrary text underlying technology based parser used microsoft word grammar checker deployed natural language query engine microsoft encarta 99 encyclopedia
|
Computational linguistics
|
cwm software cwm pronounced koom general-purpose data processing software semantic web similar sed awk text files xslt xml forward chaining semantic reasoner used querying checking transforming filtering information core language rdf extended include rules use rdf/xml rdf/n3 see notation3 primer serializations cwm perform following tasks cwm written python 2000-10 onwards tim berners-lee dan connolly w3c
|
Web technology
|
berkeley software distribution berkeley software distribution bsd operating system based research unix developed distributed computer systems research group csrg university california berkeley today bsd often refers descendants freebsd openbsd netbsd dragonfly bsd bsd initially called berkeley unix based source code original unix developed bell labs 1980s bsd widely adopted workstation vendors form proprietary unix variants dec ultrix sun microsystems sunos due permissive licensing familiarity many technology company founders engineers although proprietary bsd derivatives largely superseded 1990s unix svr4 osf/1 later releases provided basis several open-source operating systems including freebsd openbsd netbsd dragonfly bsd darwin trueos turn used proprietary operating systems including apple macos ios derived microsoft windows used part tcp/ip code earliest distributions unix bell labs 1970s included source code operating system allowing researchers universities modify extend unix operating system arrived berkeley 1974 request computer science professor bob fabry program committee symposium operating systems principles unix first presented pdp-11/45 bought run system budgetary reasons machine shared mathematics statistics groups berkeley used rsts unix ran machine eight hours per day sometimes day sometimes night larger pdp-11/70 installed berkeley following year using money ingres database project 1975 ken thompson took sabbatical bell labs came berkeley visiting professor helped install version 6 unix started working pascal implementation system graduate students chuck haley bill joy improved thompson pascal implemented improved text editor ex universities became interested software berkeley 1977 joy started compiling first berkeley software distribution 1bsd released march 9 1978 1bsd add-on version 6 unix rather complete operating system right thirty copies sent second berkeley software distribution 2bsd released may 1979 included updated versions 1bsd software well two new programs joy persist unix systems day vi text editor visual version ex c shell 75 copies 2bsd sent bill joy vax computer installed berkeley 1978 port unix vax architecture unix/32v take advantage vax virtual memory capabilities kernel 32v largely rewritten berkeley students include virtual memory implementation complete operating system including new kernel ports 2bsd utilities vax utilities 32v released 3bsd end 1979 3bsd also alternatively called virtual vax/unix vmunix virtual memory unix bsd kernel images normally called codice_1 4.4bsd 4.3bsd released june 1986 determined bsd would move away aging vax platform power 6/32 platform codenamed tahoe developed computer consoles inc. seemed promising time abandoned developers shortly thereafter nonetheless 4.3bsd-tahoe port june 1988 proved valuable led separation machine-dependent machine-independent code bsd would improve system future portability addition portability csrg worked implementation osi network protocol stack improvements kernel virtual memory system van jacobson lbl new tcp/ip algorithms accommodate growth internet versions bsd used proprietary unix code therefore subject software license source code licenses become expensive several outside parties expressed interest separate release networking code developed entirely outside would subject licensing requirement led networking release 1 net/1 made available non-licensees code freely redistributable terms bsd license released june 1989 net/1 bsd developer keith bostic proposed non-at sections bsd system released license net/1 end started project reimplement standard unix utilities without using code within eighteen months utilities replaced determined files remained kernel files removed result june 1991 release networking release 2 net/2 nearly complete operating system freely distributable net/2 basis two separate ports bsd intel 80386 architecture free 386bsd william jolitz proprietary bsd/386 later renamed bsd/os berkeley software design bsdi 386bsd short-lived became initial code base netbsd freebsd projects started shortly thereafter bsdi soon found legal trouble unix system laboratories usl subsidiary owners system v copyright unix trademark usl v. bsdi lawsuit filed 1992 led injunction distribution net/2 validity usl copyright claims source could determined lawsuit slowed development free-software descendants bsd nearly two years legal status question result systems based linux kernel legal ambiguity gained greater support lawsuit settled january 1994 largely berkeley favor 18,000 files berkeley distribution three removed 70 modified show usl copyright notices condition settlement usl would file lawsuits users distributors berkeley-owned code upcoming 4.4bsd release final release berkeley 1995 4.4bsd-lite release 2 csrg dissolved development bsd berkeley ceased since several variants based directly indirectly 4.4bsd-lite freebsd netbsd openbsd dragonfly bsd maintained permissive nature bsd license allowed many operating systems open-source proprietary incorporate bsd source code example microsoft windows used bsd code implementation tcp/ip bundles recompiled versions bsd command-line networking tools since windows 2000 darwin basis apple macos ios based 4.4bsd-lite2 freebsd various commercial unix operating systems solaris also incorporate bsd code starting 8th edition versions research unix bell labs close relationship bsd began 4.1cbsd vax used basis research unix 8th edition continued subsequent versions 9th edition incorporated source code improvements 4.3bsd result later versions research unix closer bsd system v. usenet posting 2000 dennis ritchie described relationship bsd research unix eric s. raymond summarizes longstanding relationship system v bsd stating divide roughly longhairs shorthairs programmers technical people tended line berkeley bsd business-oriented types system v. 1989 david a. curry wrote differences bsd system v. characterized system v often regarded standard unix however described bsd popular among university government computer centers due advanced features performance berkeley unix first unix include libraries supporting internet protocol stacks berkeley sockets unix implementation ip predecessor arpanet ncp ftp telnet clients produced university illinois 1975 available berkeley however memory scarcity pdp-11 forced complicated design performance problems integrating sockets unix operating system file descriptors became almost easy read write data across network access disk laboratory eventually released streams library incorporated much functionality software stack different architecture wide distribution existing sockets library reduced impact new api early versions bsd used form sun microsystems sunos founding first wave popular unix workstations bsd operating systems run much native software several operating systems architecture using binary compatibility layer much simpler faster emulation allows instance applications intended linux run effectively full speed makes bsds suitable server environments also workstation ones given increasing availability commercial closed-source software linux also allows administrators migrate legacy commercial applications may supported commercial unix variants modern operating system retaining functionality applications replaced better alternative current bsd operating system variants support many common ieee ansi iso posix standards retaining traditional bsd behavior like unix bsd kernel monolithic meaning device drivers kernel run privileged mode part core operating system several operating systems based bsd including freebsd openbsd netbsd midnightbsd dragonfly bsd netbsd freebsd created 1993 initially derived 386bsd also known jolix merged 4.4bsd-lite source code 1994 openbsd forked netbsd 1995 dragonfly bsd forked freebsd 2003 bsd also used basis several proprietary versions unix sun sunos sequent dynix next nextstep dec ultrix osf/1 axp tru64 unix nextstep later became foundation apple inc. macos
|
Operating systems
|
spidermonkey spidermonkey code name first javascript engine written brendan eich netscape communications later released open-source currently maintained mozilla foundation eich wrote javascript ten days 1995 recruited netscape promise 'doing scheme browser idea using scheme abandoned engineering management decided language must ‘ look like java ’ fall 1996 eich needing pay substantial technical debt left first year stayed home two weeks rewrite mocha codebase became known spidermonkey mocha original working name language name spidermonkey may chosen reference movie beavis butt-head america character tom anderson mentions title characters whacking like couple spider monkeys 2011 eich transferred management spidermonkey code dave mandelin spidermonkey implements ecma-262 edition 5.1 ecmascript several added features ecma-357 ecmascript xml e4x dropped early 2013 even though spidermonkey used firefox provide host environments document object model dom mozilla projects support dom gecko provides host environment spidermonkey written c/c++ contains interpreter ionmonkey jit compiler garbage collector tracemonkey first jit compiler written javascript language compiler first released part spidermonkey firefox 3.5 providing performance improvements ranging 20 40 times faster baseline interpreter firefox 3 instead compiling whole functions tracemonkey tracing jit operates recording control flow data types interpreter execution data informed construction trace trees highly specialized paths native code improvements jägermonkey eventually made tracemonkey obsolete especially development spidermonkey type inference engine tracemonkey absent spidermonkey firefox 11 onward jägermonkey internally named methodjit whole-method jit compiler designed improve performance cases tracemonkey could generate stable native code first released firefox 4 eventually entirely supplanted tracemonkey replaced ionmonkey jägermonkey operated differently compilers class typical compilers worked constructing optimizing control flow graph representing function jägermonkey instead operated iterating linearly forward spidermonkey bytecode internal function representation although prohibits optimizations require instruction reordering jägermonkey compiling advantage fast useful javascript since recompiling due changing variable types frequent mozilla implemented number critical optimizations jägermonkey importantly polymorphic inline caches type inference difference tracemonkey jägermonkey jit techniques need explained hacks.mozilla.org article in-depth explanation technical details provided chris leary one spidermonkey developers blog post technical information found developer blogs dvander dmandelin ionmonkey name mozilla current javascript jit compiler aims enable many new optimizations impossible prior jägermonkey architecture ionmonkey traditional compiler translates spidermonkey bytecode control flow graph using static single assignment form ssa intermediate representation architecture enables well-known optimizations programming languages used javascript including type specialization function inlining linear-scan register allocation dead code elimination loop-invariant code motion compiler emit fast native code translations javascript functions arm x86 x86-64 platforms default engine since firefox 18 odinmonkey name mozilla new optimization module asm.js easily compilable subset javascript odinmonkey jit compiler uses current jit compiler included firefox release 22 spidermonkey intended embedded applications provide host environments javascript incomplete list follows spidermonkey includes javascript shell interactive javascript development command-line invocation javascript program files
|
Programming language topics
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.