text
stringlengths
6
1.88M
source
stringclasses
13 values
bsd daemon bsd daemon nicknamed beastie generic mascot bsd operating systems bsd daemon named software daemons class long-running computer programs unix-like operating systems play words takes cartoon shape demon bsd daemon nickname beastie slurred phonetic pronunciation bsd beastie customarily carries trident symbolize software daemon forking processes freebsd web site noted evi nemeth 1988 remarks cultural-historical daemons unix system administration handbook ancient greeks concept 'personal daemon similar modern concept 'guardian angel ... rule unix systems seem infested daemons demons copyright official bsd daemon images held marshall kirk mckusick early bsd developer worked bill joy freely licensed mascot individual personal use within bounds good taste example bad taste picture bsd daemon blowtorching solaris logo use requires copyright notice attribution reproduction daemon quantity t-shirts cdroms requires advance permission mckusick restricts use implementations bsd company logo although companies bsd-based products scotgold wind river systems gotten kind permission mckusick said early 1990s almost lost daemon certain large company failed show due diligence protecting 've taken due diligence seriously since request use license creative commons mckusick replied prefer bsd daemon used context bsd software reason carefully control copyright bsd daemon image ensure image used inappropriately agreed allow small image appear wikipedia larger ones also going put creative commons copyright bsd daemon first drawn 1976 comic artist phil foglio developer mike o'brien working bonded locksmith time opened wall safe foglio chicago apartment roommate split town without leaving combination return foglio agreed draw t-shirt artwork o'brien gave polaroid snaps pdp-11 system running unix along notions visual puns pipes demons/daemons forks bit bucket named /dev/null etc foglio drawing showed four happy little red daemon characters carrying tridents climbing falling water pipes front caricature pdp-11 used first national unix meeting us held urbana illinois bell labs bought dozens t-shirts featuring drawing subsequently appeared unix t-shirts decade usenix purchased reproduction rights foglio artwork 1986 original drawing apparently lost shortly sent digital equipment corporation use advertisement known copies photographs surviving t-shirts later popular versions bsd daemon drawn animation director john lasseter beginning early greyscale drawing cover unix system manager manual published 1984 usenix 4.2bsd author/editor sam leffler technical staff member csrg lasseter employees lucasfilm time four years lasseter drew widely known take bsd daemon cover mckusick co-authored 1988 book design implementation 4.3bsd operating system lasseter drew somewhat lesser-known running bsd daemon 4.4bsd version book 1994 1994 2004 netbsd project used artwork shawn mueller logo featuring four bsd daemons pose similar famous photo raising flag iwo jima however logo seen inappropriate international project superseded abstract flag logo chosen 400 entries competition early versions openbsd 2.3 2.4 used bsd daemon halo briefly used daemon police officer version 2.5 however openbsd switched puffy blowfish mascot freebsd project used 1988 lasseter drawing logo mascot 12 years however questions arose graphic effectiveness logo daemon unique freebsd since historically used bsd variants members freebsd core team considered inappropriate corporate marketing purposes lithographically scanned lasseter drawing line art however drawn neither scaled easily wide range sizes rendered appealingly two three colours contest create new freebsd logo began february 2005 scalable graphic somewhat echoes bsd daemon head chosen following october although little red fellow kept official project mascot walnut creek cdrom also produced two variations daemon cdrom covers freebsd 1.0 1.1 cdrom covers used 1988 lasseter drawing freebsd 2.0 cdrom used variant different colored specifically green tennis shoes distributions used image different colored tennis shoes years starting freebsd 2.0.5 walnut creek cdrom covers used daemon walking cdrom starting freebsd 4.5 freebsd mall used mirrored image walnut creek 2.0 image walnut creek 2.0 image also appeared cover different freebsd handbook editions mid-1990s marketer walnut creek cdrom called mascot chuck perhaps referring brand name kind shoes worn character name strongly deprecated copyright holder said bsd daemon proud fact name bsd daemon insist name call beastie ascii art image bsd daemon felix lee appeared startup menu freebsd version 5.x still set startup image later versions also used daemon_saver screensaver
Operating systems
lethic botnet lethic botnet initially discovered around 2008 botnet consisting estimated 210 000 310 000 individual machines mainly involved pharmaceutical replica spam around early january 2010 botnet dismantled neustar employees contacted various lethic internet service providers bid take control botnet command control servers move temporarily caused botnets spam decrease trickle original volume february 2010 owners botnet managed re-establish control botnet use new command control servers located united states takedown decreased spam volume botnet however february 2010 botnets amount spam third original april 2010 botnet estimated 1.5 share spam market sending 2 billion spam messages day
Computer security
list devices using mediatek socs page lists every major device using mediatek system-on-a-chip soc organized chip devices uses based 32-bit arm7ej-s risc processor smartwatches mt6223c direct support cif camera based 32-bit arm7ej-s risc processor mt6238 support 3mp camera soc support java applications midp-2.1 cldc-1.1 instruction sets mediatek first soc compatible 3g networks smartwatches smartwatches
Computer architecture
known-plaintext attack known-plaintext attack kpa attack model cryptanalysis attacker access plaintext called crib encrypted version ciphertext used reveal secret information secret keys code books term crib originated bletchley park british world war ii decryption operation usage crib adapted slang term referring cheating e.g. cribbed answer test paper crib originally literal interlinear translation foreign-language text—usually latin greek text—that students might assigned translate original language idea behind crib cryptologists looking incomprehensible ciphertext clue word phrase might expected ciphertext would wedge test break otherwise random attacks cipher managed sometimes produce words preferably phrases would know might right track words phrases appeared would feed settings used reveal back whole encrypted message good effect case enigma german high command meticulous overall security enigma system understood possible problem cribs day-to-day operators hand less careful bletchley park team would guess plaintext based upon message sent recognizing routine operational messages instance daily weather report transmitted germans time every day due regimented style military reports would contain word wetter german weather location every message knowing local weather conditions helped bletchley park guess parts plaintext well operators would send standard salutations introductions officer stationed qattara depression consistently reported nothing report heil hitler occurring end message another well-known example bletchley park world war ii strenuous efforts made use even force germans produce messages known plaintext example cribs lacking bletchley park would sometimes ask royal air force seed particular area north sea mines process came known gardening obvious reference enigma messages soon sent would likely contain name area harbour threatened mines germans could accommodating regard whenever turned german double-cross agents sent message written british respective handlers frequently obligingly re-encrypted message word word enigma onward transmission berlin captured german revealed interrogation enigma operators instructed encode numbers spelling alan turing reviewed decrypted messages determined number eins one common string plaintext automated crib process creating eins catalogue assumed eins encoded positions plaintext catalogue included every possible position various rotors starting positions keysettings enigma polish cipher bureau likewise exploited cribs anx method world war ii germans use german followed x spacer form text anx united states britain used one-time tape systems 5-uco sensitive traffic devices immune known-plaintext attack however point-to-point links required massive supplies one time tapes networked cipher machines considered vulnerable cribs various techniques used disguise beginning ends message including cutting messages half sending second part first adding nonsense padding ends latter practice resulted world wonders incident kl-7 introduced mid-1950s first u.s. cipher machine considered safe known-plaintext attack classical ciphers typically vulnerable known-plaintext attack example caesar cipher solved using single letter corresponding plaintext ciphertext decrypt entirely general monoalphabetic substitution cipher needs several character pairs guessing fewer 26 distinct pairs
Computer security
socket am2 socket am2 renamed socket m2 prevent using name cyrix mii processors cpu socket designed amd desktop processors including performance mainstream value segments released may 23 2006 replacement socket 939 am2 processors incompatible 939 motherboards vice versa although 940 pins incompatible socket 940 socket am2 supports ddr2 sdram memory ddr memory previous socket 939 supported anandtech reported socket am2 system performance 7 faster socket 939 equivalents applications 2 faster despite 30 greater memory bandwidth due ddr2 support first processor cores support socket am2 single-core orleans athlon 64 manila sempron dual-core windsor athlon 64 x2 athlon 64 fx processors socket am2 include sse3 instructions developed 90 nanometer technology later models featured 65 nanometer technology socket am2 also supports newer amd phenom processors originally built socket am2+ backward compatible am2 however depended upon system/motherboard manufacturer supply bios firmware update operate processor socket am2 part amd generation cpu sockets included socket f servers socket s1 mobile computing also single-socket opteron processors available am2 technical documentation readily available earlier generations amd processor sockets am2 processor functional data sheet amd document number 31117 made publicly available 4 holes fastening heatsink motherboard placed rectangle lateral lengths 48 mm 96 mm amd sockets socket am2 socket am2+ socket am3 socket am3+ socket fm2 cooling solutions therefore interchangeable multiple sockets announced theory pin-compatible socket am2 differ terms features socket am2+ intermediate successor socket am2 features split power planes hypertransport 3.0 socket am2+ chips plug socket am2 motherboard although certain motherboard manufacturers support operate hypertransport 2.0 socket am3 processors able run socket am2 am2+ motherboards appropriate bios updates vice versa am3 processors new memory controller supporting ddr2 ddr3 sdram allowing backwards compatibility am2 am2+ motherboards since am2 am2+ processors lack new memory controller work am3 motherboards
Computer architecture
adjust flag adjust flag cpu flag flags register x86-compatible cpus preceding 8080-family also called auxiliary flag auxiliary carry flag ac flag bit located position 4 cpu flag register indicates arithmetic carry borrow generated four least significant bits lower nibble primarily used support binary-coded decimal bcd arithmetic auxiliary flag set 1 add operation carry low nibble lowest four bits high nibble upper four bits borrow high nibble low nibble low-order 8-bit portion subtraction otherwise carry borrow occurs flag cleared reset set 0
Computer architecture
peripheral pin controller peripheral pin controller ppc feature intel strong arm processor family enable disable i/o ports also allows user make uses pins normally dedicated peripherals peripheral disabled pins available general purpose use set predetermined alternate uses serial ports 1 4
Computer architecture
automotive security automotive security refers branch computer security focused cyber risks related automotive context increasingly high number ecus vehicles alongside implementation multiple different means communication towards vehicle remote wireless manner led necessity branch cybersecurity dedicated threats associated vehicles confused automotive safety implementation multiple ecus electronic control units inside vehicles began early '70s thanks development integrated circuits microprocessors made economically feasible produce ecus large scale since number ecus increased 100 per vehicle units nowadays control almost everything vehicle simple tasks activating wipers safety-related ones like brake-by-wire abs anti-lock braking system autonomous driving also strongly reliant implementation new complex ecus adas alongside sensors lidars radars control units inside vehicle ecus connected cabled wireless communication networks bus controller area network bus media oriented system transport flexray rf radio frequency many implementations tpmss tire pressure monitoring systems important notice many ecus require data received networks arrive various sensors operate use data modify behavior vehicle e.g. cruise control modifies vehicle speed depending signals arriving button usually located steering wheel since development cheap wireless communication technologies bluetooth lte wi-fi rfid similar automotive producers oems designed ecus implement technologies goal improving experience driver passengers safety-related systems onstar general motors telematic units communication smartphones vehicle speakers bluetooth android auto apple carplay rkes remote keyless entry systems examples vehicle become externally connected devices cases internet furthermore since 2016 development implementation marketed vehicles v2x technologies long- short-range communication interfaces vehicle become considerably bigger although implementation new technologies devices improved safety driving experience vehicle increasingly high number externally-communicating units inside vehicle led increment dimension attack surfaces vehicle electronic control units nowadays capability modifying behavior vehicle necessary ensure attacker capabilities take control critical systems inside vehicle due last ten fifteen years new concept automotive security started become important designing new vehicles threat models automotive world based real-world theoretically possible attacks real-world attacks aim safety people around car modifying cyber-physical capabilities vehicle e.g. steering braking accelerating without requiring actions driver theoretical attacks supposed focus also privacy-related goals obtaining gps data vehicle capturing microphone signals similar regarding attack surfaces vehicle usually divided long-range short-range local attack surfaces lte dsrc considered long-range ones bluetooth wi-fi usually considered short-range although still wireless finally usb obd-ii attack surfaces require physical access car defined local attacker able implement attack long-range surface considered stronger dangerous one requires physical access vehicle 2015 possibility attacks vehicles already market proven possible miller valasek managed disrupt driving jeep cherokee remotely connecting remote wireless communication common network used vehicles one mainly used safety-related communication due real-time properties simplicity cheapness reason majority real-world attacks implemented ecus connected type network majority attacks demonstrated either actual vehicles testbeds fall one following categories sniffing computer security field generally refers possibility intercepting logging packets generally data network case since bus network every node listens communication network useful attacker read data learn behavior nodes network implementing actual attack usually final goal attacker simply sniff data since packets passing type network usually valuable read dos information security usually described attack objective making machine network unavailable dos attacks ecus connected buses done network abusing arbitration protocol used always win arbitration targeting single ecu abusing error handling protocol second case attacker flags messages victim faulty convince victim broken therefore shut network spoofing attacks comprise cases attacker falsifying data sends messages pretending another node network automotive security usually spoofing attacks divided masquerade replay attacks replay attacks defined attacker pretends victim sends sniffed data victim sent previous moment masquerade contrary spoofing attacks data payload created attacker increasing complexity devices networks automotive context requires application security measures limit capabilities potential attacker since early 2000 many different countermeasures proposed cases applied following list common security measures
Computer security
castle video game castle computer game released ascii corporation 1986 fm-7 x1 computers later ported msx nec branded personal computers got single console port sg-1000 game set within castle containing 100 rooms contain one puzzles object game navigate castle rescue princess player push certain objects throughout game accomplish progress rooms prince advance next room aligning cement blocks honey jars candle cakes elevator controlling block additionally player progress blocked many doors requiring key color unlock key removed player inventory upon use prince must standing platform next door able unlock simply jump fall press door player navigate castle help map obtained early game map provide player matrix 10x10 rooms highlight room princess located rooms visited player must also avoid touching enemies like knights bishops wizards fire spirits attack cats phantom flowers followed castlequest also known castle excellent japan games notable early examples metroidvania genre
Computer architecture
sintran iii sintran iii real-time multitasking multi-user operating system used norsk data computers 1974 unlike predecessors sintran ii entirely written norsk data sintran iii written nord pl intermediate language norsk data computers sintran primarily command line based operating system though several shells could installed control user environment strictly far popular user-environment one clever features able abbreviate commands filenames hyphens example list-files typed would ask several prompts including print paging etc. could override using following li-fi n would abbreviate list-files command prompt bypass prompts one could also refer files way say ped h-w would refer hello-world symb file h number characters hyphen w number characters file ending saved quite lot keystrokes would allow users nice learning curve complete self-explanatory commands like list-all-files l-a-f advanced user hyphen key norwegian keyboards resides slash key u.s ones sintran mostly disappeared operating system references however job control batch language available called jec believed known job execution controller could used set batch jobs compile cobol programs etc
Operating systems
list applications arm cores list applications arm cores lists products using various arm microprocessor cores sorted generation release name
Computer architecture
countersign legal countersigning means writing second signature onto document example contract official document signed representative company may countersigned supervisor verify authority representative also money order financial instrument may signed upon receipt signed person presented payment indication bearer person originally received item thief stolen item could carried place presented example countersignature needed uk passport applications constitutional monarchies parliamentary republics order head state monarch president valid unless countersigned another authorised relevant person head government responsible minister case promulgation parliamentary resolution presiding officer legislature
Computer security
fips 140-3 federal information processing standard fips publication 140-3 announced update u.s. government computer security standard used accredit cryptographic modules title standard security requirements cryptographic modules fips 140-2 remains currently approved version efforts update fips 140-2 date back early 2000s fips 140-3 2013 draft scheduled signature secretary commerce august 2013 however never happened draft subsequently abandoned 2014 nist released substantially different draft fips 140-3 version effectively directing use international organization standardization/international electrotechnical commission iso/iec standard 19790:2012 replacement fips 140-2 2014 draft fips 140-3 also abandoned august 12 2015 nist formally released statement federal register asking comments potential use portions iso/iec 19790:2014 update fips 140-2 reference 2014-version iso/iec 19790 inadvertent error federal registry posting 2012 recent version update process fips 140 hamstrung deep technical issues topics hardware security apparent disagreement us government path forward abandoned 2013 draft fips 140-3 required mitigation non-invasive attacks validating higher security levels introduced concept public security parameter allowed deference certain self-tests specific conditions met strengthened requirements user authentication integrity testing remains unclear whether issues addressed ultimately approved release fips 140-3 national institute standards technology nist issued fips 140 publication series coordinate requirements standards cryptography modules include hardware software components federal agencies departments validate module use covered existing fips 140-2 certificate specifies exact module name hardware software firmware and/or applet version numbers cryptographic modules produced private sector open source communities use u.s. government regulated industries financial health-care institutions collect store transfer share disseminate sensitive unclassified sbu information commercial cryptographic module also commonly referred hardware security module fips 140-2 establishes cryptographic module validation program cmvp joint effort nist communications security establishment csec canadian government security programs overseen nist csec focus working government industry establish secure systems networks developing managing promoting security assessment tools techniques services supporting programs testing evaluation validation addresses areas development maintenance security metrics security evaluation criteria evaluation methodologies tests test methods security-specific criteria laboratory accreditation guidance use evaluated tested products research address assurance methods system-wide security assessment methodologies security protocol validation activities appropriate coordination assessment-related activities voluntary industry standards bodies assessment regimes march 22 2019 united states secretary commerce wilbur ross approved fips 140-3 security requirements cryptographic modules succeed fips 140-2 according announcement fips 140-3 become effective september 22 2019 validated cryptographic module validation program cmvp fips 140-3 testing begin september 22 2020 fips 140-3 testing begins fips 140-2 testing continue least year making two standards coexist time
Computer security
ms-dos ms-dos acronym microsoft disk operating system operating system x86-based personal computers mostly developed microsoft collectively ms-dos rebranding ibm pc dos operating systems attempting compatible ms-dos sometimes referred dos also generic acronym disk operating system ms-dos main operating system ibm pc compatible personal computers 1980s early 1990s gradually superseded operating systems offering graphical user interface gui various generations graphical microsoft windows operating system ibm licensed re-released august 12 1981 pc dos 1.0 use pcs although ms-dos pc dos initially developed parallel microsoft ibm two products diverged twelve years 1993 recognizable differences compatibility syntax capabilities lifetime several competing products released x86 platform ms-dos went eight versions development ceased 2000 initially ms-dos targeted intel 8086 processors running computer hardware using floppy disks store access operating system application software user data well progressive version releases delivered support mass storage media ever greater sizes formats along added feature support newer processors rapidly evolving computer architectures ultimately key product microsoft growth programming language company diverse software development firm providing company essential revenue marketing resources also underlying basic operating system early versions windows ran gui flexible operating system consumes negligible installation space ms-dos renamed form 86-dos owned seattle computer products written tim paterson development 86-dos took six weeks basically clone digital research cp/m 8080/z80 processors ported run 8086 processors two notable differences compared cp/m improved disk sector buffering logic introduction fat12 instead cp/m filesystem first version shipped august 1980 microsoft needed operating system ibm personal computer hired tim paterson may 1981 bought 86-dos 1.10 75,000 july year microsoft kept version number renamed ms-dos also licensed ms-dos 1.10/1.14 ibm august 1981 offered pc dos 1.0 one three operating systems ibm 5150 ibm pc within year microsoft licensed ms-dos 70 companies designed os could run 8086-family computer computer would distinct hardware version ms-dos similar situation existed cp/m ms-dos emulating solution cp/m adapt different hardware platforms end ms-dos designed modular structure internal device drivers minimally primary disk drives console integrated kernel loaded boot loader installable device drivers devices loaded integrated boot time oem would use development kit provided microsoft build version ms-dos basic i/o drivers standard microsoft kernel would typically supply disk end users along hardware thus many different versions ms-dos different hardware major distinction ibm-compatible isa machine ms-dos compatible machine machines like tandy 2000 ms-dos compatible ibm-compatible could run software written exclusively ms-dos without dependence peripheral hardware ibm pc architecture design would worked well compatibility application programs used ms-dos services perform device i/o indeed design philosophy embodied windows nt see hardware abstraction layer however ms-dos early days greater speed attainable programs direct control hardware particular importance especially games often pushed limits contemporary hardware soon ibm-compatible architecture became goal long 8086-family computers closely emulated ibm hardware single version ms-dos fixed hardware platform needed market version version ms-dos discussed dozens oem versions ms-dos relevant systems designed case similar function capability standard version ibm pc—often same-numbered version always since oems used proprietary version numbering schemes e.g labeling later releases ms-dos 1.x 2.0 vice versa —with notable exceptions microsoft omitted multi-user support ms-dos microsoft unix-based operating system xenix fully multi-user company planned time improve ms-dos would almost indistinguishable single-user xenix xedos would also run motorola 68000 zilog z8000 lsi-11 would upwardly compatible xenix byte 1983 described multi-user ms-dos future microsoft advertised ms-dos xenix together listing shared features single-user os multi-user multi-tasking unix-derived operating system promising easy porting breakup bell system however computer systems started selling unix system v. believing could compete unix market microsoft abandoned xenix 1987 transferred ownership xenix santa cruz operation sco march 25 2014 microsoft made code scp ms-dos 1.25 mixture altos ms-dos 2.11 televideo pc dos 2.11 available public microsoft research license agreement makes code source-available open source defined open source initiative free software foundation standards microsoft would later re-license code mit license september 28 2018 making versions free software april fool day joke 2015 microsoft mobile launched windows phone application called ms-dos mobile presented new mobile operating system worked similar ms-dos microsoft licensed released versions ms-dos different names like lifeboat associates software bus 86 a.k.a sb-dos compaq-dos ncr-dos z-dos eventually enforced ms-dos name versions ibm one originally called ibm personal computer dos later shortened ibm pc dos competitors released compatible dos systems dr dos pts-dos could also run dos applications former eastern bloc ms-dos derivatives named dcp 3.20 3.30 existed late 1980s produced east german electronics manufacturer veb robotron following versions ms-dos released public microsoft dos released oem channel digital research released dr dos 5.0 retail upgrade pc dos 5.00.1 ibm-microsoft agreement started end ibm entered retail dos market ibm dos 5.00.1 5.02 6.00 pc dos 6.1 6.3 7 2000 7.1 localized versions ms-dos existed different markets western issues ms-dos evolved around set tools drivers localized message languages differing sets supported codepages keyboard layouts language versions considerably different western issues adapted run localized pc hardware additional bios services available western pcs support multiple hardware codepages displays printers support dbcs alternative input methods graphics output affected issues include japanese dos/v korean arabic ados 3.3/5.0 hebrew hdos 3.3/5.0 russian rdos 4.01/5.0 well eastern european versions dos microcomputers based intel 8086 8088 processors including ibm pc clones initial competition pc dos/ms-dos line came digital research whose cp/m operating system inspired ms-dos fact remains controversy whether qdos less plagiarised early versions cp/m code digital research released cp/m-86 months ms-dos offered alternative ms-dos microsoft licensing requirements higher price executable programs cp/m-86 ms-dos interchangeable many applications sold ms-dos cp/m-86 versions ms-dos became preponderant later digital research operating systems could run ms-dos cp/m-86 software ms-dos originally supported simple .com modelled similar binary incompatible format known cp/m-80 cp/m-86 instead supported relocatable format using file extension .cmd avoid name conflicts cp/m-80 ms-dos .com files ms-dos version 1.0 added advanced relocatable .exe executable file format machines early days ms-dos differing system architectures certain degree incompatibility subsequently vendor lock-in users began using ms-dos machines compelled continue using version customized hardware face trying get proprietary hardware software work new system business world 808x-based machines ms-dos tied faced competition unix operating system ran many different hardware architectures microsoft sold version unix pc called xenix emerging world home users variety computers based various processors serious competition ibm pc apple ii early apple macintosh commodore 64 others use 808x processor many 808x machines different architectures used custom versions ms-dos first machines competition time ibm pc hardware configuration became dominant 808x market software written communicate directly pc hardware without using standard operating system calls ran much faster true pc-compatibles non-pc-compatible 808x machines small market fast software written alone market remained open ibm pcs machines closely imitated architecture running either single version ms-dos compatible pcs equivalent ibm pc dos clones cost much less ibm-branded machines similar performance became widely used home users ibm pcs large share business computer market microsoft ibm together began intended follow-on ms-dos/pc dos called os/2 os/2 released 1987 microsoft began advertising campaign announcing dos dead stating version 4 last full release os/2 designed efficient multi-tasking standard operating systems since 1963 offered number advanced features designed together similar look feel seen legitimate heir kludgy dos platform ms-dos grown spurts many significant features taken duplicated microsoft products operating systems ms-dos also grew incorporating direct licensing feature duplicating functionality tools utilities developed independent companies norton utilities pc tools microsoft anti-virus qemm expanded memory manager stacker disk compression others period digital research competing operating system market computers like amstrad pc1512 sold floppy disks two operating systems one could used time ms-dos cp/m-86 derivative digital research produced dos plus compatible ms-dos 2.11 supported cp/m-86 programs additional features including multi-tasking could read write disks cp/m ms-dos format os/2 protracted development digital research released ms-dos compatible dr dos 5.0 included features available third-party add-ons ms-dos unwilling lose portion market microsoft responded announcing pending release ms-dos 5.0 may 1990 effectively killed dr dos sales actual release ms-dos 5.0 june 1991 digital research brought dr dos 6.0 sold well pre-announcement ms-dos 6.0 stifled sales dr dos microsoft accused carefully orchestrating leaks future versions ms-dos attempt create industry called fud fear uncertainty doubt regarding dr dos example october 1990 shortly release dr dos 5.0 long eventual june 1991 release ms-dos 5.0 stories feature enhancements ms-dos started appear infoworld pc week brad silverberg vice president systems software microsoft general manager windows ms-dos business unit wrote forceful letter pc week november 5 1990 denying microsoft engaged fud tactics serve customers better decided forthcoming version 5.0 denying microsoft copied features dr dos feature enhancements ms-dos version 5.0 decided development begun long heard dr dos 5.0 similar features 50 million ms-dos users n't surprising dri heard requests customers – schulman et al 1994 pact microsoft ibm promote os/2 began fall apart 1990 windows 3.0 became marketplace success much microsoft contributions os/2 also went creating third gui replacement dos windows nt ibm already developing next version os/2 carried development platform without microsoft sold alternative dos windows response digital research dr dos 6.0 bundled superstor disk compression microsoft opened negotiations stac electronics vendor popular dos disk compression tool stacker due diligence process stac engineers shown microsoft part stacker source code stac unwilling meet microsoft terms licensing stacker withdrew negotiations microsoft chose license vertisoft doubledisk using core doublespace disk compression ms-dos 6.0 6.20 released 1993 including microsoft doublespace disk compression utility program stac successfully sued microsoft patent infringement regarding compression algorithm used doublespace resulted 1994 release ms-dos 6.21 disk compression removed shortly afterwards came version 6.22 new version disk compression system drivespace different compression algorithm avoid infringing code prior 1995 microsoft licensed ms-dos windows computer manufacturers three types agreement per-processor fee system company sold per-system fee system particular model per-copy fee copy ms-dos installed largest manufacturers used per-processor arrangement lowest fee arrangement made expensive large manufacturers migrate operating system dr dos 1991 u.s. government federal trade commission began investigating microsoft licensing procedures resulting 1994 settlement agreement limiting microsoft per-copy licensing digital research gain settlement years later successor interest caldera sued microsoft damages caldera v. microsoft lawsuit believed settlement ran order 150 million revealed november 2009 release settlement agreement 280 million microsoft also used variety tactics ms-dos several applications development tools operating perfectly running genuine ms-dos pc dos would break run another vendor implementation dos notable examples practice included introduction windows 3.0 1990 easy usability graphical user interface severely diminished usage ms-dos based command line release windows 95 continuing windows 9x product line windows integrated version ms-dos used bootstrapping troubleshooting backwards-compatibility old dos software particularly games longer released standalone product windows 95 dos called ms-dos 7 booted separately without windows gui capability retained windows 98 second edition windows removed capability boot underlying ms-dos 8.0 alone hard disk retained ability make dos boot floppy disk called emergency boot disk hacked restore full access underlying dos contrast windows 9x series windows nt-derived 32-bit operating systems developed alongside 9x series windows nt 2000 xp newer contain ms-dos part operating system nt built subsystem running dos entirely different independent operating system provide subset dos emulation run dos applications provide dos-like command prompt windows 64-bit versions windows nt line provide dos emulation run dos applications natively windows xp contains copy windows boot disk stripped bootstrap accessible formatting floppy ms-dos startup disk files like driver cd-rom support deleted windows bootdisk startup files autoexec.bat config.sys longer content modified disk base creating ms-dos image windows xp deleted files recovered undelete tool booting ms-dos startup disk made windows xp format tool version reports windows millenium ms-dos 8.0 used base windows 98 never released stand alone product windows vista files startup disk dated april 18 2005 otherwise unchanged including string ms-dos version 8 copyright 1981–1999 microsoft corp inside codice_1 starting windows 10 ability create dos startup disk removed either virtual machine running ms-dos older version virtual machine dual boot must used format floppy disk image must obtained external source solutions include using dos compatible alternatives freedos even copying required files boot sector ms-dos 6.22 last standalone version produced microsoft intel 8088 intel 8086 intel 80286 processors remain available download via msdn volume license oem license partner websites customers valid login credentials ms-dos still used embedded x86 systems due simple architecture minimal memory processor requirements though current products switched still-maintained open-source alternative freedos 2018 microsoft released source code ms-dos 1.25 2.0 github purpose according microsoft mainly education experimentation historic operating systems new programmers gain understanding low-level software works historic current due historical nature software microsoft accept pull requests code pull requests modified translated documentation accepted users however allowed fully encouraged fork repository containing ms-dos source code make modifications whatever like versions ms-dos obtained operation modification abandonware sites winworldpc versions microsoft windows ms-dos-like command-line interface cli called command prompt could run many dos variously win32 os/2 1.x posix command line utilities command-line session allowing piping commands user interface icon windows 2000 followed native ms-dos interface 16-bit versions windows 3.11 ran graphical user interface gui top ms-dos windows 95 98 98 se ms-dos part superficially integrated treating operating systems complete package though dos component could actually stand alone command line accessed dos command line usually codice_1 windows module winoldap.mod new line windows windows nt boot kernel whose sole purpose load windows one run win32 applications loader system manner os/2 unix consumer windows launch character-mode sessions command session permits running various supported command line utilities win32 ms-dos os/2 1.x posix emulators ms-dos os/2 posix use host window way win16 applications use win32 explorer using host window allows one pipe output emulations ms-dos emulation done ntvdm nt virtual dos machine modified softpc former product similar virtualpc running modified ms-dos 5 ntio.sys ntdos.sys output handled console dlls program prompt codice_3 codice_4 codice_5 see output 64-bit windows either dos emulation dos commands come 32-bit windows dos version returns 5.00 5.50 depending api function used determine utilities ms-dos 5.00 run emulation without modification early beta programs nt show ms-dos 30.00 programs running ms-dos 30.00 would assume os/2 control os/2 emulation handled os2ss.exe os2.exe doscalls.dll os2.exe version os/2 shell cmd.exe passes commands os2ss.exe input-output windows nt shell windows 2000 last version nt support os/2 emulation os/2 1.30 posix emulated posix shell emulated shell commands handled directly cmd.exe command prompt often called ms-dos prompt part official name windows 9x early versions windows nt nt 3.5 earlier part softpc emulation dos redirects output actually codice_1 16-bit commands run ntvdm codice_7 codice_8 initialisation determined codice_9 optionally permitting use win32 console applications internal commands codice_10 directive win32 console applications use codice_3 command prompt shell confusion exist os/2 separate dos os/2 prompts running dos program os/2 launch separate dos window run application versions windows itanium longer sold microsoft x86-64 architectures longer include ntvdm therefore longer natively run ms-dos 16-bit windows applications alternatives form virtual machine emulators microsoft virtual pc well vmware dosbox others 1983 onwards various companies worked graphical user interfaces guis capable running pc hardware however required duplicated effort provide much consistency interface design even products company later 1985 microsoft windows 1.0 released microsoft first attempt providing consistent user interface applications early versions windows ran top ms-dos first windows met little success also true companies efforts well example gem version 3.0 windows gained market acceptance windows 9x used dos boot process launch protected mode basic features related file system long file names available dos running subsystem windows windows nt runs independently dos includes ntvdm component simulating dos environment legacy applications ms-dos compatible systems include microsoft manufactured ibm pc dos ibm ms-dos identical products eventually diverged starting ms-dos version 6.0 digital research follow microsoft version numbering scheme example ms-dos 4 released july 1988 followed dr dos 5.0 may 1990 ms-dos 5.0 came april 1991 dr dos 6.0 released following june products collectively referred dos even though disk operating system generic term used systems unrelated x86 ibm pc ms-dos also generic reference dos ibm pc compatible computers microsoft control windows platform programming practices intentionally made windows appear ran poorly competing versions dos crippled ability dos makers continue compete ms-dos digital research release interim releases circumvent windows limitations inserted artificially designed specifically provide microsoft competitive advantage
Operating systems
microsoft media server microsoft media server mms microsoft proprietary network-streaming protocol serves transfer unicast data windows media services previously called netshow services mms transported via udp tcp mms default port udp/tcp 1755 microsoft deprecated mms favor rtsp tcp/udp port 554 2003 release windows media services 9 series continued support mms time interest backward compatibility support protocol finally dropped windows media services 2008 several years developers sdp multimedia download-tool reverse engineered mms protocol published unofficial documentation however microsoft finally released protocol specification february 2008
Internet protocols
claria corporation claria corporation formerly gator corporation software company based redwood city california invented “ behavioral marketing ” highly effective controversial new form online advertising founded 1998 denis coleman co-founder symantec stanford mba sasha zorovic engineer mark pennell based work zorovic done stanford march 1999 jeff mcfadden hired ceo zorovic effectively forced name later used interchangeably gain advertising network claimed serviced 50 million users claria exited adware business end second quarter 2006 eventually shut completely october 2008 gator also known gain adserver products collected personal information unknowing users including websites visited portions credit card numbers target display ads computers web surfers billed leader online behavioral marketing company changed name claria corporation october 30 2003 effort better communicate expanding breadth offerings provide consumers advertisers according ceo president jeff mcfadden originally released 1999 gator frequently installed together programs offered free charge go zilla kazaa development programs partially funded revenue advertising displayed gator mid-2003 gator installed estimated 35 million pcs even though gator installed uninstall available via add/remove programs control panel microsoft windows many spyware removal tools also detect remove gator end user license agreement attempts disallow manual removal prohibiting unauthorized means uninstallation gator software undercut fundamental ad-supported nature many internet publishers replacing banner ads web sites thereby depriving content provider revenue necessary continue providing content june 2002 number large publishers including new york post new york times dow jones company sued gator software practice replacing ads lawsuits settled court february 2003 gator attempted combat spyware labels litigation september 2003 company threatened sites pc pitstop libel lawsuits part settlement signed sept. 30 2003 pc pitstop -- scans computers hostile otherwise undesirable code -- removed pages spyware information center titles gator spyware gator boycott list february 2004 gator made confidential settlement litigation brought seven top newspaper publishers including washington post new york post new york times dow jones washington post l.l bean extended stay america suits similarly settled gator corporation released suite free internet applications performed various tasks however installing applications user would continually shown ads gain network even programs running foreground suite included using software user shown advertisements according computer associates spyware information center applications suite classified adware spyware display ads unrelated product primary user interface visible programs employ user internet connection report behavior information back claria although user explicit consent always required install applications claria took advantage fact users choose bothering educate installing cases install process users must choose whether install free version serves lots ads described pay 30 version serves ads since announcement shut ad network claria stopped accepting payment ad free versions despite unpopular reputation claria corporation received backing major venture capital firms including greylock technology crossover ventures u.s. venture partners andy bechtolsheim early investor filed 150 million ipo april 2004 stating income 35 million revenues 90 million 2003 investors concerned practices might illegal least utah time another concern revenue came one partner yahoo overture claria withdrew filing august 2004 july 2005 microsoft corporation came fire revealed anti-spyware product would longer quarantine claria software spyware though still offered users option remove software microsoft reportedly contemplating purchase claria many consumers felt conflict interest spyware-reporting agencies computer associates panda software truprevent technologies still label claria products adware spyware march 2006 claria claimed would exiting adware business focusing personalized search technology july 1 2006 claria ceased displaying pop-up ads around time new company nebuad formed former claria employees another approach targeted advertisements april 21 2008 claria sold gator.com domain october 2008 rebranded jelly cloud company quietly shut today claria former senior management team occupy variety leadership roles throughout online marketing industry scott vandevelde claria last ceo former chief revenue officer chief revenue officer dotomi online advertising firm specializing personalized media scott eagle claria former chief operating officer chief marketing officer joined eharmony online dating company chief marketing officer former ceo jeff mcfadden vp business development zen marketing former vp business development mitchell weisman part leadership team lifestreet corporation largest ad network facebook tony martin claria former vp engineering ran engineering operations project playlist claria former vp engineering analytics dominic bennett claria senior director finance dennis jang part leadership team turn leading online advertising dsp vp engineering vp finance respectively co-founder former claria cto mark pennell senior software engineer apple 2016 claria core engineering team works apple
Computer security
explicit multi-threading random-access machine ram abstract machine model used computer science study algorithms complexity standard serial computing pram computational model abstract parallel machine model introduced similarly study parallel algorithms complexity parallel computing yet built researchers developed large body knowledge parallel algorithms pram model parallel algorithms also known simple standards approaches parallel algorithms large body parallel algorithms knowledge pram model relative simplicity motivated building computers whose programming guided parallel algorithms since productivity parallel programmers long considered crucial success parallel computer simplicity algorithms important multi-core computers built around two processor cores integrated single integrated circuit die widely used across many application domains including general-purpose computing explicit multi-threading xmt computing paradigm building programming multi-core computers tens hundreds thousands processor cores experimental work published 2011 2012 demonstrates significantly greater speedups advanced pram algorithms xmt prototypes problems state-of-the-art multi-core computers work published 2018 shows lock-step parallel programming using ice achieve performance fastest hand-tuned multi-threaded code xmt systems inductive lock-step approach stands contrast multi-threaded programming approaches many core systems known challenging programmers xmt paradigm introduced uzi vishkin explicit multi-threading xmt computing paradigm integrates several levels abstraction work-time wt sometimes called work-depth framework introduced provides simple way conceptualizing describing parallel algorithms wt framework parallel algorithm first described terms parallel rounds round operations performed characterized several issues suppressed example number operations round need clear processors need mentioned information may help assignment processors jobs need accounted second suppressed information provided inclusion suppressed information fact guided proof scheduling theorem due wt framework useful since greatly simplify initial description parallel algorithm inserting details suppressed initial description often difficult example wt framework adopted basic presentation framework parallel algorithms books pram model well class notes explains simple connection wt framework rudimentary ice abstraction noted xmt paradigm programmed using xmtc parallel multi-threaded programming language small extension programming language c. xmt paradigm include programmer ’ workflow starts casting algorithm wt framework proceeds programming xmtc xmt multi-core computer systems provides run-time load-balancing multi-threaded programs incorporating several patents one generalizes program counter concept central von neumann architecture multi-core hardware january 2007 64-processor computer named paraleap demonstrates overall concept completed xmt concept presented xmt 64-processor computer since making parallel programming easy one biggest challenges facing computer science today demonstration also sought include teaching basics pram algorithms xmtc programming students ranging high-school graduate school experimental work reported maximum flow problem two papers graph connectivity connectivity graph theory graph biconnectivity biconnected graph graph triconnectivity triconnected component problems demonstrated advanced algorithms parallel algorithmic literature xmt paradigm offer 8 times 100 times greater speedups problems state-of-the-art multi-core computers reported speedup obtained comparing clock cycles xmt prototype relative fastest serial algorithm running fastest serial machines xmt prototyping culminated establishing lock-step parallel programming using ice achieve performance fastest hand-tuned multi-threaded code xmt systems 2018 result sharpens contrast xmt programming multi-threaded programming approaches employed nearly many-core systems whose race conditions demands tend challenge sometimes even fail programmers
Distributed computing architecture
birthday attack birthday attack type cryptographic attack exploits mathematics behind birthday problem probability theory attack used abuse communication two parties attack depends higher likelihood collisions found random attack attempts fixed degree permutations pigeonholes birthday attack possible find collision hash function formula_1 formula_2 classical preimage resistance security general though disputed result quantum computers perform birthday attacks thus breaking collision resistance formula_3 example consider scenario teacher class 30 students n 30 asks everybody birthday simplicity ignore leap years determine whether two students birthday corresponding hash collision described intuitively chance may seem small teacher picked specific day say 16 september chance least one student born specific day formula_4 7.9 however counter-intuitively probability least one student birthday student day around 70 n 30 formula formula_5 given function formula_6 goal attack find two different inputs formula_7 formula_8 pair formula_7 called collision method used find collision simply evaluate function formula_6 different input values may chosen randomly pseudorandomly result found birthday problem method rather efficient specifically function formula_11 yields formula_12 different outputs equal probability formula_12 sufficiently large expect obtain pair different arguments formula_14 formula_15 formula_8 evaluating function formula_17 different arguments average consider following experiment set h values choose n values uniformly random thereby allowing repetitions let p n h probability experiment least one value chosen probability approximated let n p h smallest number values choose probability finding collision least p inverting expression find following approximation assigning 0.5 probability collision arrive let q h expected number values choose finding first collision number approximated example 64-bit hash used approximately 1.8 × 10 different outputs equally probable best case would take 'only approximately 5 billion attempts 5.38 × 10 generate collision using brute force value called birthday bound n -bit codes could computed 2 examples follows easy see outputs function distributed unevenly collision could found even faster notion 'balance hash function quantifies resistance function birthday attacks exploiting uneven key distribution however determining balance hash function typically require possible inputs calculated thus infeasible popular hash functions md sha families subexpression formula_22 equation formula_23 computed accurately small formula_24 directly translated common programming languages codice_1 due loss significance codice_2 available c99 example equivalent expression codice_3 used instead done first column table computed zero several items second column even one correct significant digit python function accurately generate table math import log1p sqrt def birthday probability_exponent bits code saved file named codice_4 run interactively following example good rule thumb used mental calculation relation also written works well probabilities less equal 0.5 approximation scheme especially easy use working exponents instance suppose building 32-bit hashes formula_28 want chance collision one million formula_29 many documents could close correct answer 93 digital signatures susceptible birthday attack message formula_31 typically signed first computing formula_32 formula_6 cryptographic hash function using secret key sign formula_32 suppose mallory wants trick bob signing fraudulent contract mallory prepares fair contract formula_31 fraudulent one formula_36 finds number positions formula_31 changed without changing meaning inserting commas empty lines one versus two spaces sentence replacing synonyms etc combining changes create huge number variations formula_31 fair contracts similar manner mallory also creates huge number variations fraudulent contract formula_36 applies hash function variations finds version fair contract version fraudulent contract hash value formula_40 presents fair version bob signing bob signed mallory takes signature attaches fraudulent contract signature proves bob signed fraudulent contract probabilities differ slightly original birthday problem mallory gains nothing finding two fair two fraudulent contracts hash mallory strategy generate pairs one fair one fraudulent contract birthday problem equations apply formula_41 number pairs number hashes mallory actually generates formula_42 avoid attack output length hash function used signature scheme chosen large enough birthday attack becomes computationally infeasible i.e twice many bits needed prevent ordinary brute-force attack besides using larger bit length signer bob protect making random inoffensive changes document signing keeping copy contract signed possession least demonstrate court signature matches contract fraudulent one pollard rho algorithm logarithms example algorithm using birthday attack computation discrete logarithms
Computer security
call gate intel call gate mechanism intel x86 architecture changing privilege level process executes predefined function call using call far instruction call gates intended allow less privileged code call code higher privilege level type mechanism essential modern operating systems employ memory protection since allows user applications use kernel functions system calls way controlled operating system call gates use special selector value reference descriptor accessed via global descriptor table local descriptor table contains information needed call across privilege boundaries similar mechanism used interrupts assuming call gate set already operating system kernel code simply call far necessary segment selector offset field ignored processor perform number checks make sure entry valid code operating sufficient privilege use gate assuming checks pass new cs/eip loaded segment descriptor continuation information pushed onto stack new privilege level old ss old esp old cs old eip order parameters may also copied old stack new stack needed number parameters copy located call gate descriptor kernel may return user space program using ret far instruction pops continuation information stack returns outer privilege level os/2 early user call gates transfer application code running ring 3 privileged code running ring 2 kernel code ring 0 windows 95 executes drivers process switching ring 0 applications including api dll kernel32.dll krnl386.exe executed ring 3 driver vwin32.vxd provides key operating system primitives ring 0 allows calling driver functions 16-bit applications msdos win16 address obtained calling int 2fh 1684h ax register identify vxd entry point requested bx register set 16-bit vxd id upon return int instruction es.di registers contain far pointer called transfer control vxd running ring 0 descriptor pointed es actually call gate 32-bit applications however need access windows 95 driver code call undocumented vxdcall function kernel32.dll essentially calls int 30h changes ring mode modern x86 operating systems transitioning away call far call gates introduction x86 instructions system call sysenter/sysexit intel syscall/sysret amd new faster mechanism introduced control transfers x86 programs architectures support call gates use rare even new instructions software interrupts traps preferred portability even though call gates significantly faster interrupts call gates flexible sysenter/sysexit syscall/sysret instructions since unlike latter two call gates allow changing arbitrary privilege level arbitrary albeit higher equal privilege level fast sys* instructions allow control transfers ring 3 0 vice versa preserve system security global descriptor table must held protected memory otherwise program able create call gate use raise privilege level call gates used software security exploits ways found around protection one example e-mail worm gurong.a written exploit microsoft windows operating system uses \device\physicalmemory install call gate
Computer architecture
charles h. moore charles havice chuck moore ii born 1938 american computer engineer programmer best known inventor forth programming language 1968 employed united states national radio astronomy observatory nrao moore invented initial version forth language help control radio telescopes 1971 co-founded elizabeth rather forth inc. first still one leading purveyors forth solutions 1970s ported forth dozens computer architectures 1980s moore turned attention forth development techniques cpu design developing several stack machine microprocessors gaining several microprocessor-related patents along way designs emphasized high performance low power usage also explored alternate forth architectures cmforth machine forth closely matched chips machine languages 1983 moore founded novix inc. developed nc4000 processor design licensed harris semiconductor marketed rtx2000 radiation hardened stack processor used numerous nasa missions 1985 consulting firm computer cowboys developed sh-boom processor starting 1990 developed vlsi cad system okad overcome limitations existing cad software used tools develop several multi-core minimal instruction set computer misc chips mup21 1990 f21 1993 moore founder itv corp one first companies work internet appliances 1996 designed another custom chip system i21 moore developed colorforth dialect forth language derived scripting language custom vlsi cad system okad 2001 rewrote okad colorforth designed c18 processor 2005 moore co-founded became chief technology officer intellasys develops markets chip designs seaforth-24 multi-core processor 2009 co-founded became cto greenarrays inc marketing ga4 ga144 multi-computer chips
Programming language topics
windows 7 editions windows 7 major release microsoft windows operating system available six different editions starter home basic home premium professional enterprise ultimate home premium professional ultimate widely available retailers editions focus markets software development world enterprise use editions support 32-bit ia-32 cpus editions except starter support 64-bit x64 cpus 64-bit installation media included home-basic edition packages obtained separately microsoft according microsoft features editions windows 7 stored machine regardless edition use users wish upgrade edition windows 7 features could use windows anytime upgrade purchase upgrade unlock features editions microsoft announced windows 7 pricing information editions june 25 2009 windows anytime upgrade family pack pricing july 31 2009 since october 31 2013 windows 7 longer available retail except professional edition preinstalled discontinued october 31 2016 mainstream support editions new features bug fixes ended january 2015 extended support security updates continue january 2020 main editions also take form one following special editions in-place upgrade windows vista service pack 1 windows 7 supported processor architecture language editions match see in-place upgrade supported earlier versions windows moving windows 7 machines requires clean installation i.e removal old operating system installing windows 7 reinstalling previously installed programs windows easy transfer assist process microsoft made upgrade skus windows 7 selected editions windows xp windows vista difference skus full skus windows 7 lower price proof license ownership qualifying previous version windows restrictions in-place upgrading applies skus well addition windows 7 available family pack upgrade edition certain markets upgrade windows 7 home premium gives licenses upgrade three machines vista windows xp windows 7 home premium edition full versions machine upgraded must one qualifying previous versions windows work united states offer expired early december 2009 october 2010 commemorate anniversary windows 7 microsoft made windows 7 home premium family pack available limited time supplies lasted two possible ways upgrade windows 7 earlier version windows table lists upgrade paths allow in-place install note in-place upgrades performed previous version windows architecture upgrading 32-bit installation 64-bit installation downgrading 64-bit installation 32-bit installation clean install mandatory regardless editions used microsoft also supported in-place upgrades lower edition windows 7 higher one using windows anytime upgrade tool currently three retail options available though currently unclear whether used previous installations n versions family pack versions anytime upgrade editions possible use product key standard upgrade edition accomplish in-place upgrade e.g home premium ultimate
Operating systems
apple a9 apple a9 64-bit arm-based system-on-chip soc designed apple inc manufactured apple tsmc samsung first appeared iphone 6s 6s plus introduced september 9 2015 apple stated 70 cpu performance 90 graphics performance compared predecessor apple a8 a9 features apple-designed 64-bit 1.85 ghz armv8-a dual-core cpu called twister a9 iphone 6s 2 gb lpddr4 ram included package a9 per-core l1 cache 64 kb data 64 kb instructions l2 cache 3 mb shared cpu cores 4 mb l3 cache services entire soc acts victim cache a9 includes new image processor feature originally introduced a5 last updated a7 better temporal spatial noise reduction well improved local tone mapping a9 directly integrates embedded m9 motion coprocessor feature originally introduced a7 separate chip addition servicing accelerometer gyroscope compass barometer m9 coprocessor recognize siri voice commands a9 adds hardware decoding heif 8-bit 10-bit hevc a9 features custom storage solution uses apple-designed nvme-based controller communicates pcie connection iphone 6s nand design akin pc-class ssd embedded flash memory common mobile devices gives phone significant storage performance advantage competitors often use emmc ufs connect flash memory a9 microarchitecture similar second generation cyclone used a8 chip microarchitecture microarchitectural features follows half performance boost a8 comes 1.85 ghz frequency quarter comes better memory subsystem 3× bigger caches remaining quarter comes microarchitectural tuning smaller technology node according apple every ios device dedicated aes-256 crypto engine built dma path flash storage main system memory making file encryption highly efficient a9 later a-series processors flash storage subsystem isolated bus granted access memory containing user data via dma crypto engine apple a9 chips fabricated two companies samsung tsmc samsung version called apl0898 manufactured 14 nm finfet process 96 mm large tsmc version called apl1022 manufactured 16 nm finfet process 104.5 mm large intended significant difference performance parts october 2015 alleged iphone 6s models samsung-fabricated a9 chips consistently measured shorter battery life tsmc-fabricated versions cpu heavy usage web browsing graphics different apple responded tests run processors continuous heavy workload battery depletes representative real-world usage said internal testing combined customer data demonstrated variance 2–3 twister cpu core implements armv8-a instruction set architecture licensed arm holdings independent cpu design unrelated much older similarly named cortex-a9 arm9 cpu designed arm implement 32-bit armv7-a armv5e versions architecture processors nearly identical visually packaging dimensions approx 15.0×14.5 mm superficial differences like designation text inside packaging silicon die differs size a9 processor listed minimum requirement arkit
Computer architecture
northeastern university northeastern university nu neu private research university boston massachusetts established 1898 categorized r1 institution doctoral universities highest research activity carnegie classification institutions higher education university offers undergraduate graduate programs main campus fenway-kenmore roxbury south end back bay neighborhoods boston university satellite campuses charlotte north carolina seattle washington san jose california toronto canada exclusively offer graduate degrees northeastern recently purchased new college humanities london plans open additional campus vancouver canada university enrollment approximately 18,000 undergraduate students 8,000 graduate students northeastern features cooperative education program commonly known co-op integrates classroom study professional experience contains 3,100 partners across seven continents program key part northeastern curriculum experiential learning hundred years one largest co-op/internship programs world required students academic disciplines participate co-op program participation nearly universal among undergraduate students helps distinguish university experience universities northeastern currently ranked 1st best schools internships list princeton review consistently ranked top five decade northeastern also comprehensive study abroad program spans 170 universities colleges northeastern large highly residential university students choose live campus upperclassmen option live campus 75 northeastern students receive form financial aid 2019–20 school year university committed 296.2 million grant scholarship assistance university sports teams northeastern huskies compete ncaa division members colonial athletic association caa 18 varsity sports men women hockey teams compete hockey east men women rowing teams compete eastern association rowing colleges earc eastern association women rowing colleges eawrc respectively men track field caa back back years 2015 2016 2013 men basketball first caa regular season championship men soccer caa title first time women ice hockey record 16th beanpot championship northeastern men hockey team 2018 2019 beanpot beating boston university boston college harvard evening institute younger men located huntington avenue ymca held first class october 3 1898 starting would transform northeastern university course four decades school law formally established year assistance advisory committee consisting dean james barr ames harvard university school law dean samuel bennett boston university school law judge james r. dunbar 1903 first automobile engineering school country established followed school commerce finance 1907 day classes began 1909 1916 bill introduced massachusetts legislature incorporate institute northeastern college considerable debate investigation passed march 1916 march 30 1917 frank palmer speare inaugurated new college first president five years later school changed name northeastern university better reflect increasing depth instruction march 1923 university secured general degree-granting power legislature exception a.b. s.b. medical degrees college liberal arts added 1935 two years later northeastern university corporation established board trustees composed 31 university members 8 ymca 1948 northeastern separated completely ymca following world war ii northeastern began admitting women postwar educational boom university created college education 1953 university college called college professional studies 1960 colleges pharmacy nursing 1964 later combined bouvé college health sciences college criminal justice 1967 followed college computer science 1982 since renamed khoury college computer sciences early 1980s one-time night commuter school grown nearly 50,000 enrollees including full- part-time programs undergraduate graduate level 1989–1990 university enrollment reduced 40,000 full part-time evening students 1990 first class live-on-campus commuter students graduated following retirement president kenneth ryder 1989 university adopted slow thoughtful approach change historically accepting 7,500 10,000 students per year based applications 15,000 20,000 acceptance rates 50 75 depending program attrition rates huge 25 freshmen dropout rate graduation rate 50 40 5,672 undergraduate full-time day students enrolled fall 1984 graduating 1989 president john curry left office 1996 university population systematically reduced 25,000 incoming president richard freeland decided focus recruiting type students already graduating school prime demographic early 1990s university cut freshman class size around 4,500 students 2,800 order become selective began 485 million construction program included residence halls academic research facilities athletic centers 1996 2006 average sat scores increased 200 points retention rates rose dramatically applications doubled university transition students experienced reorganization co-operative education system better integrate classroom learning workplace experience full-time degree programs shifted four-quarter system two traditional semesters two summer minimesters allowing students delve deeply academic courses experience longer substantive co-op placements throughout transformation president freeland oft-repeated goal crack top 100 u.s. news world report rankings accomplished 2005 transformation commuting school national research university complete freeland stepped august 15 2006 replaced dr. joseph aoun former dean university southern california aoun implemented decentralized management model giving university deans control budgets faculty hiring decisions fundraising part five-year 75 million academic investment plan ran 2004 2009 university concentrated undergraduate education core graduate professional programs centers research excellence faculty originally bolstered 100 new tenured tenure-track professors later expanded include 300 additional tenure tenure-track faculty interdisciplinary fields aoun also placed emphasis improving community relations reaching leaders neighborhoods surrounding university addition aoun created academic partnerships institutions boston area including tufts hebrew college school museum fine arts time northeastern advanced national rankings placed 42nd 2014–2015 u.s. news world report best colleges guide 7 position jump 2013–2014 27 place gain since 2010–2011 argued northeastern recent rise rankings shows university cracked code academic rankings others suggested figured game system 2018 edition u.s. news world report ranked northeastern 40th annual ranking national universities whether rise northeastern ranking result effort game system would agree institution continual improvements placement u.s. news world report best colleges guide allowed university improve rapidly via significantly larger endowment competitive student body explains able surpass local universities rankings simmons college wentworth institute technology started around time also said northeastern ranking improvements cyclical effect improved rankings gave university access resources turn allowed improve quality university therefore rankings regardless objectively evident quality university skyrocketed within last twenty years result introduction new academic programs far competitive applicants new buildings larger endowment alumni donations new satellite campuses expansion flagship co-op program early 2019 northeastern university acquired new college humanities 210 student london-based college founded 2012 philosopher a. c. grayling deal pending regulatory approval presidents northeastern tenures office campus buildings named honor addition northeastern main boston campus university operates number satellite locations massachusetts including george j. kostas research institute burlington financial district campus hilton hotel near faneuil hall downtown boston dedham campus dedham marine science center nahant kostas research institute homeland security opened 2011 addition laboratory structural testing resilient sustainable systems stress laboratory laboratory equipped test full-scale large-scale structural systems materials failure explore development new strategies designing simulating sensing structural infrastructure systems university also launched number full-service remote graduate campuses north america including charlotte north carolina october 2011 seattle washington january 2013 san jose california march 2015 toronto ontario 2016 additional satellite campuses austin texas minneapolis minnesota planned northeastern 2019 acceptance rate 18 class 2023 northeastern received 62,000 applications 11,160 students accepted 2018 record number applications 62,272 led drop acceptance rate eight percentage points lower previous year additionally northeastern one top ten applied colleges 2018 class 2021 enrolling fall 2017 northeastern received 54,209 applications also previous year time accepted 14,876 27 enrolled 3,108 applicants northeastern steadily increasing 49,822 2014 54,209 applicants 2017 year applied 2016 9,500 international students 1,128 international applicants 2006 enrolled 20 international students power international education 2017 open doors report northeastern ranked fourth-highest institution united states host international students freshmen enrolled middle 50 range sat scores 660–740 critical reading 710–780 math 690–760 writing act composite range 31–34 class enrolling fall 2013 forbes placed northeastern 35th top 100 colleges ranked sat scores enrolled 76 top tenth high school graduating class 94 top quarter high school graduating class freshman international students 76 state comes undergraduate graduate students number international students totals 13,000 representing 147 different nations half student body due fact vast majority graduate students come abroad number international students northeastern steadily increased 1,000 students every year since 2008 2019 edition u.s. news world report rankings northeastern tied 44th national universities category 2018 northeastern tied 40th national universities category ranked 228th global universities category u.s. news world report 2018 2017 northeastern ranked top 30 colleges highest average sat act scores admitted students 22nd act 27th sat northeastern offers undergraduate majors 65 departments graduate level 125 programs northeastern education interdisciplinary entrepreneurial founded 2009 idea northeastern university student-led venture accelerator provides entrepreneurs including students faculty alumni northeastern community necessary support educational experience towards developing business core concept launch academics northeastern grounded liberal arts education integration classroom studies experiential learning opportunities including cooperative education student research service learning global experience including study abroad international co-op university cooperative education program places 5,000 students annually 3,000 co-op employers boston across united states around globe 2014 college prowler gave northeastern a+ rating quality classes professors overall academic environment colleges listed including schools degrees offered northeastern university offers students opportunity join various ethnic cultural political organizations along numerous honor societies special interest groups fraternities sororities detailed list organizations viewed university honors program offers selected students enhanced curriculum students selected regular applicant pool separate application represent applicants highest gpa sat/act scores year starting first year reading project moving participating wide range courses undergraduate years program gives students variety academic choices culminating experience advanced specialty work major field college-specific choices including specialized advanced honors seminars independent research project addition students honors program exclusively live living-learning community housed west villages c f. fall 2009 university began housing first-year honors students lower nine floors newly constructed international village residence hall starting fall 2017 students housed lower floors even newer 17 story east village residence hall 2017 also marked beginning honors discovery course introduction student assessed integrated learning sail app northeastern one largest co-op/internship programs world started 1909 nu co-op program one oldest nation co-op program students alternate periods academic study periods professional employment usually paid related major majors offer four-year graduation option fewer co-op placements five-year program slightly popular students students co-op pay tuition students living campus pay room board co-op program typically begins spring second year fall third year traditional program first semesters campus students usually take anywhere one three 96 participating one 78 participating two co-op placements range small start-up companies large multinational companies including many fortune 500 corporations program also places students government agencies branches government nonprofits non-governmental organizations northeastern students found interning united states congress white house united nations nasa student placements usually last six months time students paid students may live university residence halls campus co-op employment university currently leases housing students co-oping new york city san francisco seattle washington d.c. assists elsewhere northeastern co-op students staying boston usually benefit fact city prominent industries numerous offices/headquarters boston consequential industries financial sector technology sector medicine/life sciences sector tend hire many co-ops fields especially big-name companies comes d'amore-mckim business students many co-ops end working large financial firms state street john hancock financial accounting firms pricewaterhousecoopers pwc deloitte touche well consulting firms boston consulting group tend hire many co-ops every cycle well retail companies like tjx companies staples tend hire several marketing students every cycle students also decide develop co-ops wish something offered usually involves starting new company reaching company northeastern partnership facilitating creation co-op partnership many companies continually pass co-op opportunities northeastern students new partnerships documented northeastern co-op database known nucareers given future northeastern students students decide start companies usually involved idea northeastern venture accelerator sometimes spend entire two three co-ops solely developing companies might also join husky startup challenge also helps develop student-run companies company successful either idea husky startup challenge often move onto masschallenge boston huge global non-profit startup accelerator competition northeastern students take least one class prepares co-op expectations given industry schools like d'amore-mckim students take three different one-credit classes prepare co-op classes students work advisers inside outside class pursue potential co-ops well work strategies make competitive candidates co-op program led university high reputation comes job placement 50 northeastern students receive job offer previous co-op employer 92 either employed enrolled graduate school 9 months graduation also led northeastern consistently rank within top 5 princeton review list best career services/internships within last decade mainly taking top spot list split best career services best internships 2016 northeastern currently ranks 3rd career services 5th internships united states senior capstone advanced-level course related student major course requires student integrate learned academic coursework experiential learning experience co-op research study abroad service university partnered tufts university school medicine create early-acceptance ba/md program program since discontinued northeastern campus blocks longwood medical academic area harvard medical school harvard school dental medicine located along associated teaching hospitals northeastern semester-long study abroad programs placements africa asia australia europe south america participating schools include university cambridge london school economics england university edinburgh scotland reims management school france european school business germany university cape town south africa university auckland new zealand swinburne university technology australia obirin university japan american college thessaloniki greece pontificia universidad católica de chile chile also antarctica northeastern international business program member international partnership business schools program international business students opportunity awarded dual-degree northeastern well sister school abroad since arrival president aoun 2006 school also emphasizing co-op abroad effort make school global internationally engaged many programs offered including social entrepreneurship peru kenya south africa northeastern also notable dialogues civilizations program features dozens one-month-long programs usually taking place summer faculty member teach group students foreign country related curriculum specific class sort mini study abroad program area focus – example geneva program focuses small arms multilateral negotiations south africa program based non-governmental organizations program meant communicative experience exchange ideas cultures open majors years popular study abroad option northeastern program used northeastern students gain extra credits minor concentration also used students trying graduate 4 years also participating one co-ops program sometimes take place multiple locations entrepreneurship global consulting israel dialogue starts boston eventually students go tel-aviv beer sheva israel dialogues span multiple countries one taught marrakesh morocco amsterdam concluding paris addition dialogues civilizations program northeastern also offers program called n.u.in primarily first-year students choose start first semester studying abroad program accepts students university spend first semester studying foreign university partnered northeastern students take classes english credits transfer northeastern arrive campus spring program began 2007 creation n.u.in australia option students go abroad fall semester coming home campus boston students year go n.u.in fall spring semester however majority complete program complete fall freshman year 2008 greece england added options n.u.in since early 2010s program started accepting students university selecting students admit n.u.in program idea behind bring students diverse experiences back boston campus presenting students motivated travel opportunity immediately study abroad also used introduce students professors communities across globe northeastern students could help university global presence northeastern goals global expansion outlined northeastern 2025 campaign stating northeastern 2025 build university network campuses around world create intercultural hubs lifelong experiential learning expanded study-abroad programs international co-op opportunities international dialogues coursework embedded employer partners 2012 500 students enrolled n.u.in program time offered destinations london dublin thessaloniki greece sydney san josé costa rica 2017 number grew 1,100 students program expanded shanghai rome berlin montreal melbourne removed san josé n.u.in destination students n.u.in program study top college campuses around world like mcgill university n.u.in canada students university sydney n.u.in australia students locations including n.u.in australia n.u.in england n.u.in ireland northeastern partnered two universities give students options would like study 2019 n.u.in locations include australia canada england greece ireland italy research centers institutes northeastern include university provides undergraduate students opportunity engage research center experiential education censsis research experience undergraduates honors research louis stokes alliance minority participation program provost office research grants fy 2007 annual external research funding exceeded 78 million fy 2009–2010 research funding close 82 million 2002 northeastern center subsurface sensing imaging systems designated nsf engineering research center 2004 northeastern one six institutions selected national science foundation center research nanotechnology 2010 northeastern granted 12 million alum homeland security research facility named george j. kostas research institute homeland security chief benefactor northeastern 1,257 full-time faculty 94.4 possess doctorate terminal degree field 403 part-time faculty fall 2015 northeastern faculty members direct 35 research education centers including national science foundation nsf engineering research center nsf nanomanufacturing center two nsf integrated graduate education research traineeship programs northeastern university accredited new england association schools colleges neasc empower campaign launched may 2013 goal raise 1 billion 2017 500 million philanthropic support 500 million industry government partnerships goal raised 1.25 billion 2015 campaign inspired richard d'amore alan mckim 60 million donation university business school 2012 money raised student support co-ops study abroad student research student ventures financial aid faculty advancement/expansion innovation education development co-op program research october 2017 northeastern revealed final total empower campaign 1.4 billion 100,000 individuals 3,800 organizations donated empower donors came 110 different nations across globe university able surpass goal twice surpassed goal set 2015 150 million northeastern 19 varsity teams ncaa 30 club sports teams 200 student organizations several prominent student-run organizations including resident student association rsa student government association sga northeastern university television nutv fraternity sorority life fsl council university programs cup organize activities northeastern students well surrounding community fourteen eighteen northeastern varsity sports teams competing ncaa division colonial athletic association since 2005 school sponsors following sports teams nu mascot paws school colors red black white trim fight song hail northeastern composed charles a. pethybridge class 1932 notable athletes played northeastern sports teams dan ross played football northeastern long setting super bowl record receptions game reggie lewis still holds men basketball career scoring record jose barea played point guard huskies averaged 21 points 4.4 rebounds 8.4 assists per game senior barea drafted dallas mavericks 2006 carlos peña named major league baseball american league comeback player year 2007 al gold glove winner 2008 u.s. olympic women ice hockey teams included northeastern alumni shelley looney chanda gunn baseball team competed one college world series played ncaa regionals seven times first year caa men basketball team finished 6th place 12 teams advanced semifinals conference tournament caa proved competitive conference 2006 ncaa basketball tournament george mason university advanced way final four 2007 second year caa women track team captured conference championship volleyball team finished second women basketball team 10 games 2008 previous year biggest one-year turnaround caa advanced tournament quarterfinals northeastern men women hockey teams compete hockey east conference 2007–2008 season men team ranked high 7 country held top spot conference finishing season sixth place hockey east teams also participate annual beanpot tournament four major boston-area colleges northeastern men team annual event 4 times 54-year history women team captured beanpot 14 times 2008–2009 season men team ranked high 3rd nation held top spot hockey east last weekend season team made ncaa tournament first time since 1994 beanpot championship game first time since 2004 goalie brad thiessen made hobey hat trick second northeastern player northeastern 2018 beanpot championship defeating boston college 3-0 first match defeating boston university 5-2 final match victory came northeastern attained highest placement 2017-2018 standings beanpot competitors beanpot also presents two awards individual players one valuable player one best goalie determined best save percentage second award named eberly award glen dan eberly goalies northeastern boston university addition winning beanpot title northeastern took home awards award valuable player presented adam gaudette eberly award presented cayden primeau save percentage .974 making goalie second highest save percentage win award 44 years award given northeastern crew team consistently ranks one top 10 teams nation 2008 national championship team made grand finals placed fourth behind university wisconsin–madison university washington university california berkeley beating brown university princeton university university pennsylvania harvard university northeastern offers 40 club sports including sailing judo rugby lacrosse alpine skiing squash cycling ultimate frisbee 2005 women rugby team finished third nation division ii year men rugby team largest annual tournament united states recently women rugby team competed placed 11th collegiate rugby championship men lacrosse team began 2008 season ranked top 10 nationally men women squash team finished 2008 season ranked top 20 nationally 2008–2009 academic year northeastern club field hockey women basketball teams respective national championships 2007 2009 northeastern club baseball team three straight new england club baseball association championships may 25 2010 club baseball team defeated penn state win national club baseball association division ii world series national championship citing sparse attendance numerous losing seasons expense renovate parsons field acceptable standard university board trustees voted november 20 2009 end football program according president joseph aoun leadership requires make choices decision allows us focus existing athletic programs northeastern located boston fenway roxbury back bay neighborhoods adjacent huntington avenue near museum fine arts symphony hall area also known fenway cultural district although located heart boston nu campus still filled trees flowers grassy quads since late 1990s northeastern considered model design urban universities twice beautiful new renovated exterior space award presented american institute architects 2001 2004 site first baseball world series commemorated front university churchill hall statue cy young recent sustainable endowments institute college sustainability report card issued northeastern grade a- environmental sustainability efforts programs additionally princeton review rated northeastern one top 15 green colleges nation 2010 2011 greenmetric world university ranking evaluated northeastern second greenest university world first us accordance boston zoning code amendment 2007 international village residence hall certified leed gold building 2010 dockser hall first building campus achieve leed certification also gold completion renovation 2010 northeastern university police department nupd full-service law enforcement agency full powers arrest university property property used northeastern students faculty campus adjacent boston police department headquarters 2008 reader digest survey ranked nu second safest school united states johns hopkins university maryland northeastern bracketed mbta orange line green line e branch six stations serve campus massachusetts avenue ruggles orange line symphony northeastern museum fine arts longwood medical area green line green line paralleled 39 bus ruggles also serves needham providence/stoughton franklin lines mbta commuter rail system northeastern campus mostly located along huntington avenue area known fenway cultural district part boston fenway back bay neighborhoods notable institutions district include museum fine arts isabella stewart gardner museum symphony hall huntington theatre company new england conservatory boston conservatory berklee college music christian science center mary baker eddy library harvard school public health northeastern campus something urban oddity despite location central boston northeastern home significant amount green open space quads site master planning competition awarded contract revive rejuvenate campus process started 1988 creation new northeastern quad mt ryder small oval land centrally located campus main entrance refurbished donations graduating class 1989 concrete square outside library student center transformed brick pavers granite curbstones scalloped design would eliminate square corners concept developed outgoing class 1989 northeastern news poll suggestion president ryder assoc dean students harvey vetstein presented board trustees march 1988 corners campaign kicked fundraiser ell student center parents weekend october 1988 later selection nationally recognized green space landscape architect 1990 started renewal plan continues today since late 1990s northeastern twice beautiful new renovated exterior space award presented american institute architects 2001 2004 2008 west village building f recognized american institute architects new england 2008 merit awards design excellence 2004 northeastern awarded prestigious gold medal massachusetts horticultural society dedham campus residential halls northeastern vary quite significantly buildings like kennedy hall 153 hemenway street former boston apartment buildings bought northeastern turned residential halls international village east village tall high-rise buildings built specifically purpose housing northeastern students residential halls host little 50 students many 1,000 traditional dorms include one room single double triple quad depending many students reside suites usually contain bathroom shared common area multiple rooms residential buildings traditional housing following list divides ones contain traditional ones suite-style housing traditional accommodations suite-style accommodations students usually divided groups called living learning communities llcs place student certain majors interests hobbies together llcs host events related specific area interest members llc participate llcs span sections floors residential hall entire floors multiple floors entire buildings found present multiple buildings list llcs offered freshman first year college affiliated llc options first year interdisciplinary llc options first year thematic based llc options east village northeastern newest dorm building honors freshmen upperclassmen building located 291 st. botolph street opened january 2015 honors freshman live suite-style rooms whereas upperclassmen choose full apartments kitchen facilities total five classrooms found building four basement one first floor event space provided 17th floor west village complex includes eight buildings serving mainly residence halls classrooms plans building k 22-story high rise housing 600 beds completed rented university able buy opened 1910 widely known boston arena matthews arena world oldest surviving indoor ice hockey arena located east edge northeastern university campus home northeastern huskies men women hockey teams men basketball team well wentworth institute technology men hockey team arena named former chair board trustees george j. matthews wife late hope m. matthews arena original home nhl boston bruins wha new england whalers nhl carolina hurricanes also secondary home nba boston celtics 1940s hosted part america east conference men basketball tournament total seven times hosted 1960 frozen four arena also served original home annual beanpot tournament boston four major college hockey programs named roger marino co-founder emc corporation marino center features first floor atrium two cafés tatte b.good food market wollaston second floor includes student exercise area multipurpose room used aerobics classes martial arts clubs gymnasium consists three basketball courts third floor state-of-the-art resistance training area fully equipped free weight room three-lane suspended track available either walking jogging rowing ergometers available centennial common created mark 100th anniversary university 1998 also serves gateway west campus area large grass oval spans hundred feet contains lawnchairs students relax well flagpole displays u.s. flag area frequently used students recreational purposes organizations/clubs booths nu libraries include snell library john d. o'bryant african-american institute library nu school law library separately administered nu school law snell library opened 1990 cost 35 million contains 1.3 million volumes digital media design studio within library collaborative interdisciplinary learning environment creating course-related multimedia presentations projects portfolios library home favat collection current collection children literature k-12 curriculum resources instructional materials related information support courses offered school education contains three computer labs operated nu information services two available nu students faculty staff teaching lab june 2016 library staff adopted open-access policy make members professional research publicly accessible online nu libraries received federal depository designation 1962 selective depository libraries receive forty-five percent federal publication series available depository libraries snell library also home northeastern university archives special collections department includes benjamin laguer papers collection special collections focus records boston-area community-based organizations concerned social justice issues snell library also open 24 hours day allowing students study given time within urban environment characterizes campus whole nu carved quiet peaceful space centrally located ell building spiritual life center sacred space nondenominational sacred space center main assembly hall configured carpets mats chairs distinctive ceiling consisting 3 hanging domes made overlapping aluminum tiles origami-like effect warm wood floors accents glass-paneled walls lean outward slightly shape material giving sense openness volume space faucets ablution available flanking antechamber center also contains smaller meeting space library sacred space opened 1998 architects office da nader tehrani monica ponce de leon received 2002 harleston parker medal boston society architects design northeastern university southernmost section campus located along columbus avenue roxbury parallel orange line university expanded south roxbury time building west village 2001 davenport commons opened providing 585 students housing two residence halls 75 families representing range incomes able purchase condo townhouse boston market value davenport commons also created commercial space tremont street summer 2006 northeastern university proposed new residence hall away main campus corner tremont street ruggles street construction began late february 2007 spring 2009 complex named international village opened later summer nicknames include iv inv consists three interconnected residence halls office complex administration building gym 400-seat dining hall available members northeastern community well public following buildings make south campus residential buildings administrative buildings athletic buildings february 21 2014 northeastern university groundbreaking ceremony new interdisciplinary science engineering complex isec columbus avenue completed 2017 building provides research educational space students faculty college science bouvé college health sciences college engineering khoury college computer sciences centerpiece complex includes large atrium spiral staircase 280-seat auditorium dodge hall mainly used northeastern business programs snell library opened 1990 served university main library dodge hall five floors basement houses computer lab connected university large network underground tunnels connects many buildings classrooms lounge area occupy first floor d'amore-mckim school business undergraduate office second floor graduate office third floor school professional accounting office fourth floor directly behind dodge hall ymca northeastern founded ell hall one oldest buildings campus hosts northeastern largest auditorium blackman auditorium blackman hosts many different types events classes theatre groups dance teams musical groups choral groups fraternities sororities orchestral ensembles blackman hosted many talented individuals dr. maya angelou seth meyers like dodge hall ell hall five floors also connects underground tunnel network building also contains classrooms art gallery
Computer architecture
vanguard microkernel vanguard discontinued experimental microkernel developed apple computer research group atg early 1990s based v-system vanguard introduced standardized object identifiers unique message chaining system improved performance vanguard used apple commercial products development ended 1993 ross finlayson project principal investigator left apple vanguard generally similar v-system added support true object oriented programming operating system meant kernel server interfaces exported objects could inherited extended new code change real effect system primarily change source code makes programming easier instance vanguard i/o class supported number different servers networking file servers instance new applications could interact importing i/o interface calling methods also made writing new servers much easier standard program well able share code easily key concept almost microkernels breaking single large kernel set communicating servers instead single large program control entire hardware side computer system sorts duties handed smaller programs given rights control different parts machine instance particular server might given control networking hardware another task managing hard drives another server would handle file system calling lower-level servers user applications ask services sending messages servers using form inter-process communications ipc opposed asking kernel work via syscall trap v ipc system appears conceptually modeled remote procedure calls rpc client application perspective client application imported interface definition file containing information calls supported kernel applications used definition package requests called kernel would immediately take examine results pass information right handler potentially within kernel results handed back kernel client general terms operation system appears client application similar working normal monolithic kernel although results passed back might come third party handler essentially invisible client servers handling requests operated similar fashion clients opening connections kernel pass data however servers generally spawned new threads required handle longer-lasting requests handled responses posted thread could de-allocated servers could go receive mode awaiting requests contrast microkernel systems based model asynchronous communications opposed synchronous procedure calls canonical microkernel system mach modeled messages i/o several important side-effects primary among normal task schedulers unix-like systems normally block client waiting i/o request way actions pausing restarting applications waiting messages already built underlying system downside approach scheduler fairly heavyweight calling serious performance bottleneck led extensive development efforts improve performance v-system model message passing overhead reduced process scheduler consulted question next run – server called downside v approach requires work server side response may take time process one major addition ipc system vanguard opposed v concept message chains allowing single message sent several interacting servers single round-trip theory chaining could improve performance common multi-step operations consider case client application wishes read file normally would require one message kernel find file server three additional messages file server one resolve file name object id another open id finally another read file using vanguard chaining single message could constructed client contained requests message would sent kernel passed file server would handle three requests finally returning data much performance problem normally associated microkernel systems due context switches messages passed back forth applications example running v system would total eight context switches two request client switched kernel vanguard using chain would reduce three switches one client kernel another kernel file server finally server back client cases overhead context switch greater time takes actually run request vanguard chaining mechanism could result real-world performance improvements v also introduced simple distributed name service name service stored well known character names representing various objects distributed v system instance 2nd floor laser printer applications could ask name server objects name would handed back identifier would allow interact object name service separate server managed code kernel contrast full-blown name server spring operating system knew objects inside system also used servers system translate private names – file names ip addresses instance v-system objects servers referred via ad hoc private key sort say 32-bit integer clients would pass keys servers order maintain conversation specific task instance application might ask kernel file system handed 32-bit key representing program id use key send message file system asking open file addresses would result 64-bit key handed back keys example proprietary servers common key format used across system sort name resolving common v authors decided make keys first-class citizens vanguard instead using whatever object id servers happened use vanguard servers expected understand return globally unique 128-bit key first 64-bits containing server identifier second identifying object server server id maintained kernel allowing hand message network server referenced remote machine client invisible clear id handed randomly avoid guessing ill-intentioned software
Computer architecture
comparison database tools following tables compare general technical information number available please see individual product articles information article neither all-inclusive necessarily date systems listed light purple background longer active development legend legend legend
Databases
pack200 pack200 specified jsr 200 deprecated jep 336 compacting archive format developed sun capable reducing jar file sizes factor 7 9 pack200 optimized compressing jar archive files specifically java bytecode portion jar files applications technology included faster java application deployment java web start pack200 usually gzip compression applied http compression content specified content-encoding type pack200-gzip stored file extension .pack.gz used pack200 may also referred pack200 compression tools pack200 unpack200 provided sun java development kit since java 5 well pack200 compressed files
Programming language topics
apache flink apache flink open-source stream-processing framework developed apache software foundation core apache flink distributed streaming data-flow engine written java scala flink executes arbitrary dataflow programs data-parallel pipelined manner flink pipelined runtime system enables execution bulk/batch stream processing programs furthermore flink runtime supports execution iterative algorithms natively flink provides high-throughput low-latency streaming engine well support event-time processing state management flink applications fault-tolerant event machine failure support exactly-once semantics programs written java scala python sql automatically compiled optimized dataflow programs executed cluster cloud environment flink provide data-storage system provides data-source sink connectors systems amazon kinesis apache kafka alluxio hdfs apache cassandra elasticsearch apache flink developed apache license 2.0 apache flink community within apache software foundation project driven 25 committers 340 contributors data artisans company founded original creators apache flink 12 apache flink committers currently employed data artisans apache flink dataflow programming model provides event-at-a-time processing finite infinite datasets basic level flink programs consist streams transformations “ conceptually stream potentially never-ending flow data records transformation operation takes one streams input produces one output streams result. ” apache flink includes two core apis datastream api bounded unbounded streams data dataset api bounded data sets flink also offers table api sql-like expression language relational stream batch processing easily embedded flink datastream dataset apis highest-level language supported flink sql semantically similar table api represents programs sql query expressions upon execution flink programs mapped streaming dataflows every flink dataflow starts one sources data input e.g. message queue file system ends one sinks data output e.g. message queue file system database arbitrary number transformations performed stream streams arranged directed acyclic dataflow graph allowing application branch merge dataflows flink offers ready-built source sink connectors alluxio apache kafka amazon kinesis hdfs apache cassandra flink programs run distributed system within cluster deployed standalone mode well yarn mesos docker-based setups along resource management frameworks apache flink includes lightweight fault tolerance mechanism based distributed checkpoints checkpoint automatic asynchronous snapshot state application position source stream case failure flink program checkpointing enabled upon recovery resume processing last completed checkpoint ensuring flink maintains exactly-once state semantics within application checkpointing mechanism exposes hooks application code include external systems checkpointing mechanism well like opening committing transactions database system flink also includes mechanism called savepoints manually-triggered checkpoints user generate savepoint stop running flink program resume program application state position stream savepoints enable updates flink program flink cluster without losing application state flink 1.2 savepoints also allow restart application different parallelism—allowing users adapt changing workloads flink datastream api enables transformations e.g filters aggregations window functions bounded unbounded streams data datastream api includes 20 different types transformations available java scala simple example stateful stream processing program application emits word count continuous input stream groups data 5-second windows import org.apache.flink.streaming.api.scala._ import org.apache.flink.streaming.api.windowing.time.time case class wordcount word string count int object windowwordcount apache beam “ provides advanced unified programming model allowing developer implement batch streaming data processing jobs run execution engine. ” apache flink-on-beam runner feature-rich according capability matrix maintained beam community data artisans conjunction apache flink community worked closely beam community develop flink runner flink dataset api enables transformations e.g. filters mapping joining grouping bounded datasets dataset api includes 20 different types transformations api available java scala experimental python api flink dataset api conceptually similar datastream api flink table api sql-like expression language relational stream batch processing embedded flink java scala dataset datastream apis table api sql interface operate relational table abstraction tables created external data sources existing datastreams datasets table api supports relational operators selection aggregation joins tables tables also queried regular sql table api sql offer equivalent functionality mixed program table converted back dataset datastream logical plan defined relational operators sql queries optimized using apache calcite transformed dataset datastream program flink forward annual conference apache flink first edition flink forward took place 2015 berlin two-day conference 250 attendees 16 countries sessions organized two tracks 30 technical presentations flink developers one additional track hands-on flink training 2016 350 participants joined conference 40 speakers presented technical talks 3 parallel tracks third day attendees invited participate hands-on training sessions 2017 event expands san francisco well conference day dedicated technical talks flink used enterprise flink system internals ecosystem integrations flink future platform features keynotes talks flink users industry academia hands-on training sessions apache flink speakers following organizations presented flink forward conferences alibaba amadeus bouygues telecom capital one cloudera data artisans emc ericsson hortonworks huawei ibm google mapr mongodb netflix new relic otto group red hat researchgate uber zalando 2010 research project stratosphere information management cloud funded german research foundation dfg started collaboration technical university berlin humboldt-universität zu berlin hasso-plattner-institut potsdam flink started fork stratosphere distributed execution engine became apache incubator project march 2014 december 2014 flink accepted apache top-level project release dates apache incubator release dates pre-apache stratosphere release dates
Computer architecture
logic file system logic file system research file system replaces pathnames expressions propositional logic allows file metadata queried superset boolean syntax commonly used modern search engines actual name logic information systems file system abbreviated lisfs avoid confusion log-structured file system lfs implementation logic file system available lisfs website intended used unix-like operating systems bit difficult install needs several non-standard ocaml modules
Computer file systems
ddos mitigation ddos mitigation set techniques tools resisting mitigating impact distributed denial-of-service ddos attacks networks attached internet protecting target relay networks ddos attacks constant threat businesses organizations threatening service performance shut website entirely even short time first things ddos mitigation identify normal conditions network traffic defining “ traffic patterns ” necessary threat detection alerting ddos mitigation also requires identifying incoming traffic separate human traffic human-like bots hijacked web browsers process done comparing signatures examining different attributes traffic including ip addresses cookie variations http headers javascript footprints detection made next process filtering filtering done anti-ddos technology like connection tracking ip reputation lists deep packet inspection blacklisting/whitelisting rate limiting one technique pass network traffic addressed potential target network high-capacity networks traffic scrubbing filters manual ddos mitigation longer recommended due ddos attackers able circumvent ddos mitigation software activated manually ways prevent ddos attacks implemented on-premise or/and via cloud-based solution providers on-premise mitigation technology commonly hardware device placed front ” network disadvantage filtering capacity limited capacity filtering device middle option hybrid solution combining on-premise filtering cloud-base filtering best practices ddos mitigation include anti-ddos technology anti-ddos emergency response services ddos mitigation also available cloud-based providers ddos attacks executed websites networks selected victims number vendors offering ddos resistant hosting services mostly based techniques similar content delivery networks distribution avoids single point congestion prevents ddos attack concentrating single target one technique ddos attacks use misconfigured third-party networks allow amplification spoofed udp packets proper configuration network equipment enabling ingress filtering egress filtering documented bcp 38 rfc 6959 prevents amplification spoofing thus reducing number relay networks available attackers
Computer security
apple a9x apple a9x 64-bit arm-based system chip soc designed apple inc first appeared ipad pro announced september 9 2015 released november 11 2015 a9x m9 motion coprocessor embedded new innovation seen previous chip generations variant a9 apple claims 1.8 times cpu performance 2 times gpu performance predecessor a8x a9x features apple-designed 64-bit armv8-a dual-core cpu called twister offers double memory bandwidth double storage performance apple a8x unlike a9 a9x contain l3 cache due significant dram bandwidth a9x paired 4 gb lpddr4 memory 12.9 ipad pro 2 gb lpddr4 memory 9.7 ipad pro total bandwidth 51.2 gb/s high bandwidth necessary feed soc 12-core powervr 7 series gpu ram included a9x package unlike sibling a9 a9x uses nand interface a9 uses apple-designed nvme-based controller communicates pcie connection ipad pro nand design akin pc-class ssd embedded flash memory common mobile devices gives ipad pro significant storage performance advantage competitors often use msata emmc connect storage systems
Computer architecture
database publishing database publishing area automated media production specialized techniques used generate paginated documents source data residing traditional databases common examples mail order catalogues direct marketing report generation price lists telephone directories database content form text pictures also contain metadata related formatting special rules may apply document generation process database publishing incorporated larger workflows component documents created approved revised released basic idea using database contents like article price information fill pre-formatted template documents templates typically created normal desktop layout application certain boxes text designated placeholders placeholders targeted new content flows database allows quick generation final output case changes database quickly perform updates limited manual intervention another model database publishing found many web-to-print sites users browse templates online catalog business cards brochures personalize selected template filling form view rendered result case initial source data user input captured database user revisits site later resume editing left form pre-filled database-stored variables user entered main layout applications workflow datalogics pager adobe framemaker indesign quarkxpress xyvision arbortext advanced print publisher formerly 3b2 generally layout applications corresponding server version receives commands via web interfaces rather desktop interaction quarkxpress server adobe indesign server take full advantage design features available respective desktop versions applications make broad spectrum features available extension integration vertical products developed either internally form scripting e.g javascript applescript indesign externally api corresponding developer kits variants database publishing rendering content direct pdf output approach prevents manual intervention final output since pdf comfortably editable may perceived limitation situations like report generation manual editability needed desired
Databases
business continuity planning business continuity planning business continuity resiliency planning process creating systems prevention recovery deal potential threats company addition prevention goal enable ongoing operations execution disaster recovery organization resistance failure ability ... withstand changes environment still function often called resilience capability enables organizations either endure environmental changes without permanently adapt organization forced adapt new way working better suits new environmental conditions event could negatively impact operations included plan supply chain interruption loss damage critical infrastructure major machinery computing /network resource bcp subset risk management us government entities refer process continuity operations planning coop business continuity plan outlines range disaster scenarios steps business take particular scenario return regular trade bcp written ahead time also include precautions put place usually created input key staff well stakeholders bcp set contingencies minimize potential harm businesses adverse scenarios 2005 analysis disruptions adversely affect operations corporations investments resilience give competitive advantage entities prepared various contingencies extended then-common business continuity planning practices business organizations council competitiveness embraced resilience goal adapting change apparently slower evolutionary manner sometimes many years decades described resilient term strategic resilience used go beyond resisting one-time crisis rather continuously anticipating adjusting case change becomes desperately obvious approach sometimes summarized preparedness protection response recovery business continuity intended outcome proper execution business continuity planning disaster recovery payoff cost-effective buying spare machines servers performing backups bringing off-site assigning responsibility performing drills educating employees vigilant major cost planning preparation audit compliance management documents automation tools available reduce time cost associated manually producing information several business continuity standards published various standards bodies assist checklisting ongoing tasks planners must information analysis phase consists quantifying loss ratios must also include dollars defend lawsuit estimated dollar spent loss prevention prevent seven dollars disaster-related economic loss business impact analysis bia differentiates critical urgent non-critical non-urgent organization functions/activities function may considered critical dictated law function two values assigned maximum time constraints long enterprise key products services unavailable undeliverable stakeholders perceive unacceptable consequences named according iso 22301 terms maximum acceptable outage maximum tolerable period disruption mean thing defined using exactly words defining recovery requirements potential threat may require unique recovery steps common threats include areas cascade responders stumble supplies may become depleted 2002-2003 sars outbreak organizations compartmentalized rotated teams match incubation period disease also banned in-person contact business non-business hours increased resiliency threat impact scenarios identified documented reflect widest possible damage share seven tiers disaster recovery released 1992 updated 2012 ibm eight tier model two main requirements impact analysis stage phase overlaps disaster recovery planning solution phase determines british standards institution bsi released series standards itil defined terms within uk bs 25999-2:2007 bs 25999-1:2006 used business continuity management across organizations industries sectors documents give practical plan deal eventualities—from extreme weather conditions terrorism system failure staff sickness 2004 following crises preceding years uk government passed civil contingencies act 2004 businesses must continuity planning measures survive continue thrive whilst working towards keeping incident minimal possible act separated two parts united kingdom australia incorporated resilience continuity planning united kingdom resilience implemented locally local resilience forum new zealand canterbury university resilient organisations programme developed assessment tool benchmarking resilience organisations covers 11 categories 5 7 questions resilience ratio summarizes evaluation implementation phase involves policy changes material acquisitions staffing testing 2008 book exercising excellence published british standards institution identified three types exercises employed testing business continuity plans start stop times pre-agreed actual duration might unknown events allowed run course biannual annual maintenance cycle maintenance bcp manual broken three periodic activities issues found testing phase often must reintroduced analysis phase bcp manual must evolve organization maintain information know specialized technical resources must maintained checks include software work process changes must documented validated including verification documented work process recovery tasks supporting disaster recovery infrastructure allow staff recover within predetermined recovery time objective
Computer security
xtalk xtalk loosely defined family scripting languages mother xtalk languages hypertalk language used apple hypercard environment languages characterized simple english-like syntaxes using real-life metaphors top smalltalk-style image message sending apparatus pascal-style block boundaries less rigid structure xtalk languages share common set basic data structures commands well general object model thus allow relative portability among programming languages bear surface similarities hypertalk inspired however object models differ substantially porting code another xtalk requires complete rewrite xtalk languages share following basic constructs xtalk smalltalk-like messaging send message write command function call like pascal message parameters require declarations resolved runtime correct handler handler looks like behaves pretty much like pascal equivalent except parameter list variadic fewer parameters passed handler declares first line remaining variables filled empty strings passed quietly ignored instead declaring parameters list handler name also accessed using functions also gives access ignored parameters xtalk scripts often attached objects hypertalk supertalk mediatalk livecode though always e.g compileit sensetalk script contain handler particular message uses message passed owning object script handle scripts also manually pass message parent using command xtalks support following basic commands main assignment statement xtalks also support prefixing/suffixing values also support 'get value command equivalent put statement container named 'it like pascal handler passes data back message sender also valid command handlers return value stored built-in variable change property object range text text contents given value used modify instance variables objects well apply text styles text fields object specified global property host application assumed xtalks support conditional statements following form line break following statement token omitted single command may follow statement may omitted allows writing entire if-then-else statement single line chaining conditionals if-then-else-if-then-else chains also entire block may omitted token may wrapped onto next line loop statements quite free-form many dialects add additional loop syntax things like looping chunks xtalks support usual mathematic expressions apart usual operators also support integer division exponent remainder integer division codice_1 equality unequality codice_2 codice_3 number comparison/string sort order substring matching point coordinates lie inside rectangle coordinates boolean negation logical booleans logical booleans string concatenation string concatenation space type detection determine file/object existence variables xtalks need declared rather transparently created value first put variable name used nothing yet put treated unquoted string literal evaluates name thus mimicking behavior line-by-line interpreter variables xtalks variants conceptually strings interpreted internally data type current operation performed however may following types string integer number point rect date logical aka boolean equal string representations case rects points comma-separated lists numbers h v resp left top right bottom logicals true false perfectly valid perform string operations numbers immediately mathematical operations global variables need declared using special keyword often xtalks word used instead import current handler scope xtalks support chunk expressions mid-level operations extract modify substring ranges variable expressions value container usually form supported chunk types usually char acter item word line though dialects add support bytes chunk units xtalks support changing delimiter use items default comma using property reset later point though supertalk resets comma end handler hypertalk resets idle time i.e system events also mathematical commands like etc xtalks based hypercard 1.2-level architecture since hypercard 1.2 support multiple windows menus movies web browsers many xtalks implement aspects differently e.g supertalk implements multiple windows replacing 'stack level object hierarchy 'project script container representing file 'window effectively stack used may several one project file whereas hypercard 2.0 livecode kept 'stack level instead provided new different commands allow requesting second stack opened window instead replacing current stack onscreen hypersense kept similar approach renamed 'card 'page popup buttons menus fully native persistent objects project file image scripts supertalk referenced 'item copy menu edit like hypertalk transient objects added global menu bar shared stacks using 'create menu command referenced 'menuitem copy menu edit single-line 'menumessage send picked similarly types styles objects placed card differ greatly xtalks divergence point hypercard 1.2.x buttons fields supercard let background fields content different cards requiring use draw text graphics labels instead hypercard hypercard 2.x compound term 'part subsume buttons fields etc card also supported xtalks although hypercard never provided feature xtalks today implement 'user properties feature first introduced supercard allows adding custom instance variables existing objects host application used like built-in properties hold data type example using user property also codice_4 command remove properties object
Programming language topics
2012 linkedin hack social networking website linkedin hacked june 5 2012 passwords nearly 6.5 million user accounts stolen russian cybercriminals owners hacked accounts longer able access accounts website repeatedly encouraged users change passwords incident vicente silveira director linkedin confirmed behalf company website hacked official blog also said holders compromised accounts would find passwords longer valid website stolen passwords hashed i.e checksum stored allowing testing whether given password correct one cracked posted russian password forum later day morning june 6 passwords thousands accounts available online plain text graham cluley internet security firm sophos warned leaked passwords could possession criminals 6 june linkedin said official statement would email members security instructions instructions could reset passwords may 2016 linkedin discovered additional 100 million email addresses hashed passwords claimed additional data 2012 breach response linkedin invalidated passwords users changed passwords since 2012 rep. mary bono mack united states congress commented incident many times going happen congress finally wakes takes action latest incident brings sharp focus need pass data protection legislation senator patrick leahy said reports another major data breach give pause american consumers ever share sensitive personal information online transactions networking ... congress make comprehensive data privacy cybercrime legislation top priority marcus carey security researcher rapid7 said hackers penetrated databases linkedin preceding days expressed concerns may access website even attack michael aronowitz vice president saveology said everyday hundreds sites hacked personal information obtained stealing login information one account easily used access accounts hold personal financial information security experts indicated stolen passwords encrypted way fairly easy decrypt one reasons data breach katie szpyrka long time user linkedin illinois united states filed 5 million lawsuit linkedin complaining company keep promises secure connections databases erin ’ harra spokeswoman working linkedin asked lawsuit said lawyers looking take advantage situation propose bills sopa pipa united states congress amended complaint filed nov. 26 2012 behalf szpyrka another premium linkedin user virginia united states named khalilah gilmore–wright class representatives linkedin users affected breach lawsuit sought injunctive equitable relief well restitution damages plaintiffs members class linkedin apologized immediately data breach asked users immediately change passwords federal bureau investigation assisted linkedin corporation investigating theft 8 june 2012 investigation still early stages company said unable determine whether hackers also able steal email addresses associated compromised user accounts well linkedin said users whose passwords compromised would unable access linkedin accounts using old passwords internet security experts said passwords easy unscramble linkedin failure use salt hashing considered insecure practice allows attackers quickly reverse scrambling process using existing standard rainbow tables pre-made lists matching scrambled unscrambled passwords another issue sparked controversy ios app provided linkedin grabs personal names emails notes mobile calendar without user approval security experts working skycure security said application collects user personal data sends linkedin server linkedin claimed permission feature user-granted information sent securely using secure sockets layer ssl protocol company added never stored shared information third party october 5 2016 russian hacker detained czech police prague united states requested interpol warrant united states grand jury indicted nikulin three unnamed co-conspirators charges aggravated identity theft computer intrusion prosecutors alleged nikulin stole linkedin employee username password using gain access corporation network nikulin also accused hacking dropbox formspring allegedly conspiring sell stolen formspring customer data including usernames e-mail addresses passwords nikulin facing czech hearing determine whether extradited united states russian foreign ministry spokesperson maria zakharova indicated russian authorities trying block extradition nikulin currently held santa rita jail nikulin scheduled undergo psychological evaluation determine whether mentally competent
Computer security
fakesysdef trojan win32/fakesysdef originally dispersed application called hdd defragmenter hence name fakesysdef fake system defragmenter computer trojan type computer virus targeting microsoft windows operating system first documented late 2010 win32/fakesysdef manifests one array programs purport scan one computer hardware failures related system memory hard drives system functionality whole scan computer show false hardware issues present remedy defrag hard drives fine-tune system performance request user make payment order activate program user download new updates repair hardware issues fictitious scanning program detects one widespread varieties risks prevalent internet today everyday numerous fake antivirus security applications published released unsuspecting end-users via large assortment distribution channels many times software turn clones – developed code base packaged unique title design use skin branding strategy may look legitimate computer users names usually combination technical words hdd disk memory action words scanner defragmenter diagnostics repair fix users may encounter kind threat visit websites attempt convince remove non-existent malware security risks computers installing bogus software trojan also installed malware drive-by downloads downloading installing software users may directed sites way following methods programs intentionally misrepresent security status computer continually presenting fake scan dialog boxes alert messages prompt user buy product programs often icon notification area operating system desktop constantly display pop-up messages alerting user fake security issues virus infections pop-up windows disappear user purchased product non-existent threats supposedly removed compromised computer user decides purchase product presented form within application redirected website requests credit card information win32/fakesysdef installer may arrive computer various file names run installer drops injects dll file sometimes exe file common processes example explorer.exe winlogon.exe wininet.exe instances main executable drops dll exe components case exe set run every windows restart dll injected explorer.exe exe component ensure automatically runs every time windows starts drops copy exe component using random file name appdata folder win32/fakesysdef may make widespread changes system including modifying several internet explorer settings enabling submitting non-encrypted form data changing desktop wallpaper displaying hiding shortcuts hiding desktop start menu links disabling windows task manager disabling checking signatures downloaded programs setting low risk file types additionally win32/fakesysdef variants may terminate running processes installation may block launched application computer restarts installation process may terminate running processes force computer restart restart fakesysdef attempts block every launched program may display fake error messages offering fix problem repeatedly restarts computer user agrees buy fake software overwrites data hard drive/hard drive disk/hdd win32/fakesysdef displays numerous false alerts indicating system errors displaying appearance scanning hard disk defragmenting prompts user fix errors button buy activate fix discovered errors fix errors button selected fakesysdef pretends scan defragment hard disk displays fake error messages tells user needs purchase advanced module fix user chooses browser opens open custom web browser user input card information buy software anti-virus software makers responded threat fakesysdef adding checks products simple removal software enabled sometimes enough reverse damage configuration files fakesysdef known edit
Computer security
ti basic ti 99/4a ti basic ansi-compliant basic programming language interpreter built 1981 texas instruments ti-99/4a home computer predecessor ti-99/4 1979 developed microsoft bob wallace bob greenberg version supporting compiled code used commercial development language ti-990 range minicomputers text full screen graphics logic operations recording tape file system supported ti basic texas instruments also produced ti extended basic cartridge enhanced functionality accessible basic users statements ti basic call close data def dim display end for..to..step gosub goto if..then..else input let next on..gosub on..goto open option base print randomize read rem restore return stop every line ti basic contain one statement possibility put several statements line also necessary peek load calls use assembly language routines became available ti extended basic note poke statement ti basic loading executing machine code requires 32k memory expansion ti editor/assembler cartridge gives access call load 256 bytes ram directly accessible cpu mostly consumed basic interpreter ti basic stored ran programs 16k video ram unlike ti extended basic could take advantage 32k memory expansion unlike microsoft basics used left mid right instr manipulating strings ti basic used ansi-compliant seg pos subprograms called call statement e.g call clear user defined subprograms possible ti extended basic subprograms predefined ti basic written interpreted byte-code language known graphics programming language unique ti-99 line ti extended basic improved execution speed somewhat providing functionality assembly language wallace said put lot extra time trying get ti basic funny little things ... basic could bring line edit line ... suppose wanted line somewhere else ca n't edit line numbers n't work way worked lot get work way
Programming language topics
episode filesystem episode posix compliant file system commonly known use dce/dfs file servers designed achieve goals portability scaling make efficient use available system bandwidth used variety methods achieve goals one use metadata logging designed enhance file system performance episode file system basis ibm z/os posix-compatible file system called zfs
Computer file systems
kgdb kgdb debugger linux kernel kernels netbsd freebsd requires two machines connected via serial connection serial connection may either rs-232 interface using null modem cable via udp/ip networking protocol kgdb ethernet kgdboe target machine one debugged runs patched kernel host machine runs gdb gdb remote protocol used two machines kgdb implemented part netbsd kernel 1997 freebsd version 2.2 concept existing remote gdb protocol later adapted patch linux kernel scaled-down version linux patch integrated official linux kernel version 2.6.26 kgdb available following architectures linux x86 x86-64 powerpc arm mips s390 available supported architectures netbsd freebsd using rs-232 connectivity amit kale maintained linux kgdb 2000 2004 2004 2006 maintained linsyssoft technologies jason wessel wind river systems inc. took official maintainer ingo molnar jason wessel created slimmed-down cleaned version kgdb called kgdb light without ethernet support many hacks one merged 2.6.26 kernel version kgdb supports rs-232 connectivity using special driver split debugger inputs console inputs single serial port required program named kgdb also used freebsd gdb based utility debugging kernel core files also used remote live kernel debugging much way linux kgdb either serial connection firewire link
Computer architecture
cyberun cyberun zx spectrum video game ostensibly developed ultimate play game published u.s. gold 1986 although part jetman series similarities jetpac player must construct spaceship parts seek resources power-ups unlike ultimate titles cyberun written partnership tim chris stamper player controls spaceship trapped planet inhabited hostile aliens goal upgrade spaceship parts scattered around planet mine valuable element called cybernite atmosphere ground populated flying aliens clouds drip acid damaging ship shields ship requires fuel fly exhausted bounce along ground planet unable climb similar enemy ship also planet attempting mine cybernite player fuel replenished tankers planet surface damaged shields repaired player must venture caverns surface order mine cybernite done ship upgraded include mining laser sufficient cybernite collected player escape next planet zebarema system game well received critics crash awarding 90 crash smash spectrum giving 8/10 describing game classic pick pieces shoot em brilliant graphics link playing online
Computer architecture
metapost metapost refers programming language interpreter metapost programming language derived donald knuth metafont language interpreter metapost produces vector graphic diagrams geometric/algebraic description language shares metafont declarative syntax manipulating lines curves points geometric transformations however many limitations metapost derive features metafont instance metapost support features postscript notably paths one segment regions simply connected regions filled uniform colours postscript level 1 supports tiled patterns postscript 3 supports gouraud shading metapost distributed many distributions tex metafont framework example included miktex tex live distributions encapsulated postscript produced metapost included latex context tex documents via standard graphics inclusion commands encapsulated postscript output also used pdftex engine thus directly giving pdf ability implemented context latex graphics package used plain tex via supp-pdf.tex macro file context luatex supports inclusion metapost code within input file inclusion metapost code latex also possible using latex-packages example gmp mpgraphics single file samp example.mp /samp processed metapost interpreter via command codice_1 linux produces three eps files samp example.1 /samp samp example.2 /samp samp example.3 /samp pictured right resulting three eps files used tex via latex codice_2 command context codice_3 plain tex codice_4 command plain pdftex codice_5 command samp supp-pdf.tex /samp view print third diagram inclusion necessary tex fonts computer modern included eps files produced metapost default
Programming language topics
cgiproxy cgiproxy name suggests cgi proxy software package cgi common gateway interface proxy appears user web page allows user access different site cases anonymously anonymous cgi proxy type proxy server works encrypted web form embedded another web page hosted securely using ssl secure socket layering also often called web proxy cgiproxy written perl programming language installed web server execute perl program via cgi supports non-parsed header cgi scripts addition installed mod_perl fastcgi script standalone daemon supported protocols include http ftp ssl well related technologies javascript adobe flash cgiproxy development stalled december 25 2008 december 9 2011 later saw six releases 2014 quite extensive changelog including windows support though nature perl language practically requires source code cgiproxy visible install cgiproxy technically open source software due commercial license fee however extensively commented modularized designed start encourage users modify extend purposes author licenses used freely non-commercial use negotiate license terms commercial use
Web technology
ms-net ms-net sometimes stylized ms-net early network operating system sold microsoft earliest days local area networking lans ms-net complete networking system microsoft licensed vendors used basis server programs ran ms-dos porting underlying networking hardware adding services top version 1.0 announced 14 august 1984 released along pc/at 2 april 1985 number ms-net products sold late 1980s replaced lan manager 1990 ms-net network interface based ibm netbios protocol definition allowed ported different networking systems relative ease implement entire netbios protocol however small number features required server role one key feature implemented netbios name management routines feature 3rd parties often added back system also supplied program redir.exe allowed transparent file access dos machines ms-net based server several products mid-to-late-1980s based ms-net system ibm pc-net slightly modified version ms-net system typically used token ring ms partnered 3com produce widely used 3+share system running 3com networking stack based xns protocol ethernet well-known systems including banyan vines novell netware use ms-net basis using unix custom os respectively however allow access files via redir.exe ms-net sold short period time ms 3com collaborated replacement known lan manager running os/2 using new server message block standard file transfer 3com version product retained xns-based protocol 3com abandoned server market long ms version remained based netbios supported number underlying protocols hardware lan manager replaced 1993 windows nt 3.1
Operating systems
douglas crockford douglas crockford american computer programmer entrepreneur best known ongoing involvement development javascript language popularized data format json javascript object notation developing various javascript related tools jslint jsmin currently senior javascript architect paypal also writer speaker javascript json related web technologies crockford earned degree radio television san francisco state university 1975 took classes fortran worked university lab computer crockford purchased atari 8-bit computer 1980 wrote game galahad holy grail atari program exchange apx resulted chris crawford hiring atari inc atari crockford wrote another game burgers apx number experimental audio/visual demos freely distributed warner communications sold company joined national semiconductor 1984 crockford joined lucasfilm later paramount pictures became known video game oriented listservs early 1990s posted memoir expurgation maniac mansion videogaming bulletin board memoir documented efforts censor computer game maniac mansion nintendo satisfaction could release cartridge crockford mounting frustrations nintendo demands became obscure confusing together randy farmer chip morningstar crockford founded electric communities ceo 1994 1995 involved development programming language e. crockford founder state software also known veil networks cto 2001 2002 time state software crockford popularized json data format based upon existing javascript language constructs lightweight alternative xml obtained domain name json.org 2002 put description format july 2006 specified format officially rfc 4627 2002 reference president george bush war evildoers crockford started releasing jsmin software custom license created adding requirement software shall used good evil open source mit license clause carried jsmin-php variation jsmin ryan grove software hosted google code december 2009 due additional clause google determined license compliant definition free open source software permit restriction software may used jsmin-php forced migrate new hosting provider
Programming language topics
microsoft cryptoapi microsoft windows platform specific cryptographic application programming interface also known variously cryptoapi microsoft cryptography api ms-capi simply capi application programming interface included microsoft windows operating systems provides services enable developers secure windows-based applications using cryptography set dynamically linked libraries provides abstraction layer isolates programmers code used encrypt data crypto api first introduced windows nt 4.0 enhanced subsequent versions cryptoapi supports public-key symmetric key cryptography though persistent symmetric keys supported includes functionality encrypting decrypting data authentication using digital certificates also includes cryptographically secure pseudorandom number generator function cryptgenrandom cryptoapi works number csps cryptographic service providers installed machine csps modules actual work encoding decoding data performing cryptographic functions vendors hsms may supply csp works hardware windows vista features update crypto api known cryptography api next generation cng better api factoring allow functions work using wide range cryptographic algorithms includes number newer algorithms part national security agency nsa suite b also flexible featuring support plugging custom cryptographic apis cng runtime however cng key storage providers still support symmetric keys cng works user kernel mode also supports algorithms cryptoapi microsoft provider implements cng housed bcrypt.dll cng also supports elliptic curve cryptography uses shorter keys expected level security efficient rsa cng api integrates smart card subsystem including base smart card cryptographic service provider base csp module encapsulates smart card api smart card manufacturers make devices compatible rather provide from-scratch solution cng also adds support dual_ec_drbg pseudorandom number generator defined nist sp 800-90a could expose user eavesdropping national security agency since contains kleptographic backdoor unless developer remembers generate new base points different cryptographically secure pseudorandom number generator true random number generator publish generated seed order remove nsa backdoor also slow used called explicitly cng also replaces default prng ctr_drbg using aes block cipher earlier rng defined superseded fips 186-2 based either des sha-1 broken ctr_drbg one two algorithms nist sp 800-90 endorsed schneier hash_drbg
Operating systems
yast yast yet another setup tool linux operating system setup configuration tool yast featured opensuse linux distribution well suse derived commercial distributions also part defunct united linux yast features tools configure many aspects system first suse distribution included yast released may 1996 yast re-written 1999 included first suse linux 6.3 installer yast2 added desktop suse linux 6.4 co-existed yast1 yast1 removal suse linux 8.0 yast free software suse made available gpl 2004 tool administering maintaining suse linux installation allows administrators install software configure hardware set networks servers feature yast contains graphical user interface gui text-based user interface tui ncurses front ends especially useful non-gui installations servers system administration slow internet connections one unable boot graphical x server still requires advanced user interface package manager example novice user trying downgrade xorg package fix graphical installation yast offers package management functionality zypp project first zypp enabled package management yast applications performance problems long start times improved 10.2 10.3 releases starting opensuse 11.0 alpha 3 zypp integrated sat solver project making yast zypper faster rpm based package managers yast used include sax sax2 suse advanced x configuration sax re-written sax2 suse linux 6.4 sax1 removed suse linux 8.1 sax2 removed yast control center opensuse 11.2 sax2 removed completely opensuse 11.3 gtk interface removed opensuse leap 42.1 yast often receives updates improvements tumbleweed versions leap opensuse leap 15.1 example saw improvements yast interface managing firewalls including addition interface command line version yast release opensuse leap yast updated logo improved partition management module yast implemented ruby programming language autoyast system installing one opensuse systems automatically without user intervention autoyast installations performed using control file installation configuration data profile current system stored codice_1 webyast web interface yast used check status current machine check installation packages shutdown reboot system change system settings time change status system services daemons change license yast previous rather restrictive license gpl 2004 made possible port yast gnu/linux distributions consequence project yast4debian launched worked port yast debian project contact yast team novell/suse reached important milestones port modules yast2-ncurses yast2-qt currently project dormant searching new voluntary project maintainer
Operating systems
galcon galcon series real-time strategy video games android iphone webos windows linux mac os x flash developed phil hassey set space involves maneuvering fleets ships capture enemy planets original 1987 galactic conquest rick raddatz shareware title pc multiplayer conquest game similar board game risk based game called stellar invasion bearbyte software galcon classic released desktop late 2006 ludum dare timed game development contest developed advanced video game galcon classic features dozens single-player game modes full multiplayer july 2008 galcon publicly released instantaction web browser game platform released garagegames first time galcon released campaign sort gameplay couple months later galcon released iphone frequently called igalcon fans igalcon one first true multiplayer experiences iphone never gained enough publicity kick igalcon comes multiple single-player modes featuring varying degrees bot difficulty advanced online multiplayer system players battle rooms four june 2009 galcon flash released galcon flash flash port galcon closely resembled iphone port although galcon flash given small introductory price number registered users small however limited demo version galcon labs released early october 2009 galcon labs sequel first igalcon galcon labs features four new modes singleplayer multiplayer compatible galcon labs received positive addition galcon series february 11 2010 galcon fusion released mac windows latest addition galcon family desktop tablet equivalent galcon labs original galcon kick-starter galcon 2 launched december 7 2012 successfully funded released ios february 6 2014 players start 1-3 large home planets send ships conquer planets around numbers planet indicate many ships take conquer numbers player planet indicate number ships planet holds planet player owns produces ships player ships faster rate produced depending planet size players select percentage ships send planet players redirect ships mid-flight aim game defeat player eliminating enemy planets galcon 2 uses ranking system based upon elo rating system galcon classic received good reviews multiple awards iphone galcons received excellent reviews smaller publicity angle instantaction version given public reviews overall rating high galcon flash also receive many reviews mostly failed popularity igalcon macworld gave game 4 stars praising game entertaining online play felt single player levels progress evenly easy hard cases pocketgamer gave game 8 10 commenting 'innovative space game simple controls deep strategy slide play gave game 3 good 4 saying extremely satisfying online play made good game fall 2010 galcon used google ai challenge basis contest problem contest participants wrote programs competed simplified version game another modern game implementing idea behind galactic conquest foss game gnulactic konquest kdegames package solarmax series also based upon concept 2018 multiple clones galcon available mobile platforms
Operating systems
scottish national entitlement card scottish national entitlement card nec scotland-wide smart card scheme run scottish local authorities behalf scottish government predominantly operated concessionary travel pass also act proof age young people young scot nec give access civic services libraries leisure centres depending local authority 2000 scottish executive assigned budget modernising government fund intended improve public services part budget targeted towards development voluntary public sector smartcard initiative 2003 highlighted area developed local authorities parallel s.40 transport scotland act 2005 provided introduction national travel concession schemes would funded centrally rather local authorities decided known national entitlement card would used administer travel scheme introduced 2006 parallel development local authority administered citizen account modernising government fund 2006 articulated need assign records unique citizen reference number ucrn envisaged associating account nationally compatible smart cards service access tokens ucrn maintained part scotland national health service central register nhscr data access subset register scottish local authorities enabled s.57 local electoral administration registration services scotland act 2006 lears act scot nhscr assigned unique citizen reference number ucrn local authorities access certain conditions ucrn may linked nhscr data used verification purposes proposed expansion use 2014 raised fears ucrn form backbone scottish identity register persistent identification individuals across scottish state datasets open rights group accused proposal creating national id system backdoor despite scottish government opposition uk previous identity cards scheme february 2017 announced proposed expansion go ahead scottish nec allows scottish residents certain disabilities aged 60 years old access free travel within scotland nearly local bus scheduled long distance coach services including morning rush hour excluding premium fare night buses city sightseeing buses travel also valid bus services start/terminate carlisle berwick upon tweed long service travels to/from scotland entitlement free bus travel nec dependent scottish resident least 5 years old meeting one following criteria main cardholder meets following criteria also entitled companion travel usually attracting discount main cardholder get national entitlement card must discounted bus rail travel within scotland made available scottish residents aged 16-18 years old full-time volunteers aged 19 26 years old via young scot nec residents western isles orkney shetland also receive two free return ferry trips scottish mainland receive free bus travel young scot travel discount areas scotland additional concessionary travel options available example nec issued residing strathclyde partnership transport spt area gives access additional rail glasgow subway concessions young scot national youth information citizenship charity supported scottish government 11-26 year olds scotland young people age scotland eligible receive young scot national entitlement card young scot nec issued proof age standards scheme therefore used young person access age-restricted goods services addition travel concessions young people eligible card also entitles holder number services discounts young scot provide nec used number different additional purposes since introduction common uses include access cashless catering schools means providing library leisure membership discounted admissions basis age disability local authority areas card may used national purposes outlined local authorities normally issue nec valid application service using nec received
Computer security
collostructional analysis collostructional analysis family methods developed alphabetical order stefan th gries university california santa barbara anatol stefanowitsch free university berlin collostructional analysis aims measuring degree attraction repulsion words exhibit constructions notion construction far goldberg construction grammar collostructional analysis far comprises three different methods collostructional analysis requires frequencies words constructions similar wide variety collocation statistics differs raw frequency counts providing observed co-occurrence frequencies words constructions also comparison observed frequency one expected chance thus collostructional analysis distinguish attraction repulsion words constructions ii measure strength attraction repulsion usually log-transformed p-value fisher-yates exact test collostructional analysis differs collocation statistics measures association words words words syntactic patterns constructions thus takes syntactic structure seriously collocation-based analyses ii far used precise statistics namely fisher-yates exact test based hypergeometric distribution thus unlike -scores z -scores chi-square tests etc. analysis based violate distributional assumptions
Computational linguistics
freebsd core team freebsd core team would equivalent board directors freebsd project company freebsd project run freebsd committers developers svn commit access core team exists provide direction responsible setting goals freebsd project provide mediation event disputes also takes final decision case disagreement individuals teams involved project core team also responsible selecting individuals teams related development ongoing maintenance freebsd security officer release engineering team port manager team finally core team also vote nominations new committers event breach internal rules conduct falls core team decide sanctions freebsd core team equivalent similar body netbsd project called core group freebsd core team began unofficial group programmers mainly consisting initiated freebsd project eleven members new members could join invitation freebsd project grew core team year 2000 200 active committers core team expanded 18 people core members completely inactive others far less active many non-members even accusations cronyism old informal structure longer considered viable early 2000 discussions regarding future organisation set bylaws formulated jonathan lemon warner losh wes peters general vote active committers august 28 2000 bylaws passed 117 votes 5 freebsd core team elected body comprising nine members pool project developers rights directly change project repositories committers committers entitled vote core elections made least one change one project repositories past 12 months first election took place september 2000 seventeen candidates stood election including eight existing core team five re-elected alongside four new members elections taken place every two years since recent election results announced july 4 2018 elections shall held two years last vote even previous election early elections may held early membership core team fall seven petitioned 1/3 active developers bylaws may changed 2/3 majority committers least 50 active committers participate vote core team appoints secretary discretion non-voting position exists provide central point contact external parties group keeping track agenda acting interface core internal groups account creation team core team secretary also responsible writing distributing monthly status reports freebsd developer community current core team secretary joseph mingrone election lasts five weeks first week committers wish run election announce intention four weeks follow application period active committers vote nine candidates voting period closes votes counted ties resolved unambiguously elected candidates instance tie ninth place first eight decide tied candidates join team results announced within one week end voting period newly elected team enters office one week announcement
Operating systems
servercentral servercentral turing group infrastructure provider colocation cloud infrastructure iaas draas network connectivity managed storage managed services data centers across north america europe australia asia company customers include cdw outbrain new relic ars technica cars.com shopify 2018 servercentral named one fastest-growing private companies united states inc. magazine eighth consecutive year jordan lowe daniel brosk began hosting services friends local businesses virtual private servers growing 10,000 accounts growth spiked lowe brosk began advertising free domain names exchange prepaid hosting accounts daily deal website team switched manual billing account creation processes lifecycle hosting automation solution swsoft automated full customer lifecycle 2002 servercentral headquarters server operations moved chicago il 2003 servercentral opened data centers ashburn virginia san jose california servercentral private 10-gigabit ip network connected data centers year servercentral sponsored services php.net open-source community development php scripting 2004 servercentral expanded tokyo 2005 servercentral rebranded web hosting division wingsix 2008 sold uk2 group order concentrate managed data center infrastructure servercentral expanded amsterdam began collaboration cachefly high-speed content delivery network cdn 2006 servercentral one first large-scale networks deploy native ipv6 traffic 2009 servercentral expanded data center footprint elk grove village illinois signing long-term leasing agreement dupont fabros technology dft dft environmentally conscious design includes battery-free ups systems advanced mechanical automation high voltage throughout power distribution system may 2009 server operations opened new elk grove village il facility servercentral successfully completed sas 70 type ii audit singlehop signed 2.7 million agreement colocation space support servercentral elk grove data center singlehop signed 5-year 7-million contract servercentral april 2011 approximately 80 cabinets servercentral expanded three times within dft 2009 2012 bringing total elk grove footprint approximately 40,000 square feet 5.5 megawatts critical load 2010 servercentral introduced dedicated private cloud dpc single-tenant infrastructure tuned enterprise setup servercentral expanded within elk grove village il facility made inc. magazine list fastest-growing private companies america 2011 servercentral 58 employees 21.2 million revenue 13 annual growth june 2012 servercentral launched servercentral enterprise cloud public iaas servercentral completed type 2 ssae 16 soc 1 audit climbed inc. magazine list fastest-growing private companies america 2012 servercentral expanded 40,000 square feet 5.5 megawatts critical load elk grove village il 2013 brill street company named servercentral top 50 employer emerging gen talent chicago 2014 servercentral announced ddos mitigation radware servercentral also made inc. magazine honor roll named inc. 5000 fastest-growing private companies america fifth consecutive year 2015 servercentral expanded cloud portfolio multi-tenant managed vmware 2018 servercentral acquired turing group became known servercentral turing group sctg servercentral turing group operates twelve data centers across ten locations equipment space bandwidth add-on support rented retail customers 2019 servercentral turing group soc 2 type ii audited company pci-dss compliant managed services include dedicated servers data center migrations switch router maintenance vmware storage high-availability load balancers backup recovery remote hands firewalls application service infrastructure monitoring servercentral turing group provides backup replication single multi-site disaster recovery service servercentral turing group cloud computing services private shared hybrid iaas platforms colocation customers directly connect third-party public cloud providers servercentral turing group also provides aws cloud consulting services certified aws msp partner servercentral turing group network services include private ip transit dedicated data transport optical fiber managed network stacks native dual-stack ipv4 ipv6 service servercentral turing group operates 10-gigabit mpls backbone high-capacity bandwidth interconnectivity global data center locations servercentral turing group deployed native ipv6 traffic private network since 2006 servercentral turing group ranked among top service aws consulting companies clutch.co 2019 servercentral named top cloud consultant managed service provider clutch.co 2017 servercentral received award chicago best brightest companies work 2015 2016 servercentral ranked crn fast growth 150 list annual ranking fastest-growing solution providers north america 2011 2015 february 2015 servercentral made crn hosting msp 100 list recognizing american managed service providers operate data centers offer innovative subscription-based managed services servercentral held a+ rating better business bureau outstanding customer service since 2001 servercentral named inc. magazine list fastest-growing companies america 2010 2011 2012 2013 2014 2015 2016 2017 servercentral named one brill street company top employers gen talent 2013 servercentral received web host magazine editor choice award “ one solid networks industry. ” review included accolades company support team hardware quality pricing
Web technology
upguard upguard inc. australian cybersecurity startup company founded alan sharp-paul leo venegas mike baukes presently based mountain view california upguard provides products services help companies stand securely configured systems guard outages breaches 2016 company raised 17m series b funding round 2018 company employs around 46 upguard cyber resilience platform determines company cyber-security risk factors scanning internal external computer systems platform automatically scans every server application network mobile devices environments create living model configuration state thereafter continually assessing system record security vulnerabilities configuration drift procedural changes model platform dynamically derives unified cyber-security risk score cstar determines cyber risk posture assets multivariate factors upguard formerly scriptrock australian security company offices mountain view california sydney australia working investment firm colonial first state company founders leo venegas alan sharp-paul mike baukes met on-the-job sydney australia sharp-paul web developer baukes systems administrator spending years financial services australia uk trio developed system corporations understand business software portfolios consequent risk breaches outages due poor configuration management first release system initially named guardrail allowed automation typical cybersecurity devops practices focusing deep analysis relevant servers software applications settings 2016 company raised 17m series b funding round co-led pellion included august capital square peg capital insurance australia group early 2017 upguard signed exclusive distribution partnership aca pacific order establish stronger presence apac region baukes sharp-paul opened upguard office sydney australia bringing company back region began june 2017 upguard announced found unsecured server containing data deep root analytics contained information almost 200 million american voters upguard helps companies stand securely configured systems guard outages breaches product uses resilience supervisor integrates checks every step technology lifecycle whilst continuously assessing risk factors misconfiguration configuration drift process vulnerabilities approach unique platforms architecture allows dynamic capture large configuration datasets continuously order difference visualize report potential breaches outages proactively products core configuration information transformed security policies procedural validations automations ensure desired integrity environments maintained auditable enhanced identifying authorized change vs unauthorised change dynamically reconciling entire environments ticketing systems itsm processes sdlc processes upguard summarizes key insights across data dynamically includes proprietary risk modeling method called cstar aggregates relevant risk factors score 0-950 similar credit score allowing companies effectively predict prioritize high-risk impact areas track risk hotspots time compare scores similar companies like industries comparison upguard ships three products interoperate form deployable cyber resilience strategy discover control predict aims address different source risk related information technology
Computer security
du unix codice_1 abbreviated disk usage standard unix program used estimate file space usage—space used particular directory files file system codice_1 utility first appeared version 1 unix version codice_1 bundled gnu coreutils written torbjorn granlund david mackenzie paul eggert jim meyering default single unix specification sus specifies codice_1 display file space allocated file directory contained current directory links displayed size link file linked size content directories displayed expected codice_1 reports allocation space absolute file space amount space file system shown codice_1 may vary shown codice_7 files deleted blocks yet freed also minfree setting allocates datablocks filesystem super user processes creates discrepancy total blocks sum used available blocks minfree setting usually set 5 total filesystem size info see core utils faq codice_1 takes single argument specifying pathname du work specified current directory used sus mandates du following options unix unix-like operating systems may add extra options example bsd gnu codice_1 specify -h option displaying disk usage format easier read user adding units appropriate si prefix e.g 10 mb sum directories -s kilobytes -k sum directories -s human-readable format -h byte kilobyte megabyte gigabyte terabyte petabyte disk usage subdirectories files including hidden files within current directory sorted filesize disk usage subdirectories files including hidden files within current directory sorted reverse filesize weight size subdirectory current directory -d 1 sum total end -c displayed human-readable format -h du gnu weight size subdirectories root directory -d 1 trailing sum total end -c displayed human-readable format -h without traversing filesystems -x useful /var /tmp directories separate storage root directory du gnu
Computer file systems
sql server express microsoft sql server express version microsoft sql server relational database management system free download distribute use comprises database specifically targeted embedded smaller-scale applications product traces roots microsoft database engine msde product shipped sql server 2000 express branding used since release sql server 2005 sql server express provides many features paid full versions microsoft sql server database management system however technical restrictions make unsuitable large-scale deployments differences express product include unlike predecessor product msde express product include concurrent workload-governor limit performance database engine receives work typical small number users sql server express includes several gui tools database management include predecessor product msde generally lacked basic gui management tools features available sql server standard better editions absent sql server express include microsoft makes sql server express available free 2005 express version example standard approach installation options provided follows generally sql 2005 express installers packaged following consistent naming convention optional variants gone several service packs sp sp installer used without using older ones first
Databases
unidirectional link detection unidirectional link detection udld data link layer protocol cisco systems monitor physical configuration cables detect unidirectional links udld complements spanning tree protocol used eliminate switching loops two devices b connected via pair optical fibers one used sending b sending b link bidirectional two-way one fibers broken link become one-way unidirectional goal udld protocol detect broken bidirectional link e.g transmitted packets arrive receiver fibers connected different ports device port udld packet sent port links packet contains sender identity information device port expected receiver identity information device port port checks udld packets receives contain identifiers device port udld cisco-proprietary protocol hp extreme networks avaya similar feature calling different name hp calls device link detection protocol dldp extreme networks call extreme link status monitoring elsm avaya calls link-state tracking similar functionality standardized form provided part ethernet oam protocol defined part ethernet first mile changes 802.3 previously 802.3ah d-link duld feature built top ethernet oam function brocade devices running ironware support proprietary form udld use udld 10gbe augmented per 802.3ae/d3.2 standard fault detected physical link
Internet protocols
oma instant messaging presence service oma instant messaging presence service imps open mobile alliance enabler instant messaging presence wireless village consortium developed first cut specifications wireless village merged oma specs became oma imps 1.0 specifications imps widely deployed necessarily marketed interworking several operators imps platforms performed gsma initiative encourages interworking deployment instant messaging vanilla terminals often imps clients nokia chat client accessed via presence menu sony ericsson called friends motorola called im phones chat clients generally designed provider neutral put wireless village server settings phone n't inbuilt chat client might still able get third-party chat application runs phone symbian java brew application environment need get chat client wireless village compliant presence-enabled note still necessary operator provide im service and/or one connect third party server connection others im'ing partial list
Internet protocols
scientificpython scientificpython open source library scientific tools python programming language development started 1995 updated since october 1 2014 library includes qt tk widget toolkits provided building cross-platform graphical user interfaces scientificpython released cecill main developer maintainer scientificpython konrad hinsen orléans university uses building block research code particular molecular modeling toolkit mmtk software nmoldyn uses molecular dynamics trajectories predict neutron scattering spectra outside particular application context users likely prefer package scipy seen dynamic evolution decade 2000–2010 involving several active developers
Programming language topics
supertalk supertalk scripting language used supercard supertalk descendant hypertalk one powerful features supercard adds hypertalk language user properties hypertalk fixed set properties objects supercard scripters use codice_1 command add new properties buttons fields properties contain arbitrary text including numbers object references also represented using text xtalks even dumps entire files supertalk provides several variations hypertalk codice_2 codice_3 commands let one choose several items list choose icon available icons pick midi instrument play sound choose file supported image format including preview disks folders different hypertalk dialogs supertalk answer ask dialogs resize dynamically hold text however since supercard allows cards i.e pages windows arbitrary types one easily build one dialog large enough supertalk also codice_4 command displays standard system alert windows sheets including standard system icons switch command available readability complex conditionals various types media recorded e.g screen grabs card sound quicktime movies also codice_5 command equivalent copying pasting leaves clipboard unchanged enumeration command creates global variables sequential integer values recently metacard familiar codice_6 command iterating lists added supercard also offers exception handling using codice_7 statement associated codice_8 command supertalk came source-level debugger well ahead hypercard supertalk debugger modal window let set breakpoints clicking beside line special codice_9 command used enter debugger one view currently executing line code execute commands evaluate expressions etc supertalk debugger explicitly turned instead available right away script error occurs codice_10 command little stricter syntax exchange supports numerous additional transition effects including quicktime transitions special plug-in modules stored data fork resources type codice_11 special kind external command get unloaded window added type codice_12 differs noticeably xcmd protocol also n't use xwindoid protocol later introduced adding windows hypertalk supertalk also uses codice_13 command starting external applications different hypertalk codice_14 command supertalk uses opening various windows hypertalk deviated using course supertalk also exposes supercard expanded object model making possible create sliders scroll bars progress indicators scales scriptable paint draw graphics native listbox first-class menu objects multiple windows several styles modal panel non-modal scrolling resizable ... floating palettes also available focus activation scope modified full script control parts supercard deviate english-like-ness hypertalk includes codice_4 command tried emulate slightly awkward syntax codice_2 command bit much also seems time number xcmds simply rolled engine built-in commands maintaining memorable handler call syntax obvious case codice_17 function movies kind invisibly tacked window instead implemented real controls like sliders elements also properties control general application behaviour one-to-one translations underlying system apis e.g using appearance manager theming engine mac os 9
Programming language topics
list audio programming languages list notable programming languages optimized sound production algorithmic composition sound synthesis
Programming language topics
dwr java dwr direct web remoting java open-source library helps developers write web sites include ajax technology allows code web browser use java functions running web server functions within browser dwr project started joe walker 2004 1.0 released 29 aug 2005 dwr takes novel approach ajax dynamically generating javascript code based java classes thus web developer use java code javascript local web browser whereas reality java code runs web server full access web server resources security reasons web developer must configure exactly java classes safe export often called web.xml dwr.xml method remoting functions java javascript gives dwr users feel much like conventional rpc mechanisms like rmi soap benefit runs web without requiring web browser plug-ins dwr consider web browser web server protocol important prefers ensure programmer interface natural greatest challenge marry asynchronous nature ajax synchronous nature normal java method calls asynchronous model result data available time initial call made dwr solves problem allowing web developer specify function called data returned using extra method parameter extra method called callback method value returned java function passed callback method sample callback callback function inside json object passed additional parameter remoted function version 2.0 dwr supports comet also called reverse ajax java code running server deliberately send dedicated javascript browser
Programming language topics
mindset computer mindset released spring 1984 intel 80186-based ms-dos personal computer unlike ibm pc compatibles time custom graphics hardware supporting 16 simultaneous colors chosen 512-shade palette hardware-accelerated drawing capabilities including blitter allowed update screen 50 times fast cga adaptor standard pc basic unit priced conceptually similar successful commodore amiga released year later due financial legal complications spite glowing reviews system never sold well disappeared market year lamented industry commenters looked event first clear evidence end innovation favor compatibility distinctive case remains permanent collection museum modern art new york computer systems era cpu used create graphics drawing bit patterns directly memory separate hardware reads patterns produces actual video signal display mindset designed ex-atari engineers added new custom-designed vlsi vector processor handle many common drawing tasks like lines filling areas instead cpu work changing memory directly mindset cpu would simply set instructions hand actual bit fiddling separate processor mindset president compared chipset intel 8087 floating point processor running alongside intel 80186 machine based number parallels mindset amiga 1000 another computer designed ex-atari engineers offered advanced graphics development continued became clear machine would ready ms-dos-based microsoft windows 1.0 bill gates became personally involved project assist mindset emulating ibm character graphics without losing performance mindset officials determined desirable software compatible development frozen os burned rom late 1983 rom run 20 pc software base including microsoft flight simulator wordstar one pc applications reported run mindset publicized list 60 applications ran unmodified software base expected increase dramatically final version windows released release early 1984 jack tramiel rumored tried buy mindset technology would also amiga ultimately buying atari designing new machine off-the-shelf parts atari st mindset released 2 may 1984 base model 64k ram floppy disk drive sold us 1099 128k model single disk available 1,798 256k dual-disk version cost 2,398 disk-less version machine still usable system also included two rom cartridge ports front machine could used operating system another program canonical cartridge extended version gw-basic machine packaged unique enclosure designed gvo menlo park visually separated two sections rom slots lower half optional diskettes upper half sold complete custom nylon carrying case mindset president claimed graphics capabilities unmatched except us 50,000 workstations time garnered critical acclaim reviewers universally praising graphics overall performance much faster contemporary pcs although many cases caveat market rapidly standardizing summer 1985 clear system selling expected company re-purposed video production graphics design markets followed august round layoffs another january time half employees let go company filed chapter 11 protection 28 august never emerged 1985 clear system living promise windows 1.0 flop general john j. anderson published review system decrying personal computer market beginning value compatibility technology noted base system unit referred model m1001 later mindset ii computer released badge engineered version m1001 adhesive label designating ii embossed name internally video processor board separate mini-daughterboard enhanced functionality totally understood mindset ii advanced professional videographics system users guide makes mention chaining two mindset mindset ii referred front user guide model m1500 however internal pages reference m1000-ii also make mention mindset video production module model m1011 system architecture based intel 80186 proprietary vlsi chips enhanced sped graphics although disk compatible ibm pc dos enhanced graphics capabilities made achieving full ibm compatibility difficult competitors bill gates became involved development assisting mindset emulating ibm character graphics without losing performance mindset officials determined desirable software compatible development frozen os burned rom locked 20 pc software base including microsoft flight simulator wordstar one pc applications reported run mindset publicized list 60 applications ran unmodified software base expected increase dramatically final version windows released mindset design modular many aspects top case opening access system bus allowed expansion module plug main computer module add memory one two disk drives mindset designed several ex-atari engineers like amiga 1000 another computer era advanced graphics subsystem modular expandability jack tramiel forming ttl – tramiel technologies limited tried buy mindset technology spring 1984 dual 5.25 floppy drive module sat main unit available part common sales configuration system module also included expansion memory well mindset dual front-mounted rom cartridge ports locking knob left side main computer module lock rom modules place mindset option system configuration utility able select whether system booted left right rom carts disk drive cartridges could also contain cmos ram would retained unplugged battery cartridge case cartridges envisioned primary medium software distribution mindset sales system low cartridges economical software distributed disk instead released 1984 models m1001 mindset computer bios rom code 1.07 earlier show copyright notice c 1983 mindset computer corp rear computer equipped following ports rear main computer module also 3× 36 pin expansion bus slots dual disk/memory expansion unit adds additional 3 36 pin expansion bus slots system note noticeable internal external differences dual disk drive/memory expansion modules marked model m1003 others found marked m1004
Computer architecture
ocml open configuration management layer ocml universal application configuration management layer helps develop integrated applications independent underlying group applications configurations management
Computer security
peiter zatko peiter c. zatko better known mudge network security expert open source programmer writer hacker prominent member high-profile hacker think tank l0pht well long-lived computer culture hacking cooperative cult dead cow involved l0pht mudge contributed significantly disclosure education information security vulnerabilities addition pioneering buffer overflow work security advisories released contained early examples flaws following areas code injection race condition side-channel attack exploitation embedded systems cryptanalysis commercial systems original author password cracking software l0phtcrack 2010 mudge accepted position program manager darpa oversaw cyber security research 2013 mudge went work google advanced technology projects division born december 1970 mudge graduated berklee college music top class adept guitar player mudge responsible early research type security vulnerability known buffer overflow 1995 published write buffer overflows one first papers topic published first security advisories research demonstrating early vulnerabilities unix code injection side-channel attacks information leaks leader full disclosure movement initial author security tools l0phtcrack antisniff l0phtwatch mudge one first people hacker community reach build relationships government industry demand public speaker spoke hacker conferences def con academic conferences usenix mudge also member cult dead cow since 1996 one seven l0pht members testified senate committee 1998 serious vulnerabilities internet time l0pht became computer security consultancy stake 1999 mudge became vice president research development later chief scientist 2000 first crippling internet distributed denial-of-service attacks invited meet president bill clinton security summit alongside cabinet members industry executives 2004 became division scientist government contractor bbn technologies originally worked 1990s also joined technical advisory board nfr security 2010 announced would project manager darpa project focused directing research cyber security 2013 announced would leave darpa position google atap 2015 zatko announced twitter would join project called cyberul testing organisation computer security inspired underwriters laboratories mandated white house 11 august 2007 married sarah lieberman co-worker bbn darpa created cyber analytical framework agency used evaluate dod investments offensive defensive cyber security tenure ran least three dod programs known military networking protocol mnp cyber-insider threat cinder cyber fast track cft military networking protocol mnp provided network prioritization full user-level attribution military computer networks cyber-insider threat cinder focused identifying cyber espionage conducted virtual insider threats future variants stuxnet duqu cinder often mistakenly associated wikileaks media possibly due confusion darpa programs focused identifying human insider threat adams identification software espionage posed malware cinder program issue clarified mudge defcon 2011 keynote 46 minutes 11 seconds talk cyber fast track cft provided resources funding security research including programs run hackers hackerspaces makerlabs program provided alternative traditional government contracting vehicles accessible individuals small companies previously unable work within cumbersome complicated darpa process novel contracting effort averaging time 7 days receipt proposal funding provided proposing research organization program initially announced shmoocon 2011 keynote mudge published numerous papers advisories detailing security problems across different applications operating systems pioneering champion full disclosure
Computer security
trustwave securebrowsing trustwave securebrowsing previously known finjan securebrowsing m86 securebrowsing security plug-in web browsers internet explorer firefox google chrome developed trustwave holdings formerly known m86 security finjan product longer supported backend required work longer exists software scans classifies web addresses provide user safety rating urls user visits proactively alerting user potentially malicious web addresses links search results ads selected web pages software protects user webpages could used compromise user privacy identity unlike products market based static databases containing information web domain reputations software scans url currently exists web time address displayed user browser code analysis approach efficient method alternatives detecting malicious behavior
Computer security
setacl setacl freeware utility manipulating security descriptors microsoft windows used available gnu lesser general public license lgpl command-line utility activex component changed freeware license version 3.0.0.0 list features taken product web page set 'change permissions directory c \angela user 'brian domain 'dom1 remove write change permission sets desktop replace 'read execute permissions example use autoit found
Operating systems
chris wysopal chris wysopal also known weld pond entrepreneur computer security expert co-founder cto veracode member high-profile hacker think tank l0pht vulnerability researcher chris wysopal born 1965 new connecticut mother educator father engineer attended rensselaer polytechnic institute troy new york received bachelor degree computer systems engineering 1987 seventh member join l0pht development projects included netcat l0phtcrack windows also webmaster/graphic designer l0pht website hacker news network first hacker blog researched published security advisories vulnerabilities microsoft windows lotus domino microsoft iis coldfusion weld one seven l0pht members testified senate committee 1998 could bring internet 30 minutes l0pht acquired stake 1999 became manager stake research group later stake vice president research development 2004 stake acquired symantec became director development 2006 founded veracode christien rioux serves cto 2017 veracode acquired ca technology 614m veracode subsequently spun became independent purchased thoma bravo 950m wysopal continues serve cto 2018 wysopal joined humanyze board directors wysopal instrumental developing industry guidelines responsible disclosure software vulnerabilities contributor rfpolicy first vulnerability disclosure policy together steve christey mitre proposed ietf rfc titled responsible vulnerability disclosure process 2002 process eventually rejected ietf within purview process become foundation organization internet safety industry group bringing together software vendors security researchers founder 2001 founded non-profit full disclosure mailing list vulnwatch moderator 2003 testified united states house representatives subcommittee topic vulnerability research disclosure 2008 wysopal recognized achievements industry named one 100 influential people eweek selected one infoworld cto 25 2010 named sans security thought leader 2012 began serving black hat review board named one top 25 disruptors 2013 computer reseller news 2014 named one 5 security thought leaders sc magazine
Computer security
celerra celerra discontinued nas device produced emc corporation available either integrated unit nas header added independent emc storage array clariion symmetrix supports smb nfs ftp ndmp tftp mpfs protocols celerra unified storage device use clariion storage array storage layer also provides iscsi fibre channel block-level storage introduced october 1996 nas market symmetrix network file storage later renamed celerra celerra promoted platform virtualization optional features included de-duplication replication ndmp storage tiering celerra runs real-time operating system called data access real time dart dart modified unix embedded kernel 32mb additional functionality like fibre channel driver hba bonding ethernet added operate file server celerra based x-blade architecture clariion available single data mover x-blade multiple data movers active-passive n+1 configuration comparable celerra products products netapp offer similar features protocol support apart ability use block-level fibre channel 2011 emc introduced new vnx series unified storage disk arrays intended replace clariion celerra products early 2012 clariion celerra discontinued data access real time dart real-time operating system used emc celerra modified unix kernel additional functionality dart embedded real-time operating system comprising modified unix kernel dedicated file server software together transfer files multimedia data across network using variety network protocols dart file server software executes entirely kernel—a real-time kernel design based monotonic scheduling dart kernel environment generic user-application environment instead dart kernel provides run-time environment file service embedded dedicated application dart file server software linked kernel single system image loaded execution boot time dart organized seven layers layers handle data movement dart functionality dart directed implementing processes contained layers starting layer closest hardware ending layer closest user interface dart ’ functionality organized follows layers 1 – 4 comprise functions performed within kernel programmer typically uses components limited higher numbered layers 5 6 add data moving applications dart ’ rpc framework component provides client server facilities implemented streams sockets dart acts rpc server context nfs rpc client context nis dart external environment dart designed provide rapid data movement information sharing across variety hardware platforms networked environment data transfers either request-response pull-type file transfers streaming push-type multimedia data time-sharing real-time isochronous characteristics two types rpc implemented dart traditional rpc onc rpc due dart ’ multi-threaded architecture traditional rpc implemented dart several modifications example sun os rpc code generator rpcgen assumes single-threaded unix process calls library directly however dart ’ unix processes instead uses true multi-threading—that n threads pick rpc messages come therefore using traditional rpc dart application must perform functions registering portmapper extracting credentials security information message checking security without extracting responsibility falls application developer—thread creation initialization end point creation initial create main loop processing stream reading message collector general synchronizer particular rpc needs declared whereas oncrpc collector built addition traditional rpc basic structure receiving message application developer must take apart means xdr format analyze addition client-side fully implemented finally rpc primarily synchronous protocol used asynchronously dart conjunction mutexes condition variables types locks dart implements rpc user datagram protocol udp transport control protocol tcp application single udp stream one tcp stream per connection common ip module acting multiplexer
Operating systems
survivors video game survivors also known survivors game home computers published atlantis software originally 1986 zx spectrum ported msx atari 8-bit family commodore 64 commodore 16 acorn electron bbc micro 1987 amstrad cpc 1988 puzzle game based rocks diamonds mechanics boulder dash game set 2087 'hibernation dome damaged nuclear war holds 1000 survivors stasis accessed humans fallen earth boulders player must control three droids gain access teleport survivors dome also populated guardian droids left maintain life support functions damaged nuclear fallout become hostile survivors must evacuated time limit runs radiation becomes strong game uses 'rocks diamonds mechanics popularised game boulder dash whereby player dig earth push boulders boulders fall area cleared emphasis puzzle element survivors closer repton main twist game droid perform one functions usually carried player similar games player must switch droids depending need droid 1 tunnel earth droid 2 teleport survivors home game equivalent collecting diamonds droid 3 push boulders means one droid becomes trapped game completed droids lose energy boulder falls top touch one faulty guardian droids guardian droids destroyed dropping boulders trapped behind boulders player droids destroyed game completed game first released zx spectrum received mixed reviews complaints included 'jerky movement dull graphics sound praise given playability value money crash awarded overall score 70 sinclair gave 6/10 c vg gave marks 4/10 5/10 without awarding overall score game ported number formats received generally positive reviews zzap 64 gave c64 version score 79 concluding game taxing mentally dexterously boulderdash fans suffering withdrawal symptoms enjoy survivors quite lot micro user even complimentary commenting could well knock repton perch electron user awarded 'golden game title overall score 9/10 including 10/10 playability value money
Computer architecture
persistent memory computer science persistent memory method apparatus efficiently storing data structures continue accessed using memory instructions memory apis even end process created last modified often confused non-volatile random-access memory nvram persistent memory instead closely linked concept persistence emphasis program state exists outside fault zone process created process program execution fault zone process subset program state could corrupted process continuing execute incurring fault instance due unreliable component used computer executing program efficient memory-like access defining characteristic persistent memory provided using microprocessor memory instructions load store also provided using apis implement remote direct memory access rdma actions rdma read rdma write low-latency methods allow byte-grain access data also qualify persistent memory capabilities extend beyond non-volatility stored bits instance loss key metadata page table entries constructs translate virtual addresses physical addresses may render durable bits non-persistent respect persistent memory resembles abstract forms computer storage file systems fact almost existing persistent memory technologies implement least basic file system used associating names identifiers stored extents minimum provide file system methods used naming allocating extents
Computer file systems
certificate authority security council certificate authority security council casc multi-vendor industry advocacy group created conduct research promote internet security standards educate public internet security issues group founded february 2013 seven largest certificate authorities issuers ssl certificates — comodo symantec trend micro digicert entrust globalsign godaddy digicert withdrew group june 15 2018 casc supports efforts ca/browser forum standards-setting bodies support development enhancements improve secure sockets layer ssl operations certificate authorities ca according robin alden cto comodo member council casc serve united front cas involved standards-setting organization ’ committed supplementing standards-setting organizations providing education research advocacy best practices use ssl casc limits membership ssl certificate authorities meet requirements reputation operation security members required undergo annual audit adhere industry standards ca/browser forum ’ baseline requirements network security guidelines group works collaboratively create define initiatives improve understanding policies impact internet infrastructure group primary focus promoting understanding importance certificate-revocation checking benefits ocsp stapling protocol intended ensure web users aware visit web site revoked expired ssl certificate group also worked secure software distribution digital code signing code signing certificates play key role helping users identify authentic software code reputable publishers receive assurance code tampered beforehand
Computer security
dspam dspam free software statistical spam filter written jonathan a. zdziarski author book ending spam books intended scalable content-based spam filter large multi-user systems dspam distributed terms gnu general public license development discontinued 2014 project consists library libdspam contains core filtering storage routines command-line web-based interfaces dspam mta-independent store spam classification data number database formats uses bayesian filtering among techniques learn adapt spam dspam original author claims users dspam reported high 99.5 99.95 accuracy including “ best recorded levels accuracy ... 99.991 one avid user 2 errors 22,786 99.987 author. ” however spam filter test performed trec 2005 best-performing dspam configuration misclassification rates worse filters test stated levels accuracy zdziarski protests results rights project sold sensory networks may 2007 development dspam resumed december 2007 sensory networks publishing 27 community-created patches cvs tree along new php-based webui development fork dspam dspam-community registered sourceforge october 10 2008 january 7 2009 mick johnson sensory networks announced “ looking shutting hosting dspam server end january. ” january 12 2009 mick sent follow-up email stating “ handing trademarks copyright dspam source dspam website administration mailing lists ” “ crew dspam-community. ” dspam dspam-community merged january 2009 development project continued name dspam driven community developers users 2014 dspam active upstream developers removed debian ubuntu current package repositories
Computer security
cwm window manager cwm calm window manager stacking window manager x window system primarily developed part openbsd base system portable versions available unix-like operating systems development cwm started patches evilwm marius aamodt eriksen ease implementation new features cwm eventually rewritten using code 9wm last release original author came august 2005 april 2007 cwm imported openbsd source tree january 2008 substantial part original source code including 9wm code rewritten cwm distributed openbsd since version 4.2 replaced wm2 third-party linux port also exists cwm stacking window manager oriented towards heavy keyboard usage small footprint ease use lacks explicit virtual desktops functionality emulated using window groups mechanism cwm draw window decorations except 1-pixel border around windows cwm includes several menus menus operate search type manner cwm allows raising hiding switching searching windows using keyboard making suitable use terminal emulator multiplexer furthermore allows manipulating pointing devices mice keyboard additional key bindings configuration options specified configuration file codice_1 cwm generally well received software minimalist communities cwm noted used mainly due status one default window managers openbsd though reasons sometimes cited cwm also praised flexibility ease use fact used without mouse
Operating systems
concurrent computing concurrent computing form computing several computations executed overlapping time periods— concurrently —instead sequentially one completing next starts property system—this may individual program computer network—and separate execution point thread control computation process concurrent system one computation advance without waiting computations complete programming paradigm concurrent computing form modular programming namely factoring overall computation subcomputations may executed concurrently pioneers field concurrent computing include edsger dijkstra per brinch hansen c.a.r hoare concept concurrent computing frequently confused related distinct concept parallel computing although described multiple processes executing period time parallel computing execution occurs physical instant example separate processors multi-processor machine goal speeding computations—parallel computing impossible one-core single processor one computation occur instant single clock cycle contrast concurrent computing consists process lifetimes overlapping execution need happen instant goal model processes outside world happen concurrently multiple clients accessing server time structuring software systems composed multiple concurrent communicating parts useful tackling complexity regardless whether parts executed parallel example concurrent processes executed one core interleaving execution steps process via time-sharing slices one process runs time complete time slice paused another process begins resumes later original process resumed way multiple processes part-way execution single instant one process executed instant concurrent computations may executed parallel example assigning process separate processor processor core distributing computation across network general however languages tools techniques parallel programming might suitable concurrent programming vice versa exact timing tasks concurrent system executed depend scheduling tasks need always executed concurrently example given two tasks t1 t2 word sequential used antonym concurrent parallel explicitly distinguished concurrent/sequential parallel/serial used opposing pairs schedule tasks execute one time serially parallelism without interleaving sequentially concurrency task begins prior task ends called serial schedule set tasks scheduled serially serializable simplifies concurrency control main challenge designing concurrent programs concurrency control ensuring correct sequencing interactions communications different computational executions coordinating access resources shared among executions potential problems include race conditions deadlocks resource starvation example consider following algorithm make withdrawals checking account represented shared resource codice_1 suppose codice_2 two concurrent threads make calls codice_3 codice_4 line 3 operations executes line 5 operations find codice_5 evaluates codice_6 execution proceed subtracting withdrawal amount however since processes perform withdrawals total amount withdrawn end original balance sorts problems shared resources benefit use concurrency control non-blocking algorithms concurrent computing following advantages several models concurrent computing used understand analyze concurrent systems models include number different methods used implement concurrent programs implementing computational execution operating system process implementing computational processes set threads within single operating system process concurrent computing systems communication concurrent components hidden programmer e.g. using futures others must handled explicitly explicit communication divided two classes shared memory message passing concurrency different performance characteristics typically although always per-process memory overhead task switching overhead lower message passing system overhead message passing greater procedure call differences often overwhelmed performance factors concurrent computing developed earlier work railroads telegraphy 19th early 20th century terms date period semaphores arose address question handle multiple trains railroad system avoiding collisions maximizing efficiency handle multiple transmissions given set wires improving efficiency via time-division multiplexing 1870s academic study concurrent algorithms started 1960s credited first paper field identifying solving mutual exclusion concurrency pervasive computing occurring low-level hardware single chip worldwide networks examples follow programming language level operating system level network level networked systems generally concurrent nature consist separate devices concurrent programming languages programming languages use language constructs concurrency constructs may involve multi-threading support distributed computing message passing shared resources including shared memory futures promises languages sometimes described concurrency-oriented languages concurrency-oriented programming languages copl today commonly used programming languages specific constructs concurrency java c languages fundamentally use shared-memory concurrency model locking provided monitors although message-passing models implemented top underlying shared-memory model languages use message-passing concurrency model erlang probably widely used industry present many concurrent programming languages developed research languages e.g pict rather languages production use however languages erlang limbo occam seen industrial use various times last 20 years languages concurrency plays important role include many languages provide support concurrency form libraries levels roughly comparable list
Operating systems
publish–subscribe pattern software architecture publish–subscribe messaging pattern senders messages called publishers program messages sent directly specific receivers called subscribers instead categorize published messages classes without knowledge subscribers may similarly subscribers express interest one classes receive messages interest without knowledge publishers publish–subscribe sibling message queue paradigm typically one part larger message-oriented middleware system messaging systems support pub/sub message queue models api e.g java message service jms pattern provides greater network scalability dynamic network topology resulting decreased flexibility modify publisher structure published data publish-subscribe model subscribers typically receive subset total messages published process selecting messages reception processing called filtering two common forms filtering topic-based content-based topic-based system messages published topics named logical channels subscribers topic-based system receive messages published topics subscribe subscribers topic receive messages publisher responsible defining classes messages subscribers subscribe content-based system messages delivered subscriber attributes content messages matches constraints defined subscriber subscriber responsible classifying messages systems support hybrid two publishers post messages topic subscribers register content-based subscriptions one topics many pub/sub systems publishers post messages intermediary message broker event bus subscribers register subscriptions broker letting broker perform filtering broker normally performs store forward function route messages publishers subscribers addition broker may prioritize messages queue routing subscribers may register specific messages build time initialization time runtime gui systems subscribers coded handle user commands e.g. click button corresponds build time registration frameworks software products use xml configuration files register subscribers configuration files read initialization time sophisticated alternative subscribers added removed runtime latter approach used example database triggers mailing lists rss data distribution service dds middleware use broker middle instead publisher subscriber pub/sub system shares meta-data via ip multicast publisher subscribers cache information locally route messages based discovery shared cognizance one earliest publicly described pub/sub systems news subsystem isis toolkit described 1987 association computing machinery acm symposium operating systems principles conference sosp '87 paper exploiting virtual synchrony distributed systems 123–138 serious problems pub/sub systems side-effect main advantage decoupling publisher subscriber pub/sub system must designed carefully able provide stronger system properties particular application might require assured delivery pub/sub pattern scales well small networks small number publisher subscriber nodes low message volume however number nodes messages grows likelihood instabilities increases limiting maximum scalability pub/sub network example throughput instabilities large scales include pub/sub systems use brokers servers argument broker send messages subscriber in-band subject security problems brokers might fooled sending notifications wrong client amplifying denial service requests client brokers could overloaded allocate resources track created subscriptions even systems rely brokers subscriber might able receive data authorized receive unauthorized publisher may able introduce incorrect damaging messages pub/sub system especially true systems broadcast multicast messages encryption e.g transport layer security ssl/tls prevent unauthorized access prevent damaging messages introduced authorized publishers architectures pub/sub client/server systems also vulnerable authorized message senders behave maliciously
Distributed computing architecture
rpmsg rpmsg remote processor messaging protocol enabling inter-core communication heterogeneous multicore systems protocol rpmsg present linux kernel also available stand-alone component microcontroller-based systems rpmsg implementations developed open-source
Internet protocols
detekt detekt discontinued free tool amnesty international digitale gesellschaft eff privacy international scan surveillance software microsoft windows intended use activists journalists scan known spyware detekt available free download tool guarantee detection spyware meant give false sense security meant used methods combat malware spyware 2014 coalition unlawful surveillance exports estimated global trade surveillance technologies worth 3 billion gbp annually detekt available amharic arabic english german italian spanish tool required installation designed scan surveillance software windows pcs xp windows 8.1 tool scanned current surveillance software scanning would display summary indicating spyware found would generate log file containing details tool guarantee absolute protection surveillance software scanned known spyware time release could modified circumvent detection new software would become available therefore clean bill health n't necessarily mean pc free surveillance software website instructed user disconnect internet connection close applications running turn connection back spyware found detekt released gplv3 free license detekt developed claudio guarnieri help bill marczak morgan marquis-boire eva galperin tanya o'carroll andre meister jillian york michael ligh endalkachew chala provided patterns following malware darkcomet rat xtremerat blackshades rat njrat finfisher finspy hackingteam rcs shadowtech rat gh0st rat
Computer security
cloud engineering cloud engineering application engineering disciplines cloud computing brings systematic approach concerns commercialization standardization governance cloud computing applications practice leverages methods tools engineering conceiving developing operating maintaining cloud computing systems solutions process designing systems necessary leverage power economics cloud resources solve business problems cloud engineering field engineering focuses cloud services software service platform service infrastructure service multidisciplinary method encompassing contributions diverse areas systems engineering software engineering web engineering performance engineering information technology engineering security engineering platform engineering service engineering risk engineering quality engineering nature commodity-like capabilities delivered cloud services inherent challenges business model drive need cloud engineering core discipline elements cloud engineering include professionals work field cloud engineering primarily cloud architects engineers key skills possessed cloud engineering professionals demand skills advanced ict information communication technology rapidly expanded recent years business society transformed emergence internet web ubiquitous media enabling knowledge-based global economy turn created huge demand networked-enabled parallel distributed computing technologies changing way conduct science operate business tackle challenging problems epidemic diseases climate change many platforms available cloud engineering notion cloud engineering context cloud computing sparsely used discussions presentations talks various occasions middle 2000s term cloud engineering formally coined around 2007 concept cloud engineering officially introduced april 2009 various aspects topics subject extensively covered number industry events extensive research conducted specific areas cloud engineering development support cloud patterns cloud business continuity services first ieee international conference cloud engineering ic2e took place march 25–28 2013 second conference held march 10–14 2014
Distributed computing architecture
phusion passenger phusion passenger informally also known mod_rails mod_rack among ruby community free web server application server support ruby python node.js designed integrate apache http server nginx web server also mode running standalone without external web server phusion passenger supports unix-like operating systems available gem package tarball native linux packages originally designed web applications built ruby rails framework later extended support arbitrary ruby web frameworks rack interface later versions also added support python wsgi interface well support node.js 2012 phusion announced phusion passenger enterprise paid commercial variant phusion passenger wide array premium features phusion stated open source variant continue developed maintained along enterprise variant phusion passenger preferred deployment setup ruby rails applications 2016 recommended ruby rails authors 2009 2013 combination ruby 2.0 now-discontinued ruby enterprise edition phusion passenger claimed capable reducing rails memory consumption 33 well increasing performance
Web technology
radio hacker codebook radio hacker codebook book computer enthusiasts written george sassoon book explains receive international radioteletype signals convert circuit decode microcomputer case book computer superseded research machines 380z programs functions given written machine code basic however legal moral issues relating intercepting messages included radioteletype subject included fec automatic repeat request used maritime radiocommunications book also include exposition encryption including public key rsa cipher presciently expounds lack privacy cashless society code examples also given using sharp pc-320i encode decode german enigma machine books claims enigma kept secret long periods understanding could compromise american m-209 cipher machine still sold countries encryption topics covered include data encryption standard vernam cipher one-time pad pseudo random number generators transposition ciphers substitution ciphers radio hacker codebook idiosyncratic revealing personal quest sassoon decrypt military signals radio spectrum however would chance decode modern encryption described book radio hacker codebook broke ground low price technical computing book sold £6.95 well typical £10+ price computing books time published duckworth 239 pages
Computer security
franz lisp computer programming franz lisp discontinued lisp programming language system written university california berkeley uc berkeley ucb professor richard fateman several students based largely maclisp distributed berkeley software distribution bsd digital equipment corporation dec vax minicomputer piggybacking popularity bsd package franz lisp probably widely distributed used lisp system 1970s 1980s name pun composer franz liszt written specifically host running macsyma computer algebra system vax project began end 1978 soon uc berkeley took delivery first vax 11/780 named ernie covax ernie kovacs first many systems pun names ucb franz lisp available free charge educational sites also distributed eunice berkeley unix emulator ran vax vms time franz lisp creation macsyma computer algebra system ran mainly dec pdp-10 computer limited address space caused difficulties attempted remedies included ports maclisp multics lisp machines even successful would solutions massachusetts institute technology mit machines costly uncommon franz lisp first example framework large lisp programs could run outside lisp machines environment macsyma considered large program ported franz lisp macsyma distributed 50 sites license restricted mit interest making macsyma proprietary vax macsyma ran franz lisp called vaxima symbolics inc. bought commercial rights macsyma mit sell along lisp machines eventually compelled sell macsyma also dec vax sun microsystems computers paying royalties university california use franz lisp lisp implementations vax mit nil never fully functional university utah portable standard lisp dec vax lisp xerox interlisp-vax le lisp 1982 port franz lisp motorola 68000 processor begun particular ported prototype sun-1 made sun microsystems ran variant berkeley software distribution bsd unix called sunos 1986 purdue university franz lisp ported cci power 6/32 platform code named tahoe major contributors franz lisp uc berkeley john k. foderaro keith sklower kevin layer company formed provide support franz lisp called franz inc. founders richard fateman john foderaro fritz kunze kevin layer keith sklower associated uc berkeley development research franz lisp continued years acceptance common lisp greatly reduced need franz lisp first product franz inc. franz lisp running various motorola 68000-based workstations port franz lisp even done vax vms lawrence berkeley national laboratory however almost immediately franz inc. began work implementation common lisp allegro common lisp franz lisp interpreter written c franz lisp bootstrapped solely using c compiler franz lisp compiler written entirely franz lisp called liszt completing pun name composer franz liszt notable features franz lisp arrays lisp interchangeable arrays fortran foreign function interface ffi allowed interoperation languages binary level many implementation methods borrowed maclisp bibop memory organization big bag pages small integers represented uniquely pointers fixed values fields fast arithmetic
Programming language topics
spindling computers spindling allocation different files e.g. data files index files database different hard disks practice usually reduces contention read write resources thus increasing system performance word comes spindle axis hard disks spin
Databases
computer network surveillance computer network surveillance monitoring computer activity data stored hard drive data transferred computer networks internet monitoring often carried covertly may completed governments corporations criminal organizations individuals may may legal may may require authorization court independent government agencies computer network surveillance programs widespread today almost internet traffic monitored surveillance allows governments agencies maintain social control recognize monitor threats prevent investigate criminal activity advent programs total information awareness program technologies high-speed surveillance computers biometrics software laws communications assistance law enforcement act governments possess unprecedented ability monitor activities citizens however many civil rights privacy groups reporters without borders electronic frontier foundation american civil liberties union expressed concern increasing surveillance citizens end even already mass surveillance society limited political and/or personal freedoms fear led numerous lawsuits hepting v. hacktivist group anonymous hacked government websites protest considers draconian surveillance vast majority computer surveillance involves monitoring data traffic internet example united states communications assistance law enforcement act mandates phone calls broadband internet traffic emails web traffic instant messaging etc available unimpeded real-time monitoring federal law enforcement agencies packet capture also known packet sniffing monitoring data traffic computer network data sent computers internet networks takes form small chunks called packets routed destination assembled back complete message packet capture appliance intercepts packets may examined analyzed computer technology needed perform traffic analysis sift intercepted data look important/useful information communications assistance law enforcement act u.s. telecommunications providers required install packet capture technology federal law enforcement intelligence agencies able intercept customers broadband internet voice internet protocol voip traffic far much data gathered packet sniffers human investigators manually search thus automated internet surveillance computers sift vast amount intercepted internet traffic filtering reporting investigators bits information interesting example use certain words phrases visiting certain types web sites communicating via email chat certain individual group billions dollars per year spent agencies information awareness office nsa fbi development purchase implementation operation systems intercept analyze data extracting information useful law enforcement intelligence agencies similar systems used iranian secret police identify suppress dissidents technology allegedly installed german siemens ag finnish nokia internet rapid development become primary form communication people potentially subject internet surveillance advantages disadvantages network monitoring instance systems described web 2.0 greatly impacted modern society tim ’ reilly first explained concept web 2.0 stated web 2.0 provides communication platforms user generated self-produced content motivating people communicate friends online however internet surveillance also disadvantage one researcher uppsala university said web 2.0 surveillance directed large user groups help hegemonically produce reproduce surveillance providing user-generated self-produced content characterize web 2.0 surveillance mass self-surveillance surveillance companies monitor people focused work entertainment yet employers also monitor employees order protect company assets control public communications importantly make sure employees actively working productive emotionally affect people cause emotions like jealousy research group states ... set test prediction feelings jealousy lead ‘ creeping ’ partner facebook women particularly likely engage partner monitoring response jealousy study shows women become jealous people online group virtual assistant become social integration lives currently virtual assistant amazon alexa call 911 local services constantly listening command recording parts conversations help improve algorithms law enforcement able called using virtual assistant law enforcement would able access information saved device device connected home internet law enforcement would exact location individual calling law enforcement virtual assistance devices popular many debate lack privacy devices listening every conversation owner even owner talking virtual assistant device still listening conversation hopes owner need assistance well gather data corporate surveillance computer activity common data collected often used marketing purposes sold corporations also regularly shared government agencies used form business intelligence enables corporation better tailor products and/or services desirable customers data also sold corporations use aforementioned purpose used direct marketing purposes targeted advertisements ads targeted user search engine analyzing search history emails use free webmail services kept database one important component prevention establishing business purposes monitoring may include following second component prevention determining ownership technology resources ownership firm networks servers computers files e-mail explicitly stated distinction employee personal electronic devices limited proscribed owned firm instance google search stores identifying information web search ip address search phrase used stored database 18 months google also scans content emails users gmail webmail service order create targeted advertising based people talking personal email correspondences google far largest internet advertising agency—millions sites place google advertising banners links websites order earn money visitors click ads page containing google advertisements adds reads modifies cookies visitor computer cookies track user across sites gather information web surfing habits keeping track sites visit sites information along information email accounts search engine histories stored google use build profile user deliver better-targeted advertising united states government often gains access databases either producing warrant simply asking department homeland security openly stated uses data collected consumer credit direct marketing agencies augmenting profiles individuals monitoring addition monitoring information sent computer network also way examine data stored computer hard drive monitor activities person using computer surveillance program installed computer search contents hard drive suspicious data monitor computer use collect passwords and/or report back activities real-time operator internet connection keylogger example type program normal keylogging programs store data local hard drive programmed automatically transmit data network remote computer web server multiple ways installing software common remote installation using backdoor created computer virus trojan tactic advantage potentially subjecting multiple computers surveillance viruses often spread thousands millions computers leave backdoors accessible network connection enable intruder remotely install software execute commands viruses trojans sometimes developed government agencies cipav magic lantern often however viruses created people spyware installed marketing agencies used gain access security breaches create another method cracking computer gain access network attacker install surveillance software remotely servers computers permanent broadband connections vulnerable type attack another source security cracking employees giving information users using brute force tactics guess password one also physically place surveillance software computer gaining entry place computer stored install compact disc floppy disk thumbdrive method shares disadvantage hardware devices requires physical access computer one well-known worm uses method spreading stuxnet one common form surveillance create maps social networks based data social networking sites well traffic analysis information phone call records nsa call database internet traffic data gathered calea social network maps data mined extract useful information personal interests friendships affiliations wants beliefs thoughts activities many u.s. government agencies defense advanced research projects agency darpa national security agency nsa department homeland security dhs currently investing heavily research involving social network analysis intelligence community believes biggest threat u.s. comes decentralized leaderless geographically dispersed groups types threats easily countered finding important nodes network removing requires detailed map network jason ethier northeastern university study modern social network analysis said following scalable social network analysis program developed information awareness office shown possible monitor computers distance commercially available equipment detecting radiation emitted crt monitor form computer surveillance known tempest involves reading electromagnetic emanations computing devices order extract data distances hundreds meters ibm researchers also found computer keyboards key emits slightly different noise pressed differences individually identifiable conditions possible log key strokes without actually requiring logging software run associated computer 2015 lawmakers california passed law prohibiting investigative personnel state force businesses hand digital communication without warrant calling electronic communications privacy act time california state senator jerry hill introduced bill making law enforcement agencies disclose information usage information stingray phone tracker device law took effect january 2016 require cities operate new guidelines relation law enforcement use device legislators holding public office disagreed technology warrantless tracking city wants use device must heard public hearing cities pulled using stingray santa clara county also shown adi shamir et al. even high frequency noise emitted cpu includes information instructions executed policeware software designed police citizens monitoring discussion interaction citizens within u.s. carnivore first incarnation secretly installed e-mail monitoring software installed internet service providers networks log computer communication including transmitted e-mails magic lantern another application time running targeted computer trojan style performing keystroke logging cipav deployed fbi multi-purpose spyware/trojan clipper chip formerly known myk-78 small hardware chip government install phones designed nineties intended secure private communication data reading voice messages encoded decode clipper chip designed clinton administration “ …protect personal safety national security developing information anarchy fosters criminals terrorists foreign foes. ” government portrays solving secret codes cryptographic age technology created thus raised controversy public clipper chip thought next “ big brother ” tool led failure clipper proposal even though many attempts consumer broadband digital television promotion act cbdtpa bill proposed united states congress cbdtpa known security systems standards certification act sssca draft form killed committee 2002 cbdtpa become law would prohibited technology could used read digital content copyright music video e-books without digital rights management drm prevented access material without permission copyright holder german-speaking countries spyware used made government sometimes called govware countries like switzerland germany legal framework governing use software known examples include swiss minipanzer megapanzer german r2d2 trojan surveillance censorship different surveillance performed without censorship harder engage censorship without form surveillance even surveillance lead directly censorship widespread knowledge belief person computer use internet surveillance lead self-censorship march 2013 reporters without borders issued special report internet surveillance examines use technology monitors online activity intercepts electronic communication order arrest journalists citizen-journalists dissidents report includes list state enemies internet bahrain china iran syria vietnam countries whose governments involved active intrusive surveillance news providers resulting grave violations freedom information human rights computer network surveillance increase countries report also includes second list corporate enemies internet amesys france blue coat systems u.s. gamma uk germany hacking team italy trovicor germany companies sell products liable used governments violate human rights freedom information neither list exhaustive likely expanded future protection sources longer matter journalistic ethics journalists equip digital survival kit exchanging sensitive information online storing computer hard-drive mobile phone individuals associated high-profile rights organizations dissident groups protest groups reform groups urged take extra precautions protect online identities
Computer security
ole db provider ole db provider software component ole db api designed microsoft enables ole db consumer interact data source ole db providers analogous odbc drivers jdbc drivers ado.net data providers ole db providers created access simple data stores text file spreadsheet complex databases oracle microsoft sql server sybase ase many others also provide access hierarchical data stores email systems however different data store technologies different capabilities every ole db provider implement every possible interface available ole db standard capabilities available implemented use com objects ole db provider map data store technologies functionality particular com interface microsoft describes availability interface provider-specific may applicable depending data store technology involved note also providers may augment capabilities data store capabilities known services microsoft parlance example microsoft ships ole db providers part mdac jet kits simba technologies ships simbaprovider sdk used build custom ole db olap providers multi-dimensional star schema database connectivity openlink software ships components supporting ole db access number data sources including several sql dbms well bridges odbc- jdbc-accessible data sources
Operating systems
mstar mstar semiconductor inc. taiwanese fabless semiconductor company specializing mixed-mode integrated circuit technologies based hsinchu hsien mstar made hardware multimedia wireless communications form display ics mixed-mode i.e combining analog digital functions asic/ips addition chip sets gsm mobile handsets mstar employed approx 1300 10 branches worldwide company revenue around us 1067 million 2010 growth substantial revenue 2005 us 175 million mstar listed taiwan stock exchange code 3697 mstar often referred little-m chinese community contrary part bigger semiconductor company big-m a.k.a mediatek mstar spin-off 2-1 stock split system general technology may 2002 power ic product line stayed system general technology employees display rfid product lines transferred new spin-off spin-off 1-2 stock swap taken exchange two companies back corresponding shareholders chairman mstar wayne liang 梁公偉 steve yang 楊偉毅 president co-founder 2004 involved court case ruling international trade commission itc mstar semiconductor found guilty infringing patent held genesis microchip method improve images liquid-crystal-display lcd monitors flat screen tvs 22 june 2012 mediatek inc. announced purchased 212 million 254 million shares mstar 40 48 outstanding shares 0.794 mediatek shares nt 1 cash per mstar share
Computer architecture
amiga old file system amiga old file system filesystem amigaos amiga fast file system even though used 512-byte blocks reserved first small portion block metadata leaving actual data block capacity 488 bytes per block n't suitable anything except floppy disks soon replaced originally known amiga file system came filesystem tripos formed basis first versions amigados received nickname old original file system fast file system released amigaos 1.3 ofs good repairing filesystem event problem although so-called diskdoctor provided commodore quickly earned name diskdestroyer could repair no-dos type autostart disks provided third-party software manufacturers bootable disks games idea create non-standard autobootable disks born primitive attempt prevent copy disks avoid loading launch amiga dos order directly access amiga graphic audio memory chipsets diskdoctor fact changed autostart disks bootblocks standard amigados-based ones renaming disk lazarus namedisk made autostart disk unusable amiga uses mfm encoding/decoding default handling floppy disks 80 cylinders amiga floppy disk cylinder 2 mfm tracks one side disk double density dd disks 11 sectors per mfm track high density hd disks 22 sectors geometry amiga floppy disk follows dd disk 11 2 80 1760 0 1759 blocks hd disk 22 2 80 3520 blocks amiga stores 880 kib dd disk 1760 kib hd floppy disk prior amigaos 3.5 amigados file handles maintained 32-bit wide offset parameter unsigned telling start next read write operation biggest size single amiga file operating systems therefore comes 2 4 gib amiga os 3.5 file handles may reference 2 16 eib files however ofs-formatted disks continue retain 32-bit limitations intrinsic limitation format recorded media ofs datablock stores block size bsize-24 bytes i.e normally 488 bytes frequently used bsize 512 bytes rootblock located physical middle media block number 880 dd disks block 1760 hds helps minimize seek times exact calculation stored follows rootblock contains information disk name formatting date etc also contains information accessing files/directories/links located uppermost root directory characters '/ forbidden file volume names |^+ =\- letters diacritical marks like âè allowed date fields root block blocks structured form days mins ticks days field contains number days since january 1 1978 mins number minutes passed since midnight ticks expressed 1/50s second day value zero considered illegal programs since days value stored 32-bit number amiga filesystem inherent year 2000 problem year 2038 problem reach file directory link amigados uses hash function calculate 32-bit word disk block use pointer hash bucket list turn contains file directory link record bucket list used support filesystem objects names hash offset example file_1a file_24 file_5u hash value filename characters lowercase uppercase case sensitive accessed say myfile myfile directory refer file files composed file header block contains information file size last access time data block pointers etc data blocks contain actual data file header block contains bsize/4-56 data block pointers amounts 72 entries usual 512 byte blocks file larger file extension blocks allocated hold data block pointers file extension blocks organised linked list starts file header block 'extension field
Computer file systems
linux phone standards forum linux phone standards forum lips forum consortium group companies create standards use linux mobile devices main goal lips forum create application programming interfaces apis allow developers build applications inter-operate across linux handsets made manufacturers founding members include arm ltd cellon esmertec france telecom telecom italia fsm labs huawei jaluna mizi research montavista software open-plug palmsource march 2007 palmsource changed name parent company access inc newer members include texas instruments trolltech asa movial oy british telecom joined lips forum september 2007 september 2007 lips forum announced going align efforts open mobile alliance june 2008 lips forum announced would join limo foundation thereby cease exist separate organization
Operating systems
round-robin dns round-robin dns technique load distribution load balancing fault-tolerance provisioning multiple redundant internet protocol service hosts e.g. web server ftp servers managing domain name system dns responses address requests client computers according appropriate statistical model simplest implementation round-robin dns works responding dns requests single potential ip address one list potential ip addresses corresponding several servers host identical services order ip addresses list returned basis term round robin dns response ip address sequence list permuted usually basic ip clients attempt connections first address returned dns query different connection attempts clients would receive service different providers thus distributing overall load among servers standard procedure deciding address used requesting application resolvers attempt re-order list give priority numerically closer networks desktop clients try alternate addresses connection timeout 30–45 seconds round-robin dns often used load balance requests number web servers example company one domain name three identical copies web site residing three servers three different ip addresses one user accesses home page sent first ip address second user accesses home page sent next ip address third user sent third ip address case ip address given goes end list fourth user therefore sent first ip address forth round-robin dns name rare occasions referred rotor due rotation alternative records although easy implement round-robin dns number drawbacks arising record caching dns hierarchy well client-side address caching reuse combination difficult manage round-robin dns solely relied upon service availability service one addresses list fails dns continue hand address clients still attempt reach inoperable service also may best choice load balancing since merely alternates order address records time name server queried consideration transaction time server load network congestion etc round-robin dns load balancing works best services large number uniformly distributed connections servers equivalent capacity otherwise load distribution methods exist overcome limitations example modified dns servers lbnamed routinely poll mirrored servers availability load factor server reply required server temporarily removed dns pool reports operating within specs
Computer architecture
compaq presario c502tu compaq presario c502tu notebook computer presario c500 series first produced 2007 series design based compaq presario c300 series compaq presario c500 notebook pc series specifications
Computer architecture
courage foundation courage foundation trust fundraising legal defence individuals whistleblowers journalists founded august 9 2013 'journalistic source protection defence fund wikileaks site later rebranded june 2014 trust accepts donations bitcoin maintains tor hidden service individuals supported trust advisers include pentagon papers military analyst daniel ellsberg former nsa executive thomas drake former mi5 british intelligence officer whistleblower annie machon member chaos computer club andy müller-maguhn guatemala human rights lawyer renata avila pussy riot courage trustees renata avila susan benn john pilger dame vivienne westwood courage acting director wikileaks member sarah harrison
Computer security
list augmented browsing software
Web technology
centerpos malware centerpos also known cerebrus point sale pos malware discovered cyber security experts discovered september 2015 along kinds pos malware newposthings blackpos alina two versions released developer responsible version 1.7 version 2.0 centerpos 2.0 similar functionality centerpos version 1.7 2.0 variant centerpos malware added effective features addition configuration file storing information command control server centerpos used target retailers order illegally obtain payment card information using memory scraper uses two distinct modes scrape store information smart scan normal scan normal scan mode malware looks processes device determines ones currently running processes named system system idle process idle contain keywords microsoft mozilla process meets criteria list malware search memory regions within process searching credit card data regular expressions regular expression list smart scan mode malware starts performing normal scan process regular expression match added smart scan list first pass malware search processes smart scan list malware contains functionality allows cybercriminals create configuration file centerpos malware searches configuration file contains c c information unable find configuration file asks password password entered correct payloads functions create configuration file malware different point sale system malware separate component called builder create payload centerpos malware looks credit debit card information smart scan mode encrypts scraped data using triple des encryption memory scraped data sent operator malware separate http post request
Computer security
split-brain computing split-brain computer term based analogy medical split-brain syndrome indicates data availability inconsistencies originating maintenance two separate data sets overlap scope either servers network design failure condition based servers communicating synchronizing data last case also commonly referred network partition although term split-brain typically refers error state split-brain dns split-horizon dns sometimes used describe deliberate situation internal external dns services corporate network communicating separate dns name spaces administered external computers internal ones requires double administration domain overlap computer names risk fully qualified domain name fqdn may ambiguously occur name spaces referring different computer ip addresses high-availability clusters usually use heartbeat private network connection used monitor health status node cluster example split-brain syndrome may occur private links go simultaneously cluster nodes still running one believing one running data sets cluster may randomly serve clients idiosyncratic data set updates without coordination data sets may lead data corruption data inconsistencies might require operator intervention cleanup davidson et al. surveying several approaches handle problem classify either optimistic pessimistic optimistic approaches simply let partitioned nodes work usual provides greater level availability cost sacrificing correctness problem ended automatic manual reconciliation might required order cluster consistent state one current implementation approach hazelcast automatic reconciliation key-value store pessimistic approaches sacrifice availability exchange consistency network partitioning detected access sub-partitions limited order guarantee consistency typical approach described coulouris et al. use quorum-consensus approach allows sub-partition majority votes remain available remaining sub-partitions fall auto-fencing mode one current implementation approach one used mongodb replica sets another implementation galera replication mariadb mysql modern commercial general-purpose ha clusters typically use combination heartbeat network connections cluster hosts quorum witness storage challenge two-node clusters adding witness device adds cost complexity even implemented cloud without heartbeat fails cluster members determine active clusters without quorum member fails even members normally assign primary secondary statuses hosts least 50 probability 2-node ha cluster totally fail human intervention provided prevent multiple members becoming active independently either directly conflicting corrupting data
Computer architecture
android nougat android nougat codenamed android n development seventh major version 14th original version android operating system first released alpha test version march 9 2016 officially released august 22 2016 nexus devices first receive update lg v20 first smartphone released nougat nougat introduces notable changes operating system development platform including ability display multiple apps on-screen split-screen view support inline replies notifications expanded doze power-saving mode restricts device functionality screen period time additionally platform switched openjdk-based java environment received support vulkan graphics rendering api seamless system updates supported devices nougat received positive reviews new app notification format received particular praise multitasking interface seen positive change reviewers experienced incompatible apps critics mixed experiences doze power-saving mode faster app installs tweaks user interface also reviewed positively 19.2 devices access google play run nougat 11.4 android 7.0 api 24 7.8 android 7.1 api 25 release internally codenamed new york cheesecake march 9 2016 ahead google i/o developer conference google released first alpha version android n part new android beta program intended testing developers enthusiasts official release summer developer preview builds compatible current google nexus devices 5x 6p 6 9 pixel c nexus player android beta program introduced allows testers opt-in over-the-air updates new beta versions released april 13 2016 android n beta preview 2 released google discussed android n i/o keynote may 18 2016 unveiled new virtual reality platform daydream beta preview 3 first preview release deemed suitable wider public beta testing released time google also announced would hold contest determine official release name operating system beta preview 4 released june 15 2016 june 30 2016 google announced n release name would nougat also confirmed nougat would version 7.0 android final beta preview 5 released july 18 2016 android 7.0 officially released august 22 2016 nexus 6 5x 6p 9 nexus player pixel c first devices receive update dave burke android vice president engineering stated august 2016 updates nougat would released quarterly maintenance releases focusing continued refinements polish september 6 2016 lg announced v20 first smartphone ship nougat pre-installed google unveiled first-party pixel pixel xl smartphones hardware-focused event october 4 2016 pixel phones replacing nexus series updates existing devices vary manufacturer carrier driver support version manufacturer device respective system-on-chip major manufacturers including htc sony motorola announced intents update range recent devices nougat qualcomm stated would support nougat devices using snapdragon 800 801 system-on-chips undisclosed reasons although developer preview builds nougat released device sony stated would upgrade xperia z3 uses snapdragon 801 final version due unforeseen platform limitations reported google compatibility test suite whose tests must passed order receive official certification specified devices running nougat must support either vulkan opengl es 3.1 graphics apis — neither supported device adreno 330 graphics core none less fairphone 2 purported device qualcomm snapdragon 801 chipset provide official support android 7.1.2. delivering effort towards increased longevity sustainable device post-release update known android 7.1 pre-loaded onto google pixel pixel xl smartphones released october 2016 new version adds support google daydream vr platform image keyboards expanded emoji support including male female versions support actions displayed menus home screen app shortcuts new features preview 7.1 existing nexus devices released via android beta program later month officially released android 7.1.1 december 5 2016 7.1.1 nexus 6 nexus 9 considered end-of-life receive updates android 7.1.2 released april 2017 providing various improvements minor functionality improvements nexus pixel-branded devices nougat redesigns notification shade features smaller row icons settings replacing notification cards new sheet design allowing inline replies notifications multiple notifications single app also bundled greater per-app control notifications split-screen display mode introduced phones two apps snapped occupy halves screen experimental multi-window mode also available hidden feature multiple apps appear simultaneously screen overlapping windows doze power saving mechanism introduced android marshmallow expanded include state activated device running battery screen period time stationary state network activity restricted apps granted maintenance windows access network perform background tasks marshmallow full doze state activated device stationary screen period time new data saver mode restricts background mobile data usage trigger internal functions apps designed reduce bandwidth usage capping quality streaming media december 2015 google announced android nougat would switch java runtime environment defunct apache harmony openjdk—the official open source implementation java platform maintained oracle corporation java community android runtime art incorporates profile-guided compilation system utilizing jit compiler profiling alongside current ahead-of-time compiler optimize apps device hardware conditions background nougat introduces system enabling seamless automatic system updates based upon sharing code implementation similar functionality chrome os system uses pair squashfs partitions android system executes online partition updates applied background redundant offline partition next boot following installation update redundant partition designated active device henceforth boots updated system previous system partition kept backup case update failure serve offline partition next update system removes requirement device reboot system recovery environment apply update prevents device used update complete also provides ability update automatically rolled back case failure google chose enable seamless updates devices shipped nougat later rather enabling earlier devices support feature repartitioning additionally due art changes nougat apps longer need re-compiled upon first boot system update developer preview 2 added platform support vulkan new low-level 3d-rendering api alternative opengl es higher graphics performance nougat first version featuring unicode 9.0 support comes updated emoji plus support emoji skin tones android 7.1 adds native api support implementing image keyboards multi-endpoint telephony shortcut menus rounded icon assets apps launchers support google daydream virtual reality platform daydream environment includes sustained performance mode assist developers optimizing apps device thermal profile new head tracking algorithm combines input various device sensors integration system notifications vr user interface response stagefright family bugs disclosed fixed 2015 several changes made harden media stack future vulnerabilities runtime integer overflow detection implemented preventing majority stagefright-like programming bugs becoming vulnerabilities addition helping fix prevent bugs android monolithic mediaserver process redesigned better adhere principle least privilege mediaserver split several separate processes running unprivileged sandbox granted permissions required task example audioserver access bluetooth libstagefright runs within mediacodecservice sandbox granted gpu access constraints placed media stack seccomp various mechanisms enabled reduce possibility malicious code injected and/or executed inside linux kernel including dividing kernel memory logical segments code data page access permissions read-only no-execute appropriate kernel also restricted directly accessing user space memory stronger stack protection enabled gcc compiler reduce stack smashing limit exposure kernel potentially malicious code perf disabled default ioctl commands restricted selinux seccomp-bpf enabled grant processes ability restrict system calls devices shipping android nougat verified boot policy introduced partially kitkat displaying notifications startup marshmallow must strictly enforced system files corrupted otherwise modified operating system allow operation limited-use mode refuse boot dieter bohn verge praised new multitasking interface android nougat calling long overdue android tablets although initially found implementation confusing wrote worked well understood properly though noted apps ’ fully support split screen others work fine pop warning anyway bohn also liked new way reply message notification stating android long advantage useful consistent notifications versus ios added quick replies standard n't see lead diminishing also noted tweaks throughout os welcome changes including quick toggles notification drawer settings menu visual information camera app cleaned bit bohn stated n't notice significant battery improvements despite doze power-saving feature nougat also wrote extensively fact even though nougat great ’ shame take long anybody see writing lack updates android devices unless nexus could months could becomes available phone chris velazco engadget also praised new bundled app notifications writing prior android versions notifications sort sit interaction nougat much better job bundling app letting get things done highlighted ability expand bundled gmail notification see subjects senders individual messages velazco stated split-screen multitasking big deal also encountered non-compatible apps visual elements settings app quick toggles notification dropdown new language emoji support also positive highlights review velazco note battery improvement doze power-saving feature stating nexus 6p seemed gain hour two standby battery life also wrote installing launching apps might little faster usual thanks nougat new app compiler hoped game developers utilize new vulkan api seriously good-looking mobile gaming
Operating systems
ruby programming language ruby interpreted high-level general-purpose programming language designed developed mid-1990s yukihiro matz matsumoto japan ruby dynamically typed uses garbage collection supports multiple programming paradigms including procedural object-oriented functional programming according creator ruby influenced perl smalltalk eiffel ada basic lisp matsumoto said ruby conceived 1993 1999 post ruby-talk mailing list describes early ideas language matsumoto describes design ruby like simple lisp language core object system like smalltalk blocks inspired higher-order functions practical utility like perl name ruby originated online chat session matsumoto keiju ishitsuka february 24 1993 code written language initially two names proposed coral ruby matsumoto chose latter later e-mail ishitsuka matsumoto later noted factor choosing name ruby – birthstone one colleagues first public release ruby 0.95 announced japanese domestic newsgroups december 21 1995 subsequently three versions ruby released two days release coincided launch japanese-language ruby-list mailing list first mailing list new language already present stage development many features familiar later releases ruby including object-oriented design classes inheritance mixins iterators closures exception handling garbage collection following release ruby 0.95 1995 several stable versions ruby released following years 1997 first article ruby published web year matsumoto hired netlab.jp work ruby full-time developer 1998 ruby application archive launched matsumoto along simple english-language homepage ruby 1999 first english language mailing list ruby-talk began signaled growing interest language outside japan year matsumoto keiju ishitsuka wrote first book ruby object-oriented scripting language ruby オブジェクト指向スクリプト言語 ruby published japan october 1999 would followed early 2000s around 20 books ruby published japanese 2000 ruby popular python japan september 2000 first english language book programming ruby printed later freely released public widening adoption ruby amongst english speakers early 2002 english-language ruby-talk mailing list receiving messages japanese-language ruby-list demonstrating ruby increasing popularity non-japanese speaking world ruby 1.8 initially released august 2003 stable long time retired june 2013 although deprecated still code based ruby 1.8 partially compatible ruby 1.9 ruby 1.8 subject several industry standards language specifications ruby developed open standards promotion center information-technology promotion agency japanese government agency submission japanese industrial standards committee jisc international organization standardization iso accepted japanese industrial standard jis x 3017 2011 international standard iso/iec 30170 2012 around 2005 interest ruby language surged tandem ruby rails web framework written ruby rails frequently credited increasing awareness ruby ruby 1.9 released christmas day 2007 effective ruby 1.9.3 released october 31 2011 ruby switched dual-licensed ruby license gpl dual-licensed ruby license two-clause bsd license adoption 1.9 slowed changes 1.8 required many popular third party gems rewritten ruby 1.9 introduces many significant changes 1.8 series examples ruby 1.9 obsolete since february 23 2015 longer receive bug security fixes users advised upgrade recent version ruby 2.0 added several new features including ruby 2.0 intended fully backward compatible ruby 1.9.3 official 2.0.0 release february 24 2013 five known minor incompatibilities obsolete since february 22 2016 longer receive bug security fixes users advised upgrade recent version ruby 2.1.0 released christmas day 2013 release includes speed-ups bugfixes library updates starting 2.1.0 ruby versioning policy like semantic versioning although similar ruby versioning policy compatible semantic versioning semantic versioning also provides additional labels pre-release build metadata available extensions major.minor.patch format available ruby ruby 2.1 obsolete since april 1 2017 longer receive bug security fixes users advised upgrade recent version ruby 2.2.0 released christmas day 2014 release includes speed-ups bugfixes library updates removes deprecated apis notably ruby 2.2.0 introduces changes memory handling incremental garbage collector support garbage collection symbols option compile directly jemalloc also contains experimental support using vfork 2 system spawn added support unicode 7.0 specification features made obsolete removed include callcc dl library digest :hmac lib/rational.rb lib/complex.rb gserver logger :application well various c api functions ruby 2.3.0 released christmas day 2015 notable changes include 2.3 branch also includes many performance improvements updates bugfixes including changes proc call socket io use exception keywords thread name handling default passive net :ftp connections rake removed stdlib ruby 2.4.0 released christmas day 2016 notable changes include 2.4 branch also includes performance improvements hash table array max array min instance variable access ruby 2.5.0 released christmas day 2017 notable changes include top come lot performance improvements like faster block passing 3 times faster faster mutexes faster erb templates improvements concatenation methods ruby 2.6.0 released christmas day 2018 notable changes include matsumoto said ruby designed programmer productivity fun following principles good user interface design google tech talk 2008 matsumoto stated hope see ruby help every programmer world productive enjoy programming happy primary purpose ruby language stresses systems design needs emphasize human rather computer needs ruby said follow principle least astonishment pola meaning language behave way minimize confusion experienced users matsumoto said primary design goal make language enjoyed using minimizing programmer work possible confusion said applied principle least astonishment design ruby nevertheless phrase come closely associated ruby programming language phrase source surprise novice users may take mean ruby behaviors try closely match behaviors familiar languages may 2005 discussion newsgroup comp.lang.ruby matsumoto attempted distance ruby pola explaining design choice surprising someone uses personal standard evaluating surprise personal standard remains consistent would surprises familiar standard matsumoto defined way interview ruby object-oriented every value object including classes instances types many languages designate primitives integers booleans null variables always hold references objects every function method methods always called object methods defined top level scope become methods object class since class ancestor every class methods called object also visible scopes effectively serving global procedures ruby supports inheritance dynamic dispatch mixins singleton methods belonging defined single instance rather defined class though ruby support multiple inheritance classes import modules mixins ruby described multi-paradigm programming language allows procedural programming defining functions/variables outside classes makes part root 'self object object orientation everything object functional programming anonymous functions closures continuations statements values functions return last evaluation support introspection reflection metaprogramming well support interpreter-based threads ruby features dynamic typing supports parametric polymorphism according ruby faq syntax similar perl semantics similar smalltalk differs greatly python syntax ruby broadly similar perl python class method definitions signaled keywords whereas code blocks defined keywords braces contrast perl variables obligatorily prefixed sigil used sigil changes semantics scope variable practical purposes distinction expressions statements line breaks significant taken end statement semicolon may equivalently used unlike python indentation significant one differences python perl ruby keeps instance variables completely private class exposes accessor methods codice_11 codice_12 etc. unlike getter setter methods languages like c++ java accessor methods ruby created single line code via metaprogramming however accessor methods also created traditional fashion c++ java invocation methods require use parentheses trivial change instance variable full function without modifying single line calling code refactoring achieving similar functionality c vb.net property members python property descriptors similar come tradeoff development process one begins python using publicly exposed instance variable later changes implementation use private instance variable exposed property descriptor code internal class may need adjusted use private variable rather public property ruby ’ design forces instance variables private also provides simple way declare codice_13 codice_14 methods keeping idea ruby one never directly accesses internal members class outside class rather one passes message class receives response see examples section samples code demonstrating ruby syntax ruby official distribution also includes codice_15 interactive command-line interpreter used test code quickly following code fragment represents sample session using codice_15 following examples run ruby shell interactive ruby shell saved file run command line typing codice_17 classic hello world example basic ruby code input conversions variety ways define strings ruby following assignments equivalent strings support variable interpolation following assignments equivalent produce raw strings constructing using array constructing using associative array ruby called hash statement two syntaxes creating code block code block passed method optional block argument many built-in methods arguments parameter-passing block closure computer science |closure creating anonymous function returning closure computer science |closures method yielding flow program control block provided calling time iterating enumerations arrays using blocks method codice_18 accept parameter block codice_18 method iterates member list performing function retaining aggregate analogous codice_20 function functional programming languages example first pass block receives 10 argument inject codice_21 1 first element array codice_22 returns 11 becomes codice_21 next pass added 3 get 14 added 5 third pass finally return 19 using enumeration block square numbers 1 10 using range invoke method item codice_24 synonym codice_25 following code defines class named codice_26 addition codice_27 usual constructor create new objects two methods one override codice_28 comparison operator codice_29 sort age override codice_30 method codice_31 format output codice_12 example metaprogramming ruby codice_33 defines getter setter methods instance variables codice_12 getter methods last evaluated statement method return value allowing omission explicit codice_35 statement preceding code prints three names reverse age order codice_26 constant reference codice_37 object ruby classes never closed methods always added existing class applies classes including standard built-in classes needed open class definition existing class new contents specified added existing contents simple example adding new method standard library codice_38 class adding methods previously defined classes often called monkey patch|monkey-patching performed recklessly practice lead behavior collisions subsequent unexpected results code scalability problems since ruby 2.0 possible use refinements reduce potentially negative consequences monkey-patching limiting scope patch particular areas code base exception raised codice_39 call optional message added exception exceptions also specified programmer alternatively exception instance passed codice_39 method last construct useful raising instance custom exception class featuring constructor takes one argument exceptions handled codice_41 clause clause catch exceptions inherit codice_42 flow control keywords used handling exceptions codice_43 codice_44 common mistake attempt catch exceptions simple rescue clause catch exceptions one must write catch particular exceptions also possible specify exception object made available handler clause alternatively recent exception stored magic global codice_45 several exceptions also caught ruby code programmatically modify run time program lifecycle phase |runtime aspects structure would fixed rigid languages class method definitions sort metaprogramming used write concise code effectively extend language example following ruby code generates new methods built-in codice_46 class based list colors methods wrap contents string html tag styled respective color generated methods could used like implement equivalent many languages programmer would write method codice_47 codice_48 codice_49 etc separately possible uses ruby metaprogramming include original ruby interpreter computer software |interpreter often referred ruby mri|matz ruby interpreter mri implementation written c uses ruby-specific virtual machine standardized retired ruby 1.8 ruby mri|implementation written c programming language |c single-pass interpreted language starting ruby 1.9 continuing ruby 2.x official ruby interpreter yarv yet another ruby vm implementation superseded slower virtual machine used previous releases mri number alternative implementations ruby including jruby rubinius mruby takes different approach jruby rubinius providing just-in-time compilation mruby also providing ahead-of-time compilation ruby three major alternate implementations ruby implementations include defunct ruby implementations maturity ruby implementations tends measured ability run ruby rails rails framework complex implement uses many ruby-specific features point particular implementation achieves goal called rails singularity reference implementation jruby rubinius able run rails unmodified production environment matsumoto originally ruby development bsd|4.3bsd -based sony news|sony news-os 3.x later migrated work sunos 4.x finally linux 1999 ruby known work across many different operating system including news-os sunos aix svr4 solaris operating system |solaris nec up-ux nextstep bsd linux classic mac os|mac os dos windows operating system |windows beos modern ruby versions implementations available many operating systems linux bsd solaris aix macos windows windows phone windows ce symbian os beos ibm rubygems ruby package manager ruby package called gem easily installed via command line gems libraries though exist applications integrated development environment|ides 10,000 ruby gems hosted rubygems.org many new existing ruby libraries hosted github service offers revision control|version control repository hosting git software |git ruby application archive hosted applications documentation libraries ruby programming maintained 2013 function transferred rubygems category ruby programming language category articles example ruby code category class-based programming languages category dynamic programming languages category dynamically typed programming languages category free software programmed c category iso standards category object-oriented programming languages category programming languages created 1995 category programming languages iso standard category scripting languages category software using bsd license category text-oriented programming languages category free compilers interpreters
Programming language topics
mikko hyppönen mikko hermanni hyppönen born 1969 finland computer security expert columnist known hypponen law iot security states whenever appliance described smart vulnerable mikko hyppönen chief research officer f-secure worked f-secure finland since 1991 hyppönen assisted law enforcement united states europe asia since 1990s cybercrime cases advises governments cyber crime team took sobig.f botnet 2004 hyppönen cooperated vanity fair feature code warrior examined role defeating blaster sobig computer worms hyppönen given keynotes presentations number conferences around world including black hat def con dld rsa addition data security events hyppönen delivered talks general-interest events ted tedx dld sxsw slush google zeitgeist also spoken various military events including afcea events nato ccd coe iccc hyppönen reserve officer finnish army hyppönen member advisory board impact international multilateral partnership cyber threats since 2007 together yevgeny kaspersky hamadoun touré fred piper john thompson hyppönen columnist betanews wired also written research cnn new york times scientific american 2011 ranked 61st foreign policy top 100 global thinkers report hyppönen coined term cybercrime unicorns describe cybercrime organizations worth billion us dollars reference startup unicorns hyppönen made international news 2011 tracked visited authors first pc virus history brain hyppönen produced documentary event documentary published youtube hyppönen also documenting rise mobile phone malware since first smartphone viruses found blog news lab started hyppönen 2004 first blog antivirus company hyppönen credited twitter improving twitter security mr. hyppönen curator malware museum internet archive since 2016
Computer security
salamander video game retitled north america japanese arcade re-release europe known life force salamander scrolling shooter arcade game konami released 1986 spin-off gradius salamander introduced simplified power-up system two-player cooperative gameplay horizontally vertically scrolling stages later became norm future gradius games salamander followed sequel 1996 titled salamander 2 first player controls vic viper second player takes reins debuting spacecraft lord british sometimes referred road british due ambiguity japanese-to-english romanization game features six stages alter horizontal vertical scrolling players allowed continue leave upon death instead returned predefined checkpoint per gradius tradition continues single player mode two two-player mode number continues changed dip switches player gains power-ups picking capsules left behind certain enemies opposed selection bar used gradius games however japanese version life force keeps selection bar many power-ups combined example option fires second third salvo missiles ripple/plutonic lasers power-ups attained ripple laser however mutually exclusive power-up survive ship destruction options upon ship destruction options float space brief time disappearing new ship grab retain arcade version game released original title japan europe life force north america japanese european versions nearly identical american version changes game plot adding opening text establishes game set inside giant alien life-form infected strain bacteria stages feature starfield backgrounds changed web background stage 1 maintain consistency organic setting plot power-ups also given different names speed-up becoming hyper speed missile becoming destruct missile ripple laser becoming pulse laser force field becoming shield narration added beginning stage detailing area alien body player currently inhabiting enter stomach muscle zone bio-mechanical brain attack konami later released enhanced version salamander japan 1987 bearing american title life force fleshes organic motif backgrounds mechanical enemies completely redrawn given organic appearances power-up system also modified japanese life force using power-up gauge original gradius music tracks completely changed release power-up gauge arranged differently players ocean software imagine label released licensed versions salamander computer systems spectrum commodore amstrad 1988 spectrum amstrad versions generally criticized commodore 64 version highly praised critics day particularly zzap 64 though missing two six stages simultaneous two player mode gameplay much easier arcade counterpart commodore port generally considered one best arcade conversions system salamander ported family computer japan 1987 instead direct port salamander elements taken original salamander japanese life force re-release elements levels bosses removed make way new content background graphics enemy sprites salamander used favor used life force though gradius -style power bar used place original instant pick-up system year north america received port well nintendo entertainment system nes version practically identical famicom equivalent multiple endings two option power ups instead three titled life force north america version later re-released virtual console february 16 2009 wii january 23 2014 nintendo 3ds august 21 2014 wii u european version titled life force salamander cover released november 22 1989 nes version makes use konami code increases number lives three 30 first two levels life force profiled second issue nintendo power issued 1988 several issues later entire game re-profiled msx port significantly different original ports new port graphical introduction introduces human pilots ship well names stage levels notably longer arcade original player forced start pre-defined checkpoint upon death either pilot instead starting left level two player choose order next three stages addition player collect e capsules destroying certain enemies collecting fifteen permanently upgrade one available weapons power-up bar weapons allow player ships merge one player controlling movements second player controlling weapons instead vic viper lord british space destroyer ships known sabel tiger thrasher piloted human characters named iggy rock zowie scott story takes place year 6709 a.d 2 different endings msx version re-released wii virtual console japan january 12 2010 later released wii u virtual console july 20 2016 also made available project egg windows store may 19 2015 version pc engine released december 6 1991 based arcade version salamander changes port include starting pre-defined checkpoint upon death 1 player mode faster enemy animations improved music japan pc engine version re-released wii virtual console september 11 2007 playstation network july 21 2010 wii u virtual console october 22 2014 also project egg con windows store march 3 2014 released north america november 16 2017 wii u virtual console compilation titled salamander deluxe pack plus released japan sega saturn june 19 1997 playstation july 6 year compilation includes salamander japanese version life force well salamander 2 salamander released mobile phones 2003 three arcade versions salamander american japanese adaptations life force ported arcade archives november 27 2015 japan exclusively playstation 4 later released worldwide spring 2016 published hamster corporation another compilation salamander series titled salamander portable released playstation portable january 24 2007 japan psp compilation features three games previously included salamander deluxe pack plus well xexex msx version gradius 2 a.k.a nemesis ii unrelated arcade game december 20 2010 application called pc engine game box published app store served portal download classic pc engine video games among downloadable titles pc engine version salamander fee arcade version included konami arcade classics anniversary collection released april 2019 digital-only format playstation 4 xbox one nintendo switch pc initially compilation japan salamander version game everywhere else featured american life force instead june 2019 konami added free japanese versions respective games western arcade classics anniversary collection salamander version played addition japanese life force part compilation conversely american version life force added collection japan update 1988 ova mini-series studio pierrot directed hisayuki toriumi three episodes released vhs laserdisc february 25 1988 february 21 1989 series licensed british company western connection series canon however msx gradius series states events gofer take place two-hundred year period following crisis zelos salamander armada mini-series revealed bacterians capture sentient life create leaders space armada capture sentient life via dark fog going space changes inorganic matter organic matter large brain-like final bosses games crystal-like life-form origin noriko hidaka provided voice protagonist stephanie anime lord british space destroyer named one protagonists ike lord british planet latis thus making lord british space destroyer
Computer architecture
blockchain blockchain originally block chain growing list records called blocks linked using cryptography block contains cryptographic hash previous block timestamp transaction data generally represented merkle tree design blockchain resistant modification data open distributed ledger record transactions two parties efficiently verifiable permanent way use distributed ledger blockchain typically managed peer-to-peer network collectively adhering protocol inter-node communication validating new blocks recorded data given block altered retroactively without alteration subsequent blocks requires consensus network majority although blockchain records unalterable blockchains may considered secure design exemplify distributed computing system high byzantine fault tolerance decentralized consensus therefore claimed blockchain blockchain invented person group people using name satoshi nakamoto 2008 serve public transaction ledger cryptocurrency bitcoin identity satoshi nakamoto unknown invention blockchain bitcoin made first digital currency solve double-spending problem without need trusted authority central server bitcoin design inspired applications blockchains readable public widely used cryptocurrencies blockchain considered type payment rail private blockchains proposed business use sources computerworld called marketing blockchains without proper security model snake oil first work cryptographically secured chain blocks described 1991 stuart haber w. scott stornetta wanted implement system document timestamps could tampered 1992 bayer haber stornetta incorporated merkle trees design improved efficiency allowing several document certificates collected one block first blockchain conceptualized person group people known satoshi nakamoto 2008 nakamoto improved design important way using hashcash-like method add blocks chain without requiring signed trusted party design implemented following year nakamoto core component cryptocurrency bitcoin serves public ledger transactions network august 2014 bitcoin blockchain file size containing records transactions occurred network reached 20 gb gigabytes january 2015 size grown almost 30 gb january 2016 january 2017 bitcoin blockchain grew 50 gb 100 gb size words block chain used separately satoshi nakamoto original paper eventually popularized single word blockchain 2016 smart contracts run blockchain example ones creat e invoices pay shipment arrives share certificates automatically send owners dividends profits reach certain level require off-chain oracle access external data events based time market conditions need interact blockchain according accenture application diffusion innovations theory suggests blockchains attained 13.5 adoption rate within financial services 2016 therefore reaching early adopters phase industry trade groups joined create global blockchain forum 2016 initiative chamber digital commerce may 2018 gartner found 1 cios indicated kind blockchain adoption within organisations 8 cios short-term 'planning looking active experimentation blockchain blockchain decentralized distributed public digital ledger used record transactions across many computers involved record altered retroactively without alteration subsequent blocks allows participants verify audit transactions independently relatively inexpensively blockchain database managed autonomously using peer-to-peer network distributed timestamping server authenticated mass collaboration powered collective self-interests design facilitates robust workflow participants uncertainty regarding data security marginal use blockchain removes characteristic infinite reproducibility digital asset confirms unit value transferred solving long-standing problem double spending blockchain described value-exchange protocol blockchain maintain title rights properly set detail exchange agreement provides record compels offer acceptance blocks hold batches valid transactions hashed encoded merkle tree block includes cryptographic hash prior block blockchain linking two linked blocks form chain iterative process confirms integrity previous block way back original genesis block sometimes separate blocks produced concurrently creating temporary fork addition secure hash-based history blockchain specified algorithm scoring different versions history one higher score selected others blocks selected inclusion chain called orphan blocks peers supporting database different versions history time time keep highest-scoring version database known whenever peer receives higher-scoring version usually old version single new block added extend overwrite database retransmit improvement peers never absolute guarantee particular entry remain best version history forever blockchains typically built add score new blocks onto old blocks given incentives extend new blocks rather overwrite old blocks therefore probability entry becoming superseded decreases exponentially blocks built top eventually becoming low example bitcoin uses proof-of-work system chain cumulative proof-of-work considered valid one network number methods used demonstrate sufficient level computation within blockchain computation carried redundantly rather traditional segregated parallel manner block time average time takes network generate one extra block blockchain blockchains create new block frequently every five seconds time block completion included data becomes verifiable cryptocurrency practically transaction takes place shorter block time means faster transactions block time ethereum set 14 15 seconds bitcoin 10 minutes storing data across peer-to-peer network blockchain eliminates number risks come data held centrally decentralized blockchain may use ad-hoc message passing distributed networking peer-to-peer blockchain networks lack centralized points vulnerability computer crackers exploit likewise central point failure blockchain security methods include use public-key cryptography public key long random-looking string numbers address blockchain value tokens sent across network recorded belonging address private key like password gives owner access digital assets means otherwise interact various capabilities blockchains support data stored blockchain generally considered incorruptible every node decentralized system copy blockchain data quality maintained massive database replication computational trust centralized official copy exists user trusted transactions broadcast network using software messages delivered best-effort basis mining nodes validate transactions add block building broadcast completed block nodes blockchains use various time-stamping schemes proof-of-work serialize changes alternative consensus methods include proof-of-stake growth decentralized blockchain accompanied risk centralization computer resources required process larger amounts data become expensive open blockchains user-friendly traditional ownership records open public still require physical access view early blockchains permissionless controversy arisen blockchain definition issue ongoing debate whether private system verifiers tasked authorized permissioned central authority considered blockchain proponents permissioned private chains argue term blockchain may applied data structure batches data time-stamped blocks blockchains serve distributed version multiversion concurrency control mvcc databases mvcc prevents two transactions concurrently modifying single object database blockchains prevent two transactions spending single output blockchain opponents say permissioned systems resemble traditional corporate databases supporting decentralized data verification systems hardened operator tampering revision nikolai hampton computerworld said many in-house blockchain solutions nothing cumbersome databases without clear security model proprietary blockchains eyed suspicion great advantage open permissionless public blockchain network guarding bad actors required access control needed means applications added network without approval trust others using blockchain transport layer bitcoin cryptocurrencies currently secure blockchain requiring new entries include proof work prolong blockchain bitcoin uses hashcash puzzles hashcash designed 1997 adam back original idea first proposed cynthia dwork moni naor eli ponyatovski 1992 paper pricing via processing combatting junk mail financial companies prioritised decentralized blockchains 2016 venture capital investment blockchain-related projects weakening usa increasing china bitcoin many cryptocurrencies use open public blockchains bitcoin highest market capitalization permissioned blockchains use access control layer govern access network contrast public blockchain networks validators private blockchain networks vetted network owner rely anonymous nodes validate transactions benefit network effect permissioned blockchains also go name 'consortium blockchains nikolai hampton pointed computerworld also need '51 percent attack private blockchain private blockchain likely already controls 100 percent block creation resources could attack damage blockchain creation tools private corporate server could effectively control 100 percent network alter transactions however wished set particularly profound adverse implications financial crisis debt crisis like financial crisis 2007–08 politically powerful actors may make decisions favor groups expense others bitcoin blockchain protected massive group mining effort unlikely private blockchain try protect records using gigawatts computing power — time consuming expensive also said within private blockchain also 'race incentive use power discover blocks faster competitors means many in-house blockchain solutions nothing cumbersome databases analysis public blockchains become increasingly important popularity bitcoin ethereum litecoin cryptocurrencies blockchain public provides anyone wants access observe analyse chain data given one know-how process understanding accessing flow crypto issue many cryptocurrencies crypto-exchanges banks reason accusations blockchain enabled cryptocurrencies enabling illicit dark market trade drugs weapons money laundering etc common belief cryptocurrency private untraceable thus leading many actors use illegal purposes changing specialised tech-companies provide blockchain tracking services making crypto exchanges law-enforcement banks aware happening crypto funds fiat crypto exchanges development argue led criminals prioritise use new cryptos monero question public accessibility blockchain data personal privacy data key debate cryptocurrency ultimately blockchain blockchain technology integrated multiple areas primary use blockchains today distributed ledger cryptocurrencies notably bitcoin operational products maturing proof concept late 2016 businesses thus far reluctant place blockchain core business structure cryptocurrencies use blockchain technology record transactions example bitcoin network ethereum network based blockchain 8 may 2018 facebook confirmed opening new blockchain group headed david marcus previously charge messenger according verge facebook planning launch cryptocurrency facilitating payments platform blockchain-based smart contracts proposed contracts could partially fully executed enforced without human interaction one main objectives smart contract automated escrow imf staff discussion reported smart contracts based blockchain technology might reduce moral hazards optimize use contracts general viable smart contract systems yet emerged due lack widespread use legal status unclear major portions financial industry implementing distributed ledgers use banking according september 2016 ibm study occurring faster expected banks interested technology potential speed back office settlement systems banks ubs opening new research labs dedicated blockchain technology order explore blockchain used financial services increase efficiency reduce costs berenberg german bank believes blockchain overhyped technology large number proofs concept still major challenges success stories blockchain game cryptokitties launched november 2017 game made headlines december 2017 cryptokitty character in-game virtual pet sold us 100,000 cryptokitties illustrated scalability problems games ethereum created significant congestion ethereum network 30 ethereum transactions game cryptokitties also demonstrated blockchains used catalog game assets digital assets specific token standards created support use blockchain gaming include erc-721 standard cryptokitties non-fungible tokens recent erc-1155 standard creation fungible e.g in-game currency non-fungible tokens e.g set rare armour blockchain use blockchain creation game assets provide advantages gamers include true ownership assets tied individual blockchain address rather accessed centralized game server transparency blockchain explorers used confirm total supply various game assets interoperability read decentralized public ledger blockchain assets open developers integrate game via blockchain choose number efforts industry organizations working employ blockchains supply chain logistics supply chain management blockchain transport alliance bita works develop open standards supply chains everledger one inaugural clients ibm blockchain-based tracking service walmart ibm running trial use blockchain-backed system supply chain monitoring — nodes blockchain administered walmart located ibm cloud hyperledger grid develops open components blockchain supply chain solutions blockchain technology used create permanent public transparent ledger system compiling data sales tracking digital use payments content creators wireless users musicians 2017 ibm partnered ascap prs music adopt blockchain technology music distribution imogen heap mycelia service also proposed blockchain-based alternative gives artists control songs associated data circulate among fans musicians new distribution methods available insurance industry peer-to-peer insurance parametric insurance microinsurance following adoption blockchain sharing economy iot also set benefit blockchains involve many collaborating peers online voting another application blockchain designs include currently least four types blockchain networks — public blockchains private blockchains consortium blockchains hybrid blockchains public blockchain absolutely access restrictions anyone internet connection send transactions well become validator i.e. participate execution consensus protocol usually networks offer economic incentives secure utilize type proof stake proof work algorithm largest known public blockchains bitcoin blockchain ethereum blockchain private blockchain permissioned one join unless invited network administrators participant validator access restricted hybrid blockchain simply explained combination different characteristics public private blockchains design allows users blockchain apis determine information stays private information made public decentralization relation primarily centralized private blockchains achieved various ways example instead keeping transactions inside network community run private nodes hash without payload posted completely decentralized blockchains bitcoin done automatically triggered thus providing historical transaction using signed hash allows users operate different blockchains selectively share data business logic blockchains like wanchain use interoperability mechanisms bridges submitting hash transaction without sensitive business logic public blockchains like bitcoin ethereum privacy blockchain concerns resolved personal identifiable information stored public blockchain depending hybrid blockchain architecture multicloud solutions allow store data compliance general data protection regulation geographical limitations also leveraging bitcoin global hashpower decentralize transactions october 2014 mit bitcoin club funding mit alumni provided undergraduate students massachusetts institute technology access 100 bitcoin adoption rates studied catalini tucker 2016 revealed people typically adopt technologies early given delayed access tend reject technology bank international settlements criticized public proof-of-work blockchains high energy consumption nicholas weaver international computer science institute university california berkeley examines blockchain online security energy efficiency proof-of-work public blockchains cases finds grossly inadequate september 2015 first peer-reviewed academic journal dedicated cryptocurrency blockchain technology research ledger announced inaugural issue published december 2016 journal covers aspects mathematics computer science engineering law economics philosophy relate cryptocurrencies bitcoin journal encourages authors digitally sign file hash submitted papers timestamped bitcoin blockchain authors also asked include personal bitcoin address first page papers non-repudiation purposes
Databases
professional file system professional file system filesystem originally developed commercially amiga distributed aminet 4-clause bsd license compatible successor amifilesafe afs emphasis added reliability speed compared standard amiga filesystems also features multi-user abilities like older mufs device split two main areas beginning device metadata section consists root block generic array blocks allocated store metadata rest device another contiguous generic array blocks allocated store data metadata section usually uses percent device depending size device metadata stored tree single blocks metadata section entire directory structure recorded metadata data section purely contains data files metadata describes location data files extents blocks makes metadata quite compact metadata update occurs system looks block containing metadata changed copies newly allocated block metadata section change made recursively changes metadata block points block way way eventually root block needs changed causes atomic metadata update filesystem reasonably good keeping files unfragmented although defragmentation tool available work online filesystem first filesystem introduce concept recycle bin natively filesystem-level amiga holding last deleted files hidden directory disk root pfs version 5.3 developed c small portion assembly code michiel pelt
Computer file systems
national cyber range national cyber range project overseen darpa build scale model internet used carry cyber war games project serves test range military create antivirus technologies guard cyberterrorism attacks hackers several organisations involved development network including johns hopkins university baltimore lockheed martin 500m allocated department defense develop cyber technologies
Computer security
reliable user datagram protocol computer networking reliable user datagram protocol rudp transport layer protocol designed bell labs plan 9 operating system aims provide solution udp primitive guaranteed-order packet delivery desirable tcp adds much complexity/overhead order rudp gain higher quality service rudp implements features similar tcp less overhead order ensure quality extends udp means adding following features rudp currently formal standard however described ietf internet-draft 1999 proposed standardization cisco signalling link terminals either standalone integrated another gateway uses rudp backhauling ss7 mtp3 isdn signaling versions mutually incompatible differ slightly ietf draft structure cisco session manager used top rudp also different microsoft introduced another protocol named r-udp used mediaroom product owned ericsson iptv service delivery multicast networks proprietary protocol little known operation thought based referenced ietf draft
Internet protocols
mulesoft mulesoft llc software company headquartered san francisco california provides integration software connecting applications data devices started 2006 company anypoint platform integration products designed integrate software service saas on-premises software legacy systems company originally provided middleware messaging later expanded provide integration platform service ipaas approach companies main product anypoint platform mulesoft anypoint platform includes various components anypoint design center allows api developers design build apis anypoint exchange library api providers share apis templates assets anypoint management center centralized web interface analyze manage monitor apis integrations mulesoft also offers mule runtime engine runtime solution connecting enterprise applications on-premises cloud designed eliminate need custom point-to-point integration code may 2 2018 salesforce acquired mulesoft 6.5 billion cash stock deal ross mason dave rosenberg founded mulesource 2006 company changed name mulesoft 2009 april 2013 startup announced 37 million series e financing round led new enterprise associates participation new strategic investor salesforce.com existing investors hummer winblad venture partners morgenthaler ventures lightspeed venture partners sapphire ventures formerly sap ventures bay partners round brought mulesoft total financing course seven funding rounds 259 million april 2013 mulesoft acquired programmableweb website used developers help build web mobile connected applications apis 2016 mulesoft ranked 20 forbes cloud 100 list february 2017 company filed ipo began trading new york stock exchange march 17 2017 stock rose 45 first day trading march 2018 salesforce.com announced buying mulesoft deal reported worth us 6.5b may 2018 salesforce completed acquisition mulesoft mule name comes drudgery donkey work data integration platform created escape august 2019 mulesoft 1,400 employees 1,600 customers
Distributed computing architecture