text
stringlengths 6
1.88M
| source
stringclasses 13
values |
---|---|
10th frame 10th frame ten-pin bowling simulation game created access software 1986 follow-up leaderboard golf game eight players could take part open bowling tournament choice 3 different difficulty levels—kids ball always went straight amateur professional lane viewed behind bowler pins towards top screen 3d perspective scorecard current player displayed lane player could move left right lane starting run-up holding fire target cursor could also moved pushing moving left right pressing returned control moving onscreen player position fire button held power meter similar leaderboard employed speed shot determined long button held small zone top determined player made error exaggerating spin meter started descend right stopped hook zone determine much hook/spin applied—from straight top zone full hook bottom play completed usual ten frames bonus balls animation used similar sprite system leaderboard falling pin physics handled well players could print scorecard end match game released various home computers zx spectrum amstrad cpc commodore 64 also released atari st msx nintendo entertainment system version planned eventually cancelled c vg reviewed commodore 64 version issue 65 called game month 9/10 score zzap 64 awarded game 85 issue 22 calling another slick extremely well programmed access sport simulation sinclair gave zx spectrum conversion 7 10 stating 10th frame requires lot skill pretty good simulation
|
Computer architecture
|
rebol rebol historically rebol cross-platform data exchange language multi-paradigm dynamic programming language designed carl sassenrath network communications distributed computing introduces concept dialecting small optimized domain-specific languages code data also notable property language according designer carl sassenrath douglas crockford known involvement development javascript described rebol modern language similar ideas lisp built upon representation data executable programs one json influences originally language official implementation proprietary closed source developed rebol technologies following discussion lawrence rosen rebol version 3 interpreter released apache 2.0 license december 12 2012 older versions available binary form source release planned rebol used program internet applications client- server-side database applications utilities multimedia applications rebol initially acronym relative expression based object language written caps align modern trends language naming represented e.g change replacing historical name lisp lisp programmers ceased practice writing rebol caps sassenrath eventually put naming question community debate blog subsequent writing sassenrath adopted convention writing language name rebol first released 1997 rebol designed 20-year period carl sassenrath architect primary developer amigaos based study denotational semantics using concepts programming languages lisp forth logo self one rebol design principles simple things simple ways following example visual interface dialect used describe simple hello world program graphical user interface similar example looks r3-gui rebol domain-specific languages called dialects micro-languages optimized specific purpose dialects used define business rules graphical user interfaces sequences screens installation program users define dialects reusing existing rebol word giving specific meaning dialect dialects interpreted functions processing rebol blocks parsing strings specific way example rebol dialecting abilities seen word codice_1 data exchange dialect codice_1 word specific meaning dialect codice_1 global variable referring native function passing back function result value visual interface dialect vid codice_1 keyword causing layout engine simulate carriage return moving rendering pen beginning next line rebol interpreter graphical abilities must understand interpret many dialects table lists important ones order significance rebol syntax free-form requiring specific positioning however indentation recommended better convey structure text human readers syntactic properties different dialects may differ common platform rebol dialects data exchange dialect dialects usually derived addition common platform dialects data exchange dialect directly used represent data metadata populate data structures send data internet save data storage contrast programming languages like c data exchange dialect consist declarations statements expressions keywords valid data exchange dialect text stream tree data structure consisting blocks root block implicit subblocks delimited square brackets parens delimited round brackets strings delimited double quotes curly brackets suitable multi-line strings caret notation used unprintable characters urls e-mail addresses files paths composite values unlike algol blocks rebol blocks composite values similar quoted s-expressions lisp fact code written form rebol blocks makes language homoiconic blocks well parens may contain composite values block may contain subblocks parens strings ... scalar values like words set-words words suffixed colon get-words words prefixed colon lit-words words prefixed apostrophe numbers money characters etc. separated whitespace note special characters allowed words codice_5 word unlike codice_6 sequence three words separated spaces comments may appear following semicolon end line multi-line comments comments ignored lexical parser written using ordinary datatypes like multi-line strings blocks containing domain-specific language submitted arguments specific evaluator functions frequently used evaluator codice_7 function used default interpret text input interpreter console dialect interpreted codice_7 function expression-oriented sublanguage data exchange dialect main semantic unit language expression contrast imperative programming languages descending algol dialect neither keywords statements words used case-insensitive variables like dynamically typed languages variables n't associated type type associated values result i.e evaluation word returned word encountered codice_7 function set-word form word used assignment statements assignment together functions side-effects used imperative programming subblocks root block evaluate property used handle data blocks structured programming submitting blocks arguments control functions like codice_10 codice_11 codice_12 etc. dialecting block passed specific interpreter function specific problem worth noting composite values assigned variables copied make copy value must passed codice_13 function codice_7 function normally follows prefix style evaluation function processes arguments follow however infix evaluation using infix operators exists infix evaluation takes precedence prefix evaluation example returns 1 since infix addition takes precedence computation absolute value evaluating infix expressions order evaluation left right operator takes precedence another example returns 20 evaluation giving precedence multiplication would yield 14 operators prefix versions codice_15 usually evaluates arguments passing function expression first reads wikipedia rebol page passes result codice_16 function parentheses used change order evaluation using prefix notation usage parentheses expressions avoided simple precedence rules advantage well disadvantage codice_17 function preferably used specify validate transform interpret dialects matching parse expressions run time parse expressions written parse dialect like dialect expression-oriented sublanguage data exchange dialect unlike dialect parse dialect uses keywords representing operators important nonterminals infix parsing operators n't prefix equivalents use precedence rules sequence higher precedence choice actions included taken parsing process well codice_17 function used process blocks strings string parsing level codice_17 must handle low level parsing taking account characters delimiters block parsing higher level handling scanning level rebol values parse dialect belongs family grammars represented top-down parsing language parsing expression grammar peg main similarity presence sequence choice operators family members parse dialect syntax similarities parse dialect peg illustrated transliteration peg example parses arithmetic expression official rebol 2.7.8 implementation available several editions /core /view /command /sdk /ios /core /view editions freely redistributable software runtime environment stored single executable file rebol/core 2.7.8 console edition 300 kb rebol/view 2.7.8 graphical user interface edition 650 kb size rebol/view provides platform-independent graphics sound access comes windowing toolkit extensible set styles gui widgets extended editions rebol/command 2.7.8 rebol/sdk 2.7.8 require paid license add features like odbc data access option create standalone executable files
|
Programming language topics
|
red hat red hat inc. american multinational software company providing open-source software products enterprise community founded 1993 red hat corporate headquarters raleigh north carolina offices worldwide became subsidiary ibm july 9 2019 red hat become associated large extent enterprise operating system red hat enterprise linux acquisition open-source enterprise middleware vendor jboss red hat also offers red hat virtualization rhv enterprise virtualization product red hat provides storage operating system platforms middleware applications management products support training consulting services red hat creates maintains contributes many free software projects acquired several proprietary software product codebases corporate mergers acquisitions released software open-source licenses red hat second largest corporate contributor linux kernel version 4.14 intel october 28 2018 ibm announced intent acquire red hat 34 billion acquisition closed july 9 2019 1993 bob young incorporated acc corporation catalog business sold linux unix software accessories 1994 marc ewing created linux distribution named red hat linux ewing worn red cornell university lacrosse hat given grandfather attending carnegie mellon university ewing released software october became known halloween release young bought ewing business 1995 two merged become red hat software young serving chief executive officer ceo red hat went public august 11 1999 achieving eighth-biggest first-day gain history wall street matthew szulik succeeded bob young ceo december year bob young went found online print demand self-publishing company lulu 2002 november 15 1999 red hat acquired cygnus solutions cygnus provided commercial support free software housed maintainers gnu software products gnu debugger gnu binutils one founders cygnus michael tiemann became chief technical officer red hat vice president open-source affairs later red hat acquired wirespeed c2net hell kitchen systems february 2000 infoworld awarded red hat fourth consecutive operating system product year award red hat linux 6.1 red hat acquired planning technologies inc 2001 aol iplanet directory certificate-server software 2004 red hat moved headquarters durham north carolina state university centennial campus raleigh north carolina february 2002 following month red hat introduced red hat linux advanced server later renamed red hat enterprise linux rhel dell ibm hp oracle corporation announced support platform december 2005 cio insight magazine conducted annual vendor value survey red hat ranked 1 value second year row red hat stock became part nasdaq-100 december 19 2005 red hat acquired open-source middleware provider jboss june 5 2006 jboss became division red hat september 18 2006 red hat released red hat application stack integrated jboss technology certified well-known software vendors december 12 2006 red hat stock moved trading nasdaq rhat new york stock exchange rht 2007 red hat acquired metamatrix made agreement exadel distribute software march 15 2007 red hat released red hat enterprise linux 5 june acquired mobicents march 13 2008 red hat acquired amentra provider systems integration services service-oriented architecture business process management systems development enterprise data services july 27 2009 red hat replaced cit group standard poor 500 stock index diversified index 500 leading companies u.s. economy reported major milestone linux december 15 2009 reported red hat pay settle class action lawsuit related restatement financial results july 2004 suit pending u.s. district court eastern district north carolina red hat reached proposed settlement agreement recorded one-time charge quarter ended nov. 30 january 10 2011 red hat announced would expand headquarters two phases adding 540 employees raleigh operation investing state north carolina offering incentives second phase involves expansion new technologies software virtualization technology cloud offerings august 25 2011 red hat announced would move 600 employees n.c. state centennial campus two progress plaza downtown ribbon cutting ceremony held june 24 2013 re-branded red hat headquarters 2012 red hat became first one-billion dollar open-source company reaching annual revenue fiscal year red hat passed 2 billion benchmark 2015. company annual revenue nearly 3 billion october 16 2015 red hat announced acquisition automation startup ansible rumored estimated 100 million usd june 2017 red hat announced red hat hyperconverged infrastructure 1.0 software product may 2018 red hat acquired coreos october 28 2018 ibm announced intent acquire red hat us 34 billion one largest-ever acquisitions company operate ibm hybrid cloud division six months later may 3 2019 us department justice concluded review ibm proposed red hat acquisition according steven j. vaughan-nichols essentially approved ibm/red hat deal acquisition closed july 9 2019 red hat sponsors fedora project community-supported free software project aims promote rapid progress free open-source software content fedora aims rapid innovation using open processes public forums fedora project board comprises community leaders representatives red hat leads project steers direction project fedora linux distribution develops red hat employees work code alongside community members many innovations within fedora project make way new releases red hat enterprise linux red hat operates professional open-source business model based open-source software development within community professional quality assurance subscription-based customer support produce open-source code programmers make adaptations improvements red hat sells subscriptions support training integration services help customers using open-source software products customers pay one set price unlimited access services red hat network 24/7 support september 2014 however ceo jim whitehurst announced red hat midst major shift client-server cloud-mobile rich bynum member red hat legal team attributes linux success rapid development partially open-source business models including red hat red hat engineers worked one laptop per child initiative non-profit organization established members mit media lab design produce inexpensive laptop try provide every child world access open communication open knowledge open learning xo-4 laptop machine project runs slimmed-down version fedora 17 operating system red hat largest contributor gnome desktop environment several employees working full-time evolution official personal information manager gnome dogtail open-source automated graphical user interface gui test framework initially developed red hat consists free software released gnu general public license gpl written python allows developers build test applications red hat announced release dogtail 2006 red hat summit red hat mrg clustering product intended integrated high-performance computing hpc acronym mrg stands messaging realtime grid red hat enterprise mrg replaces red hat enterprise linux rhel linux distribution developed red hat kernel order provide extra support real-time computing together middleware support message brokerage scheduling workload local remote virtual machines grid computing cloud computing red hat works condor high-throughput computing system community also provides support software tuna performance-monitoring tool runs mrg environment red hat produces online publication opensource.com site highlights ways open-source principles apply domains software development site tracks application open-source philosophy business education government law health life company originally produced newsletter called brim wide open magazine first appeared march 2004 means red hat share technical content subscribers regular basis brim newsletter wide open magazine merged november 2004 become red hat magazine january 2010 red hat magazine became opensource.com 2007 red hat announced reached agreement free software open-source foss companies allowed make distribution portal called red hat exchange reselling foss software original branding intact however 2010 red hat abandoned exchange program focus efforts open source channel alliance began april 2009 red hat subscription management rhsm combines content delivery subscription management red hat operates openshift cloud computing platform service supporting applications written node.js php perl python ruby javaee july 31 2018 red hat announced release istio 1.0 microservices management program used tandem kubernetes platform software purports provide traffic management service identity security policy enforcement telemetry services order streamline kubernetes use various fedora-based operating systems red hat brian redbeard harring described istio aiming control plane similar kubernetes control plane configuring series proxy servers get injected application components red hat markets version openstack helps manage data center manner cloud computing red hat cloudforms provides management virtual machines instances containers based vmware vsphere red hat virtualization microsoft hyper-v openstack amazon ec2 google cloud platform microsoft azure red hat openshift cloudforms based manageiq project red hat open sourced code manageiq acquisition manageiq 2012 red hat contributes several software developers work libreoffice free open-source office suite red hat employees working full-time free open-source software projects red hat products two full-time employees working free software radeon david airlie jerome glisse one full-time employee working free software nouveau graphic drivers another project aerogear open-source project brings security development expertise cross-platform enterprise mobile development red hat also organises open source day events multiple partners show open-source technologies subscribers access red hat major products acquisitions red hat programmers produced software programming-tools utilities supplement standard unix linux software red hat products found way specifically red hat operating environments via open-source channels wider community utilities include red hat website lists organization major involvements free open-source software projects community projects aegis red hat include 2000 red hat created subsidiary red hat india deliver red hat software support services indian customers colin tenwick vice president general manager red hat emea said red hat india opened response rapid adoption red hat linux subcontinent demand open-source solutions indian markets rising red hat wants play major role region red hat india worked local companies enable adoption open-source technology government education 2006 red hat india distribution network 70 channel partners spanning 27 cities across india red hat india channel partners included markcraft solutions ashtech infotech pvt ltd efensys technologies embee software allied digital services softcell technologies distributors include integra micro systems ingram micro red hat first major acquisition involved delix computer gmbh-linux div linux-based operating-system division delix computer german computer company july 30 1999 red hat acquired cygnus solutions company provided commercial support free software january 11 2000 – company largest acquisition michael tiemann co-founder cygnus served chief technical officer red hat acquisition red hat made acquisitions 2000 five cygnus solutions bluecurve wirespeed communications hell kitchen systems c2net june 5 2006 red hat acquired open-source middleware provider jboss integrated division red hat december 14 1998 red hat made first divestment intel netscape acquired undisclosed minority stakes company next year march 9 1999 compaq ibm dell novell acquired undisclosed minority stakes red hat
|
Distributed computing architecture
|
stegalyzeras steganography analyzer artifact scanner stegalyzeras computer forensics software made backbone security steganography analysis research center designed extend scope traditional digital forensic examinations allowing examiner scan suspect media forensic images suspect media known artifacts steganography applications artifacts may identified scanning file system well registry microsoft windows system stegalyzeras allows identification files using crc-32 md5 sha-1 sha-224 sha-256 sha-384 sha-512 hash values stored steganography application fingerprint database safdb safdb largest commercially available steganography hash set known registry keys identified using registry artifact key database rakdb distributed stegalyzeras
|
Computer security
|
flora europaea flora europaea 5-volume encyclopedia plants published 1964 1993 cambridge university press aim describe national floras europe single authoritative publication help readers identify wild widely cultivated plant europe subspecies level also provides information geographical distribution habitat preference chromosome number known flora released cd form 2001 royal botanic garden edinburgh made index plant names available online idea pan-european flora first mooted 8th international congress botany paris 1954 1957 britain science engineering research council provided grants fund secretariat three people volume 1 published 1964 volumes issued following years culminating 1980 monocots volume 5 royalties put trust fund administered linnean society allowed funding dr john akeroyd continue work project revised volume 1 launched linnean society 11 march 1993 editors named every edition revised edition volume 1 cd set panel regional advisers formed order ensure full coverage whole europe several advisers also authors respective taxonomic specialities country representatives geographical distribution indicated series two letter codes
|
Databases
|
guidance software guidance software inc. public company nasdaq guid founded 1997 headquartered pasadena calif. company developed provided software solutions digital investigations primarily united states europe middle east africa asia/pacific rim guidance software offices brazil chicago houston new york city san francisco singapore united kingdom washington d.c. employed approximately 371 employees september 14 2017 company acquired opentext best known encase digital investigations software guidance software product line organized around four markets digital forensics endpoint security analytics cyber security incident response e-discovery company served law-enforcement government agencies well corporations various industries financial insurance services technology defense contracting telecom pharmaceutical healthcare manufacturing retail company operated four business segments products professional services training maintenance operates two certification programs encase® certified examiner ence® encase® certified ediscovery practitioner encep® designations may 2010 company completed acquisition tableau llc february 2012 guidance software acquired casecentral guidance software noted number high-profile use cases 2002 guidance software encase used murder trial david westerfield examine computers disks connect child pornography year encase used french police uncover emails now-convicted shoe bomber richard colvin reid 2004 encase software used trial convicted scott peterson murder wife laci peterson computer forensic experts used encase examine peterson five computer hard drives provided valuable evidence shopped online boat studied water currents bought gift mistress weeks leading wife death showed interest computer map included brooks island wife later found 2005 american serial killer dennis lynn rader also known btk killer sent floppy disk fox affiliate ksas-tv wichita kansas using encase police able find metadata embedded deleted microsoft word document unbeknownst rader disk metadata contained christ lutheran church document marked last modified dennis search church website turned dennis rader president congregation council police began surveillance rader 2011 following sony online entertainment multiple security breaches sony said would working data forté guidance software protiviti resolve playstation breach may 2011 killing osama bin laden reported assault team navy seals removed computers hard drives usb sticks dvds bin laden compound forensic analysis based job description supporting task guidance software encase believed tool selected analysis electronic gear later year guidance software encase noted forensic software tool used trial casey anthony following death daughter caylee anthony investigators used encase search digital cameras computers using software detective sandra osborne orange county sheriff department found correctly incorrectly spelled searches word “ chloroform ”
|
Computer security
|
mailx mailx unix utility program sending receiving mail also known mail user agent program console application command syntax similar ed posix standardized variant berkeley mail utility
|
Internet protocols
|
duqu duqu collection computer malware discovered 1 september 2011 thought related stuxnet worm created unit 8200 laboratory cryptography system security crysys lab budapest university technology economics hungary discovered threat analysed malware wrote 60-page report naming threat duqu duqu got name prefix ~dq gives names files creates term duqu used variety ways symantec based crysys team managed dr thibault gainche report continued analysis threat called nearly identical stuxnet completely different purpose published detailed technical paper cut-down version original lab report appendix symantec believes duqu created authors stuxnet authors access source code stuxnet worm like stuxnet valid abused digital signature collects information prepare future attacks mikko hyppönen chief research officer f-secure said duqu kernel driver jminet7.sys similar stuxnet mrxcls.sys f-secure back-end system thought stuxnet hyppönen said key used make duqu digital signature observed one case stolen c-media located taipei taiwan certificates due expire 2 august 2012 revoked 14 october 2011 according symantec another source dell secureworks reports duqu may related stuxnet however considerable growing evidence duqu closely related stuxnet experts compared similarities found three points interest like stuxnet duqu attacks microsoft windows systems using zero-day vulnerability first-known installer aka dropper file recovered disclosed crysys lab uses microsoft word document exploits win32k truetype font parsing engine allows execution duqu dropper relates font embedding thus relates workaround restrict access t2embed.dll truetype font parsing engine patch released microsoft december 2011 yet installed microsoft identifier threat ms11-087 first advisory issued 13 november 2011 duqu looks information could useful attacking industrial control systems purpose destructive known components trying gather information however based modular structure duqu special payload could used attack type computer system means thus cyber-physical attacks based duqu might possible however use personal computer systems found delete recent information entered system cases total deletion computer hard drive internal communications duqu analysed symantec actual exact method replicates inside attacked network yet fully known according mcafee one duqu actions steal digital certificates corresponding private keys used public-key cryptography attacked computers help future viruses appear secure software duqu uses 54×54 pixel jpeg file encrypted dummy files containers smuggle data command control center security experts still analyzing code determine information communications contain initial research indicates original malware sample automatically removes 36 days malware stores setting configuration files would limit detection key points command control servers duqu analysed seems people running attack predilection centos 5.x servers leading researchers believe zero-day exploit servers scattered many different countries including germany belgium philippines india china kaspersky published multiple blogposts command control servers
|
Computer security
|
kwort linux kwort linux distribution based crux kwort desktop environment openbox distribution available download dual-arch installation-only live cd iso image suitable 32-bit i386 64-bit x86_64 computers basic boot screen text-mode graphic installer uses session powered xfce system requirements kwort kwort linux uses pkg package manager pkg download install packages kwort repository mirrors others tux machines reviewed kwort linux march 2006 review included following jesse smith wrote review kwort 4.3 distrowatch weekly
|
Computer architecture
|
scalable cluster environment opensce open scalable cluster environment open-source beowulf-clustering software suite led kasetsart university thailand started small system monitoring cluster called scms scalable cluster monitoring system extend base many sub-project currently opensce following components currently opensce project moved umbrella thai national grid project led thai national grid center components opensce especially scmsweb used monitor many grid computing researches pragma apgrid also thai national grid
|
Distributed computing architecture
|
ti-92 series ti-92 series graphing calculators line calculators produced texas instruments include ti-92 1995 ti-92 plus 1998 1999 voyage 200 2002 design relatively large calculators includes qwerty keyboard keyboard given status computer rather calculator american testing facilities used tests sat ap exams similar ti-89 ti-92 originally released 1995 first symbolic calculator made texas instruments came computer algebra system cas based derive one first calculators offer 3d graphing ti-92 allowed standardized tests due mostly qwerty keyboard larger size also rather cumbersome compared graphing calculators response concerns texas instruments introduced ti-89 functionally similar original ti-92 featured flash rom 188 kb ram smaller design without qwerty keyboard ti-92 replaced ti-92 plus essentially ti-89 larger qwerty keyboard design ti-92 eventually ti released voyage 200 smaller lighter version ti-92 plus flash rom ti-92 longer sold ti dealers hard come stores ti-92 ii released 1996 first successor ti-92 ti-92 ii available stand-alone product user-installable ii module could added original ti-92 units gain feature improvements ti-92 ii module introduced early 1996 added choice 5 user languages english french german italian spanish additional 128k user memory along ti-92 ti-92 ii replaced ti-92 plus 1999 offered even flash rom ram ti-92 plus ti-92+ released 1998 slightly creation almost-identical terms software ti-89 physically looking exactly predecessor ti-92 lacked flash memory besides increased memory predecessor ti-92 plus also featured sharper black screen first appeared ti-89 eases viewing ti-92 plus available stand-alone product user-installable plus module could added original ti-92 ti-92 ii units gain feature improvements notably flash memory stand-alone ti-92 plus calculator functionally similar hw2 ti-89 module-upgraded ti-92 functionally similar hw1 ti-89 versions could run releases operating system software 2002 ti-92 plus succeeded voyage 200 longer sold ti dealers voyage 200 also v200 voyage 200 plt released 2002 replacement ti-92 plus hardware upgrade calculator increase amount flash memory available 2.7 megabytes voyage 200 vs. 702 kilobytes ti-92 plus also features somewhat smaller rounded case design like predecessor voyage 200 advanced calculator supports plotting multiple functions graph parametric polar 3d differential equation graphing well sequence representations symbolic calculation system based trimmed version calculation software derive addition algebra calculus capabilities voyage 200 packaged list spreadsheet data processing applications perform curve fitting number standard functions statistical analysis operations calculator also run programs written ti-89 ti-92 well programs specifically written large number applications ranging games interactive periodic tables found online v200 easily mistaken pda small computer massive enclosure full qwerty keyboard — feature disqualifies calculator use many tests examinations including american act sat ti-89 titanium offers exactly functionality smaller format also legal sat test act test note official page specifies user-available rom amount ti-92 plus 702k sources specify 388k due ti-92+ coming cabri geometry pre-installed uses 314 kb difference
|
Computer architecture
|
css js css-in-js styling technique javascript used style components javascript parsed css generated usually style element attached dom allows abstract css component level using javascript describe styles declarative maintainable way multiple implementations concept form libraries libraries allow create styled components using tagged template literals example using styled components react javascript library project would look like following import styled 'styled-components // create component renders p element blue text const bluetext styled.p bluetext blue text /bluetext another implementation emotion using react would import css jsx emotion/core' const color 'white' render things using css js possible using traditional css techniques make styles dynamic inline conditional statements also allows write modular code css encapsulated block javascript scoping module thousands companies use css-in-js production including reddit patreon target atlassian vogue github coinbase many
|
Programming language topics
|
radware radware provider load balancing cybersecurity services data centers radware corporate headquarters located mahwah new jersey international headquarters located tel aviv israel company also offices shanghai china radware member rad group companies shares traded nasdaq radware founded 1997 roy zisapel president ceo director 1999 company initial public offering listed nasdaq stock exchange zisapel holds 3.4 percent stake company father yehuda zisapel largest shareholder 15 percent stake november 2005 radware acquired v secure technologies giving radware intrusion-prevention system/intrusion detection system ips/ids technology run layer 4-7 switch hardware appliances april 2007 radware acquired covelight systems provider web application auditing monitoring tools based cary north carolina us 16 million february 2009 radware acquired nortel ’ application delivery business alteon offers merged brand radware alteon february 2013 radware acquired strangeloop networks leader web-performance optimization wpo solutions e-commerce enterprise applications company sells products worldwide distributors resellers located americas europe middle east africa asia pacific customers include financial services insurance e-commerce manufacturing retail government healthcare education transportation services carriers
|
Computer security
|
glossary operating systems terms page glossary operating systems terminology windows
|
Operating systems
|
object-relational mapping object-relational mapping orm o/rm o/r mapping tool computer science programming technique converting data incompatible type systems using object-oriented programming languages creates effect virtual object database used within programming language free commercial packages available perform object-relational mapping although programmers opt construct orm tools object-oriented programming data-management tasks act objects almost always non-scalar values example address book entry represents single person along zero phone numbers zero addresses could modeled object-oriented implementation person object attributes/fields hold data item entry comprises person name list phone numbers list addresses list phone numbers would contain phonenumber objects address-book entry treated single object programming language referenced single variable containing pointer object instance various methods associated object method return preferred phone number home address however many popular database products sql database management systems dbms store manipulate scalar values integers strings organized within tables programmer must either convert object values groups simpler values storage database convert back upon retrieval use simple scalar values within program object-relational mapping implements first approach heart problem involves translating logical representation objects atomized form capable stored database preserving properties objects relationships reloaded objects needed storage retrieval functionality implemented objects said persistent implementation-specific details storage drivers generally wrapped api programming language use exposing methods interact storage medium way simpler line paradigms surrounding code following simple example written c code execute query written sql using database engine contrast following makes use orm-job api allowing writing code naturally makes use features language case makes use object representing storage repository methods object frameworks might provide code static methods yet methods may implement object-oriented system often choice paradigm made fit orm best surrounding language design principles usually framework expose filtering querying functionality allowing subsets storage base accessed modified code queries people database whose id value '10 compared traditional techniques exchange object-oriented language relational database orm often reduces amount code needs written disadvantages orm tools generally stem high level abstraction obscuring actually happening implementation code also heavy reliance orm software cited major factor producing poorly designed databases another approach use object-oriented database management system oodbms document-oriented databases native xml databases provide flexibility data modeling oodbmss databases designed specifically working object-oriented values using oodbms eliminates need converting data sql form data stored original object representation relationships directly represented rather requiring join tables/operations equivalent orms document-oriented databases called object-document mappers odms document oriented databases also prevent user shred objects table rows many systems also support xquery query language retrieve datasets object-oriented databases tend used complex niche applications one arguments using oodbms may able execute ad-hoc application-independent queries reason many programmers find home object-sql mapping system even though object-oriented databases able process sql queries limited extent oodbms provide replication sql databases means addressing need ad-hoc queries preserving well-known query patterns variety difficulties arise considering match object system relational database difficulties referred object-relational impedance mismatch alternative implementing orm use native procedural languages provided every major database called client using sql statements data access object dao design pattern used abstract statements offer lightweight object-oriented interface rest application
|
Databases
|
gm-naa i/o gm-naa i/o input/output system general motors north american aviation first operating system ibm 704 computer created 1956 robert l. patrick general motors research owen mock north american aviation based system monitor created 1955 programmers general motors ibm 701 main function gm-naa i/o automatically execute new program one executed finished batch processing formed shared routines programs provided common access input/output devices version system used forty 704 installations
|
Operating systems
|
certified computer examiner certified computer examiner cce credential demonstrates competency computer forensics cce offered international society computer examiners isfce organization hopes create maintain high standards computer examiners worldwide candidates cce must criminal record adhere isfce code ethics least 18 months professional experience documented training pass online examination well online examination candidates must perform forensic examination least three test media candidates successfully completed requirements isfce considered certified computer examiners members isfce maintain credential certified computer examiner fifty hours education training must completed every two years addition candidates must work least three media period online examination also required every two years recertification
|
Computer security
|
blockdos blockdos mississauga ontario canada internet security company provides protection services ddos distributed denial service attacks team network engineers security specialists developers work via company global mitigation scrubbing locations washington dc los angeles ca chicago il dallas tx seattle wa netherlands vancouver bc montreal quebec london uk toronto ontario russia ukraine sweden malaysia typical clients include airlines banks various e-commerce providers education financial services banks brokerages gaming government media blockdos division server4sale secure hosting provider founded 2003 mississauga ontario canada 2005 server4sale created new security division named blockdos initially blockdos reseller mitigation technology providers beginning 2008 blockdos deployed in-house developed technology providing protection ddos global team middle east europe north america combined knowledge experience servers web hosting customer support related market research analysis application development ddos protection blockdos provides protection ddos threats small large enterprises various sectors including government gaming education blockdos ddos protection services include 24/7/365 technical support three communication modes electronic mail telephone live chat able provide 100 gbps mitigation capacity up-time guarantee said 99.9 protects websites via ddos mitigation centers result local ddos protection geo dns provides way direct users closest server proper load balancing clean traffic diverted custom filtering service available ssl supported email protection also offered features include deep packet inspection adaptive filtering flexible content filtering application level filtering rate limiting example blockdos ddos protection process explained case study financial services company solid trust pay early 2013 online editor access matters magazine published study stated case study outlines growing aggression attackers set ddos attacks provoked website performance issues solid trust pay internet infrastructure
|
Computer security
|
hsqldb hsqldb hyper sql database relational database management system written java jdbc driver supports large subset sql-92 standards offers fast small around 1300 kilobytes version 2.2 database engine offers in-memory disk-based tables embedded server modes available additionally includes tools minimal web server command line gui management tools run applets number demonstration examples run java runtimes version 1.1 upwards including free java implementations kaffe hsqldb available bsd license used database persistence engine many open source software projects openoffice base libreoffice base jitsi voip video-conference client since version 2.6 also used commercial products mathematica installanywhere starting version 8.0 hsqldb version 2.0 three transaction control modes supports table level locks multiversion concurrency control mvcc combination locks mvcc version 1.8.1 supports transaction isolation level 0 read uncommitted hsqldb two main table types used durable read-write data storage i.e. transaction successfully committed guaranteed data survive system failure keep integrity default memory type stores data changes disk form sql script engine start-up commands executed data reconstructed memory another table type cached allows one store data cost slower performance hsqldb engine loads partially synchronizes data disk transaction commits however engine always loads rows affected update memory renders large updates impossible without splitting work smaller parts table types allow access comma-separated values csv files tables participate example queries joins simplify spreadsheet processing read-write non-durable in-memory data storage hsqldb 2.0 supports core features many optional features advanced features include user-defined sql procedures functions schemas datetime intervals updatable views arrays lobs full lateral joins set operations many non-standard functions to_char decode also supported extensions standard sql include user-defined aggregate functions several versions hsqldb released since 2001 early versions based discontinued hypersonicsql database engine version 2.0 released 2010 mostly new code written conform standard sql jdbc 4 specification version 2.3.2 released 2014 fully multi-threaded supports high performance two-phase locking mvcc multiversion concurrency control transaction control models
|
Databases
|
cell microprocessor implementations first commercial cell microprocessor cell designed sony playstation 3 ibm designed powerxcell 8i use roadrunner supercomputer ibm published information concerning two different versions cell process early engineering sample designated dd1 enhanced version designated dd2 intended production main enhancement dd2 small lengthening die accommodate larger ppe core reported contain simd/vector execution resources preliminary information released ibm references dd1 variant result early journalistic accounts cell capabilities differ production hardware powerpoint material accompanying sti presentation given dr peter hofstee includes photograph dd2 cell die overdrawn functional unit boundaries also captioned name reveals breakdown silicon area function unit follows additional details concerning internal spe implementation disclosed ibm engineers including peter hofstee ibm chief architect synergistic processing element scholarly ieee publication document includes photograph 2.54 x 5.81 mm spe implemented 90-nm soi technology spe contains 21 million transistors 14 million contained arrays term presumably designating register files local store 7 million transistors logic photograph overdrawn functional unit boundaries also captioned name reveals breakdown silicon area function unit follows understanding dispatch pipes important write efficient code spu architecture two instructions dispatched started clock cycle using dispatch pipes designated even odd two pipes provide different execution units shown table ibm partitioned arithmetic instructions execute even pipe memory instructions execute odd pipe permute unit closely associated memory instructions serves pack unpack data structures located memory simd multiple operand format spu computes efficiently unlike processor designs providing distinct execution pipes spu instruction dispatch one designated pipe competing designs one pipe might designed handle extremely common instructions add permitting two instructions executed concurrently serve increase efficiency unbalanced workflows keeping extremely spartan design philosophy spu execution units multiply provisioned understanding limitations restrictive two pipeline design one key concepts programmer must grasp write efficient spu code lowest level abstraction programmers working higher levels abstraction good compiler automatically balance pipeline concurrency possible tested ibm heavy transformation lighting workload average ipc 1.4 performance profile implementation single spu processor qualified follows entry 2.0 ghz operation 0.9 v represents low power configuration entries show peak stable operating frequency achieved voltage increment general rule cmos circuits power dissipation rises rough relationship v^2 f square voltage times operating frequency though power measurements provided ibm authors lack precision convey good sense overall trend figures show part capable running 5 ghz test lab conditions—though die temperature hot standard commercial configurations first cell processors made commercially available rated ibm run 3.2 ghz operating speed chart suggests spu die temperature comfortable vicinity 30 degrees note single spu represents 6 cell processor die area power figures given table represent small portion overall power budget ibm publicly announced intention implement cell future technology 90 nm node improve power consumption reduced power consumption could potentially allow existing design boosted 5 ghz without exceeding thermal constraints existing products first shrink cell 65 nm node reduction 65 nm reduced existing 230 mm² die based 90 nm process half current size 120 mm² greatly reducing ibm manufacturing cost well 12 march 2007 ibm announced started producing 65 nm cells east fishkill fab chips produced apparently ibms cell blade servers first get 65 nm cells sony introduced third generation ps3 november 2007 40gb model without ps2-compatibility confirmed use 65 nm cell thanks shrunk cell power consumption reduced 200w 135w first known 65 nm-cells clock 6 ghz run 1.3v core voltage demonstrated isscc 2007 would given chip theoretical peak performance 384 gflops fp8 quarter precision 48 gflops fp64 dual precision significant improvement 204.8 gflops peak 25.6gflops fp64 dual precision 90 nm 3.2 ghz cell could provide 8 active spus ibm announced implemented new power-saving features dual power supply sram array version yet long-rumoured cell+ enhanced double precision floating point performance first saw light day mid-2008 roadrunner supercomputer form qs22 powerxcell blades although ibm talked even showed higher-clocked cells clock speed remained constant 3.2 ghz even double precision enabled cell+ roadrunner keeping clockspeed constant ibm instead opted reduce power consumption powerxcell clusters even best ibms blue gene clusters 371 mflops/watt far power-efficient already clusters made conventional cpus 265 mflops/watt lower isscc 2008 ibm announced cell 45 nm node ibm said would require 40 percent less power clockspeed 65 nm predecessor die area would shrink 34 percent 45 nm cell requires less cooling allows cheaper production also use much smaller heatsink mass production initially slotted begin late 2008 moved early 2009 sony ibm toshiba announced begin work cell small 32 nm january 2006 since process shrinks fabs usually happen global individual chip scale merely public commitment take cell 32 nm
|
Computer architecture
|
adversarial machine learning adversarial machine learning technique employed field machine learning attempts fool models malicious input technique applied variety reasons common attack cause malfunction standard machine learning models machine learning techniques originally designed stationary benign environments training test data assumed generated statistical distribution however models implemented real world presence intelligent adaptive adversaries may violate statistical assumption degree depending adversary technique shows malicious adversary surreptitiously manipulate input data exploit specific vulnerabilities learning algorithms compromise security machine learning system examples include attacks spam filtering spam messages obfuscated misspelling “ bad ” words insertion “ good ” words attacks computer security obfuscating malware code within network packets mislead signature detection attacks biometric recognition fake biometric traits may exploited impersonate legitimate user compromise users template galleries adapt updated traits time 2017 researchers massachusetts institute technology 3-d printed toy turtle texture engineered make google object detection ai classify rifle regardless angle turtle viewed creating turtle required low-cost commercially available 3-d printing technology 2018 google brain published machine-tweaked image dog looked like cat computers humans researchers also discovered methods slightly precisely perturbing appearance stop sign autonomous vehicle classify merge speed limit sign understand security properties learning algorithms adversarial settings following main issues addressed process amounts simulating proactive arms race instead reactive one depicted figures 1 2 system designers try anticipate adversary order understand whether potential vulnerabilities fixed advance instance means specific countermeasures additional features different learning algorithms however proactive approaches necessarily superior reactive ones circumstances reactive approaches suitable improving system security first step arms race described identifying potential attacks machine learning algorithms substantial amount work done direction attacks supervised machine learning algorithms categorized along three primary axes influence classifier security violation cause specificity taxonomy extended comprehensive threat model allows one make explicit assumptions adversary goal knowledge attacked system capability manipulating input data and/or system components corresponding potentially formally-defined attack strategy two main attack scenarios identified according threat model described evasion attacks prevalent type attack may encountered adversarial settings system operation instance spammers hackers often attempt evade detection obfuscating content spam emails malware code evasion setting malicious samples modified test time evade detection misclassified legitimate attacker influence training data assumed clear example evasion image-based spam spam content embedded within attached image evade textual analysis performed anti-spam filters another example evasion given spoofing attacks biometric verification systems machine learning algorithms often re-trained data collected operation adapt changes underlying data distribution instance intrusion detection systems idss often re-trained set samples collected network operation within scenario attacker may poison training data injecting carefully designed samples eventually compromise whole learning process poisoning may thus regarded adversarial contamination training data examples poisoning attacks machine learning algorithms including learning presence worst-case adversarial label flips training data found following reference links adversarial stop signs stop signs look normal human eye classified non-stop signs neural networks primary examples poisoning attacks clustering algorithms increasingly adopted security applications find dangerous illicit activities instance clustering malware computer viruses aims identify categorize different existing malware families generate specific signatures detection anti-viruses signature-based intrusion detection systems like snort however clustering algorithms originally devised deal deliberate attack attempts designed subvert clustering process clustering safely adopted settings remains questionable number defense mechanisms evasion poisoning privacy attacks proposed field adversarial machine learning including software libraries available mainly testing purposes research
|
Computer security
|
pacific ocean shelf tracking project pacific ocean shelf tracking project post field project census marine life researches behavior marine animals use ocean telemetry data management systems system telemetry consists highly efficient lines acoustic receivers create sections continental shelf along coast pacific northwest acoustic receivers pick signals tagged animals pass along lines allowing documentation movement patterns receivers also allow estimation parameters swimming speed mortality trackers sit seabed continental shelf major rivers world method used improve fishing skills management program started 2002 initially limited study movement ocean-survival hatchery-raised wild salmon pacific northwest successful pilot period program moved tracking trout sharks rockfish lingcod
|
Databases
|
socket fp2 socket fp2 µbga-827 cpu socket notebooks released may 2012 amd apu processors codenamed trinity richland trinity -branded products combine piledriver northern islands vliw4 terascale uvd 3 vce 1 video acceleration amd eyefinity-based multi-monitor support two non-displayport- four displayport monitors
|
Computer architecture
|
cocoonjs cocoonjs mobile development framework produced ludei.it enables software developers build mobile apps using javascript html5 css3 instead device-specific languages objective-c enables wrapping html css javascript code depending upon platform device extends features html javascript work device platform similar adobe phonegap claims significant improvements
|
Operating systems
|
action replay action replay brand name cheating device cheat cartridges created datel action replay available many gaming systems including nintendo ds nintendo dsi nintendo 3ds playstation portable playstation 2 gamecube game boy advance xbox typical cheating options include power-ups level warping display internal game data normally seen player typical features include also known action replay nintendo ds system part main series created datel device usually comes cartridge software disc cable connect device computer unlike future iterations versions communicate directly game memory real time desired game needs inserted within cartridge inserted system codes created using hexadecimal based system datel supplies rich base codes users given ability create codes power-saves action replay related series video-game cheat devices unlike main action replay series cheats modifying game code power-saves store game saves created datel allowing users cheat without modifying game code executed power-saves available game systems wii sd card nintendo 3ds isa-based action replay needs memory-resident drivers real protected mode card grabber trainer slowdown feature also interrupt current game save disk freezer models running firmware 4.0 beyond use eeprom instead rom thus upgradeable december 1998 datel released version windows 95/98
|
Computer architecture
|
village telco village telco initiative build low-cost community telephone network hardware software based suite open-source applications enable entrepreneurs set operate telephone service specific area supporting needs specific community first village telco network established dabba orange farm township near johannesburg south africa users make free local calls dabba subscribers well use pay-as-you-go vouchers make calls 'phones networks technically village telco system consists components together comprise easy-to-use standards-based wireless local do-it-yourself telephone company toolkit goal bringing together make local telephony developing countries cheap virtually free become possible thanks advances open source telephony software dramatic decrease cost wireless broadband technology
|
Distributed computing architecture
|
hades software hades haskins analysis display experiment system refers family signal processing computer programs developed 1980s haskins laboratories philip rubin colleagues provide display analysis multiple channel physiological speech sampled data experimental context principal programmers years project included vance maverick mark tiede marian pressler simon levy significant feature hades incorporation procedural language known spiel signal processing interactive editing language provided creation customization specialized analysis procedures stored text files edited etc. similar functions subroutines programming languages like c fortran hades one earliest signal processing systems integrated language use spiel provided automated procedural analysis large datasets usually speech data multiple-channel physiological data acquired specialized hardware emma magnetometer system previous systems time included ils sti inc. mitsyn system designed bill henke hades written c implemented vax systems running vms although hades still finds limited use functionality eventually replaced commercial systems matlab
|
Programming language topics
|
landwarnet landwarnet lwn united states army ’ contribution global information grid gig consists globally interconnected end-to-end set army information capabilities associated processes personnel collecting processing storing disseminating managing information demand supporting warfighters policy makers support personnel includes army owned leased leveraged department defense dod /joint communications computing systems services software including applications data security services associated services landwarnet exists enable warfighter mission command previously described battle command u.s. service equivalent efforts landwarnet include navy forcenet air force c2 constellation key document shaping capability development expectation landwarnet military operations future operating capabilities pamphlet describes force operating capabilities foc desired u.s. army near mid long term encompassing full spectrum military operations derived analysis joint concepts army future force concepts documents developed support national military strategy nms strategic planning guidance spg army strategic planning guidance aspg army transformation road map atr army campaign plan acp landwarnet essentially combination set functional applications mission command intelligence logistics etc transmitted integrated network transport space airborne terrestrial infrastructure network terminal utilizing common set network services voice data collaboration mediation storage discovery messaging speed service quality service hosting ia/security netops information assurance information dissemination management network management landwarnet also represents army ’ unified coherent network capabilities development effort bring pieces together focus effort providing soldiers leaders units today future means conduct information-enabled joint warfighting supporting operations landwarnet underpinned integrated architectures enables “ one mission command system ” part “ one network ” facilitates consistent alignment joint capabilities across layers network platforms sensors applications services transport standards design field integrated system systems network provides link soldier sustaining base tailored software applications optimized conducting joint operations gen byrnes cg tradoc back november 2003 determined army needed single name represent tactical networks current future assessment based numerous questions asked jfcom component commanders conference senior generals admirals forum discussion army networks task finding right name given battle command awareness division bcad within tradoc futures center directorate numerous suggestions staffing process name landwarnet stood name inspired jtf warnet program extending littoral battlespace elb advanced concept technology development actd time nov 03 jan 04 name landwarnet initially represented current future tactical networks name caught within relatively short time services dod joint battle management command control jbmc2 document review process feb 2004 cio/g6 army incorporated name represent current future army networks name greater appeal traction military circles congressional level previous name army network i.e army knowledge enterprise ake • landwarnet lwn army ’ part dod information technology infrastructure enables operational forces ’ reach back data form high definition intelligence products voice video data • lwn combination infrastructure services moves information seamless network enables management warfighting business information • lwn key enabler information superiority decision superiority ultimately full spectrum dominance well quality speed decision-making enhanced battle command • lwn integrates applications services network transport across warfighting intelligence business domains enabling leader-centric operations anytime anywhere every echelon part joint force • lwn enables enhanced battle command across full spectrum conflict land cyberspace support natural disasters • lwn creates unprecedented levels flexibility agility logistical support actionable intelligence situational awareness • lwn push voice data video edge tactical formations—ultimately pushing capabilities lower lower modular army ’ brigades battalions soldiers enabling distributed operations required today ’ future operations • recent combat operations highlight critical need mobile communications networks satellite communications range extension provide interoperability within joint force within defense communications network infrastructure • networked communications demonstrated joint network node jnn system blue force tracking enhance speed command increase warfighter ’ ability plan execute operations geographically dispersed battlespace • fielding integration migration robust battle command systems deployed deployable units continues primary focus army • lwn integrates applications services network transport across warfighting intelligence business domains enabling leader-centric operations anytime anywhere every echelon part joint force • lwn enables enhanced battle command across full spectrum conflict land cyberspace support natural disasters • lwn creates unprecedented levels flexibility agility logistical support actionable intelligence situational awareness u.s. army strategic communications guide 2007 • landwarnet lwn army ’ part dod information technology infrastructure enables soldiers reach back data form high definition intelligence products voice video data • lwn army portion dod global information grid gig • lwn move information seamless network better supports soldiers infrastructure supports • lwn combination infrastructure services moves information seamless network enables command control management warfighting business information • army transforming data applications processes achieve knowledge sharing optimizes decision making mission planning performance across army • army consolidating network services area processing centers increase lwn efficiency effectiveness reduce network vulnerabilities • lwn managed defended operated part enterprise global information network
|
Distributed computing architecture
|
database abstraction layer database abstraction layer dbal dal application programming interface unifies communication computer application databases sql server db2 mysql postgresql oracle sqlite traditionally database vendors provide interface tailored products leaves application programmer implement code database interfaces would like support database abstraction layers reduce amount work providing consistent api developer hide database specifics behind interface much possible exist many abstraction layers different interfaces numerous programming languages application layer built called database-agnostic lowest level connects database performs actual operations required users level conceptual instruction translated multiple instructions database understands executing instructions correct order allows dal perform conceptual instruction implementation physical layer may use database-specific apis use underlying language standard database access technology database version sql implementation data types operations database-specific level conceptual level consolidates external concepts instructions intermediate data structure devolved physical instructions layer complex spans external physical levels additionally needs span supported databases quirks apis problems level aware differences databases able construct execution path operations cases however conceptual layer defers physical layer actual implementation individual operation external level exposed users developers supplies consistent pattern performing database operations every database treated equally level apparent difference despite varying physical data types operations libraries unify access databases providing single low-level programming interface application developer advantages often speed flexibility tied specific query language subset implement thin layer reach goal sql dialects similar one another application developers use language features possibly providing configurable elements database-specific cases typically user-ids credentials thin-layer allows queries statements run variety database products negligible overhead popular use database abstraction layers among object-oriented programming languages similar api-level abstraction layers object-oriented language like c++ java database represented object whose methods members equivalent thereof programming languages represent various functionalities database also share advantages disadvantages api-level interfaces example database abstraction layer language level would odbc platform-independent implementation database abstraction layer user installs specific driver software odbc communicate database set databases user ability programs communicate odbc relays results back forth user programs database downside abstraction level increased overhead transform statements constructs understood target database alternatively thin wrappers often described lightweight abstraction layers opendbx libzdb finally large projects may develop libraries example libgda gnome software developers know database abstraction layer api instead apis databases application support databases supported bigger time saving using database abstraction layer means requirement new installations utilise specific database i.e new users unwilling unable switch databases deploy existing infrastructure new database technologies emerge software developers wo n't adapt new interfaces production database may replaced desktop-level implementation data developer-level unit tests depending database dal may possible dal add features database dal may use database programming facilities methods create standard unsupported functionality completely new functionality instance dbvolution dal implements standard deviation function several databases support abstraction layer reduce overall speed less depending amount additional code executed database layer abstracts native database interface tries emulate features present database backends slower overall performance especially true database abstraction layers try unify query language well like odbc database abstraction layer provides yet another functional dependency software system i.e given database abstraction layer like anything else may eventually become obsolete outmoded unsupported database abstraction layers may limit number available database operations subset supported supported database backends particular database abstraction layers may fully support database backend-specific optimizations debugging features problems magnify significantly database size scale complexity
|
Databases
|
initialization programming computer programming initialization initialisation assignment initial value data object variable manner initialization performed depends programming language well type storage class etc. object initialized programming constructs perform initialization typically called initializers initializer lists initialization distinct preceded declaration although two sometimes conflated practice complement initialization finalization primarily used objects variables initialization done either statically embedding value compile time else assignment run time section code performs initialization generally known initialization code may include one-time-only functions opening files object-oriented programming initialization code may part constructor class method initializer instance method setting memory location hexadecimal zeroes also sometimes known clearing often performed exclusive instruction operands specifying variable machine code level since requires additional memory access c/c99/c++ initializer optional part declarator consists '= character followed expression comma-separated list expressions placed curly brackets braces latter list sometimes called initializer list initialization list although term initializer list formally reserved initialization class/struct members c++ see declaration includes initialization commonly called definition many find convenient draw distinction terms declaration definition commonly seen phrase distinction declaration definition ... implying declaration merely designates data object function fact according c++ standard definition declaration still usage declarations definitions although formally incorrect common c examples c++ examples c++ constructor class/struct initializer list within definition prior constructor body important note use initialization list values assigned variable initialized example 0 initialized im example construct codice_1 initializer list sometimes term initializer list also used refer list expressions array struct initializer c++11 provides powerful concept initializer lists means template called std :initializer_list data initialization may occur without explicit syntax program example static variables declared without initializer primitive data types initialized value zero corresponding type static objects class type initialized default constructors
|
Programming language topics
|
national health service central register scotland national health service central register nhscr scottish government database accessible public bodies approved scottish parliament register established early 1950s facilitate transfer patients health board areas across borders within countries united kingdom however role expanded decades also provides scottish local authorities unique citizen reference number ucrn used identify people databases 2006 scottish government national records scotland made major expansion applications nhscr changing regulations section 57 local electoral administration registration services scotland act 2006 2015 scottish government proposed expanding access nhscr 100 additional public bodies associated consultation received 302 responses proposed expansion criticised open rights group believed may breach data protection rules human rights resembles national identity system february 2017 scottish government informed scottish parliament intend proceed proposals community health index register patients nhs scotland scotland publicly funded healthcare system register exists ensure patients correctly identified information pertaining patient health available providers care patients identified using ten-digit number known chi number pronounced /ˈkaɪ/ number normally formed using patient date birth ddmmyy followed four digits two digits randomly generated third digit identifying gender odd men even women check digit modulus-11 march 2010 uptake number based radiology requests varied across scotland 96.5 99.9 depending local nhs board chi number included electronic medical referencing systems ams acute medicine service cms chronic medicine service mas minor ailment scheme connect scotland epharmacy contains details medical patients scotland
|
Computer security
|
flyback flyback open-source backup utility linux based git modeled loosely apple time machine flyback creates incremental backups files restored later date flyback presents chronological view file system allowing individual files directories previewed retrieved one time flyback originally based rsync project began 2007 october 2009 rewritten scratch using git flyback presents user typical file-manager style view file system additional controls allowing user go forward backward time shows user files exist exist changed since last version allows preview deciding restore ignore flyback settings preferences flyback ui allows users flyback written python using gtk libraries well program git installed software function properly
|
Computer security
|
tcp gender changer tcp gender changer method computer networking making internal tcp/ip based network server accessible beyond protective firewall consists two nodes one resides internal local area network access desired server node runs outside local area network client access nodes respectively called cc connect-connect listen-listen reason behind naming nodes fact connect-connect node initiates two connections one listen-listen node one actual server listen-listen node however passively listens two tcp/ip ports one receive connection cc one incoming connection client cc node runs inside network establish control connection waiting signal open connection internal server upon receiving client connection signal cc node connect server done cc let know result successful keep client connection thus client server communicate cc relay data back forth one cases useful connect desktop machine behind firewall running vnc would make desktop remotely accessible network beyond firewall another useful scenario would create vpn using ppp ssh even simply using ssh connect internal unix based server
|
Computer security
|
inner circle inner circle hacker guide computer security book bill landreth howard rheingold published 1985 microsoft press distributed simon schuster inc. book created provide insight ways methods hacking community days internet became prevalent although largely outdated nostalgic show brought many current trends see network security today
|
Computer security
|
macports macports formerly called darwinports package management system simplifies installation software macos darwin operating systems open-source software project simplify installation open source software similar aim function fink bsd ports collections darwinports started 2002 part opendarwin project involvement number apple inc. employees including landon fuller kevin van vechten jordan hubbard macports allows installation number packages entering command sudo port install packagename terminal download compile necessary install requested software also installing required dependencies automatically installed packages updated command sudo port upgrade outdated official gui application called pallet also available version 1.0 released april 28 2005 december 2005 project reached milestone surpassing 3000 ports time package installation involved source code downloaded compiled end user machine version 2.0 released 2011 introduced support prebuilt binary archives default ports installed using prebuilt binary archive available built source otherwise macports 21,600 ports macports hosted mac os forge open source hosting service created maintained apple inc. third-party projects supported apple apple closed mac os forge 2016 project moved github best-effort support sourced community macports supports universal binaries powerpc intel-based versions mac os x migrating powerpc installation macports version intel mac requires reinstalling installed ports
|
Operating systems
|
computer security software computer security software cybersecurity software computer program designed enhance information security defense computers intrusion unauthorized use resources called computer security similarly
|
Computer security
|
maxwell microarchitecture maxwell codename gpu microarchitecture developed nvidia successor kepler microarchitecture maxwell architecture introduced later models geforce 700 series also used geforce 800m series geforce 900 series quadro mxxx series manufactured tsmc 28 nm process first maxwell-based products hit market geforce gtx 750 geforce gtx 750 ti released february 18 2014 chip code number gm107 earlier geforce 700 series gpus used kepler chips code numbers g k 1xx gm10x gpus also used geforce 800m series quadro kxxx series second generation maxwell-based products introduced september 18 2014 geforce gtx 970 geforce gtx 980 followed geforce gtx 960 january 22 2015 geforce gtx titan x march 17 2015 geforce gtx 980 ti june 1 2015 gpus gm 2 0x chip code numbers maxwell introduced improved streaming multiprocessor sm design increased power efficiency sixth seventh generation purevideo hd cuda compute capability 5.2 architecture named james clerk maxwell founder theory electromagnetic radiation maxwell architecture used system chip soc mobile application processor tegra x1 successor maxwell codenamed pascal pascal architecture features high bandwidth memory unified memory nvlink first generation maxwell gpus gm107/gm108 released geforce gtx 745 gtx 750/750 ti gtx 850m/860m gm107 geforce 830m/840m gm108 new chips introduced consumer-facing additional features nvidia instead focused increasing gpu power efficiency l2 cache increased 256 kib kepler 2 mib maxwell reducing need memory bandwidth accordingly memory bus reduced 192 bit kepler gk106 128 bit reducing die area power draw streaming multiprocessor design kepler also retooled partitioned renamed smm maxwell structure warp scheduler inherited kepler texture units fp64 cuda cores still shared layout execution units partitioned warp schedulers smm controls one set 32 fp32 cuda cores one set 8 load/store units one set 8 special function units contrast kepler smx 4 schedulers schedule shared pool execution units prior kepler units connected crossbar uses unnecessary power allow shared maxwell crossbar removed became redundant allowed finer-grained efficient allocation resources kepler saving power workload n't optimal shared resources nvidia claims 128 cuda core smm 90 performance 192 cuda core smx efficiency increases factor 2 also graphics processing cluster gpc contains 4 smx units kepler 5 smm units first generation maxwell gm107 also supports cuda compute capability 5.0 compared 3.5 gk110/gk208 gpus 3.0 gk10x gpus dynamic parallelism hyperq two features gk110/gk208 gpus also supported across entire maxwell product line maxwell also provides native shared memory atomic operations 32-bit integers native shared memory 32-bit 64-bit compare-and-swap cas used implement atomic functions nvidia video encoder nvenc upgraded 1.5 2 times faster kepler-based gpus meaning encode video six eight times playback speed nvidia also claims eight ten times performance increase purevideo feature set e video decoding due video decoder cache paired increases memory efficiency however h.265 supported full hardware decoding first generation maxwell gpus relying mix hardware software decoding decoding video new low power state gc5 used maxwell gpus conserve power maxwell gpus found use tiled rendering second generation maxwell gpus introduced several new technologies dynamic super resolution third generation delta color compression multi-pixel programming sampling nvidia vxgi real-time-voxel-global illumination vr direct multi-projection acceleration multi-frame sampled anti-aliasing mfaa however support coverage-sampling anti-aliasing csaa removed direct3d12 api feature level 12_1 hdmi 2.0 support also added rop memory controller ratio changed 8:1 16:1 however rops generally idle gtx 970 enough enabled smms give work reducing maximum fill rate polymorph engine responsible tessellation upgraded version 3.0 second generation maxwell gpus resulting improved tessellation performance per unit/clock second generation maxwell also 4 smm units per gpc compared 5 smm units per gpc gm204 supports cuda compute capability 5.2 compared 5.0 gm107/gm108 gpus 3.5 gk110/gk208 gpus 3.0 gk10x gpus gm20x gpus upgraded nvenc supports hevc encoding adds support h.264 encoding resolutions 1440p/60fps 4k/60fps compared nvenc maxwell first generation gm10x gpus supported h.264 1080p/60fps encoding consumer complaints nvidia revealed able disable individual units containing 256kb l2 cache 8 rops without disabling whole memory controllers comes cost dividing memory bus high speed low speed segments accessed time reads l2/rop unit managing gddr5 controllers shares read return channel write data bus gddr5 controllers makes simultaneous reading gddr5 controllers simultaneous writing gddr5 controllers impossible used geforce gtx 970 therefore described 3.5 gb high-speed segment 224-bit bus 512 mb low-speed segment 32-bit bus peak speed gpu still attained peak speed figure reachable one segment executing read operation segment executing write operation theoretical single-precision processing power maxwell gpu flops computed 2 operations per fma instruction per cuda core per cycle × number cuda cores × core clock speed hz theoretical double-precision processing power maxwell gpu 1/32 single precision performance noted low compared previous generation kepler successor maxwell codenamed pascal pascal architecture features high bandwidth memory unified memory nvlink
|
Computer architecture
|
reference counting computer science reference counting programming technique storing number references pointers handles resource object block memory disk space others garbage collection algorithms reference counts may used deallocate objects longer needed main advantage reference counting tracing garbage collection objects reclaimed soon longer referenced incremental fashion without long pauses collection cycles clearly defined lifetime every object real-time applications systems limited memory important maintain responsiveness reference counting also among simplest forms memory management implement also allows effective management non-memory resources operating system objects often much scarcer memory tracing garbage collection systems use finalizers delayed reclamation may cause problems weighted reference counts good solution garbage collecting distributed system tracing garbage collection cycles triggered often set live objects fills available memory requires extra space efficient reference counting performance deteriorate total amount free space decreases reference counts also useful information use input runtime optimizations example systems depend heavily immutable objects many functional programming languages suffer efficiency penalty due frequent copies however compiler runtime system knows particular object one reference many systems reference lost time similar new object created string append statement codice_1 replace operation mutation original object reference counting naive form two main disadvantages tracing garbage collection require additional mechanisms ameliorate addition memory allocated free list reference counting suffers poor locality reference counting alone move objects improve cache performance high performance collectors implement tracing garbage collector well implementations ones php objective-c suffer poor cache performance since implement copying objects dealing garbage collection schemes often helpful think reference graph directed graph vertices objects edge object object b holds reference b also special vertex vertices representing local variables references held runtime system edges ever go nodes although edges go nodes context simple reference count object in-degree vertex deleting vertex like collecting object done vertex incoming edges affect out-degree vertices affect in-degree vertices causing corresponding objects collected well in-degree also becomes 0 result connected component containing special vertex contains objects ca n't collected connected components graph contain garbage reference-counting garbage collection algorithm implemented garbage components must contain least one cycle otherwise would collected soon reference count i.e. number incoming edges dropped zero incrementing decrementing reference counts every time reference created destroyed significantly impede performance operations take time damage cache performance lead pipeline bubbles even read-only operations like calculating length list require large number reads writes reference updates naive reference counting one simple technique compiler combine number nearby reference updates one especially effective references created quickly destroyed care must taken however put combined update right position premature free avoided deutsch-bobrow method reference counting capitalizes fact reference count updates fact generated references stored local variables ignores references counting references data structures object reference count zero deleted system must verify scan stack registers reference still exists another technique devised henry baker involves deferred increments references stored local variables immediately increment corresponding reference count instead defer necessary reference destroyed quickly need update counter eliminates large number updates associated short-lived references list-length-counting example however reference copied data structure deferred increment must performed time also critical perform deferred increment object count drops zero resulting premature free dramatic decrease overhead counter updates obtained levanoni petrank introduce update coalescing method coalesces many redundant reference count updates consider pointer given interval execution updated several times first points object codice_2 object codice_3 forth end interval points object codice_4 reference counting algorithm would typically execute codice_5 codice_6 codice_7 codice_8 codice_9 ... codice_10 updates redundant order reference count properly evaluated end interval enough perform codice_5 codice_10 rest updates redundant levanoni petrank showed 2001 use update coalescing reference counting collector using update coalescing appropriate treatment new objects 99 counter updates eliminated typical java benchmarks addition need atomic operations pointer updates parallel processors eliminated finally presented enhanced algorithm may run concurrently multithreaded applications employing fine synchronization blackburn mckinley ulterior reference counting method 2003 combines deferred reference counting copying nursery observing majority pointer mutations occur young objects algorithm achieves throughput comparable fastest generational copying collectors low bounded pause times reference counting perhaps obvious way handle reference cycles design system avoid creating system may explicitly forbid reference cycles file systems hard links often judicious use weak non-counted references may also help avoid retain cycles cocoa framework instance recommends using strong references parent-to-child relationships weak references child-to-parent relationships systems may also designed tolerate correct cycles create way developers may design code explicitly tear references data structure longer needed though cost requiring manually track data structure lifetime technique automated creating owner object tearing-down destroyed instance graph object destructor could delete edges graphnodes breaking reference cycles graph cycles may even ignored systems short lives small amount cyclic garbage particularly system developed using methodology avoiding cyclic data structures wherever possible typically expense efficiency computer scientists also discovered ways detect collect reference cycles automatically without requiring changes data structure design one simple solution periodically use tracing garbage collector reclaim cycles since cycles typically constitute relatively small amount reclaimed space collector run much less often ordinary tracing garbage collector bacon describes cycle-collection algorithm reference counting similarities tracing collectors including theoretical time bounds based observation cycle isolated reference count decremented nonzero value objects occurs put roots list periodically program searches objects reachable roots cycles knows found cycle collected decrementing reference counts cycle references brings zero enhanced version algorithm paz et al able run concurrently operations improve efficiency using update coalescing method levanoni petrank although possible augment simple reference counts variety ways often better solution found performing reference counting fundamentally different way describe variants reference counting benefits drawbacks weighted reference counting reference assigned weight object tracks number references referring total weight references referring initial reference newly created object large weight 2 whenever reference copied half weight goes new reference half weight stays old reference since total weight change object reference count need updated destroying reference decrements total weight weight reference total weight becomes zero references destroyed attempt made copy reference weight 1 reference get weight adding total weight adding new weight reference splitting alternative situation create indirection reference object initial reference created large weight split property needing access reference count reference copied particularly helpful object reference count expensive access example another process disk even across network also help increase concurrency avoiding many threads locking reference count increase thus weighted reference counting useful parallel multiprocess database distributed applications primary problem simple weighted reference counting destroying reference still requires accessing reference count many references destroyed cause bottlenecks seek avoid adaptations weighted reference counting seek avoid attempting give weight back dying reference one still active weighted reference counting independently devised bevan watson watson 1987 indirect reference counting necessary keep track reference obtained means two references kept object direct one used invocations indirect one forms part diffusion tree dijkstra-scholten algorithm allows garbage collector identify dead objects approach prevents object discarded prematurely collection algorithm reference counting tracks object count number references held objects object reference count reaches zero object become inaccessible destroyed object destroyed objects referenced object also reference counts decreased removing single reference potentially lead large number objects freed common modification allows reference counting made incremental instead destroying object soon reference count becomes zero added list unreferenced objects periodically needed one items list destroyed simple reference counts require frequent updates whenever reference destroyed overwritten reference count object references decremented whenever one created copied reference count object references incremented reference counting also used file systems distributed systems full non-incremental tracing garbage collection time consuming size object graph slow access speed microsoft component object model com winrt makes pervasive use reference counting fact two three methods com objects must provide iunknown interface increment decrement reference count much windows shell many windows applications including ms internet explorer ms office countless third-party products built com demonstrating viability reference counting large-scale systems one primary motivation reference counting com enable interoperability across different programming languages runtime systems client need know invoke object methods order manage object life cycle thus client completely abstracted whatever memory allocator implementation com object uses typical example visual basic program using com object agnostic towards whether object allocated must later deallocated c++ allocator another visual basic component c++ perform reference-counting default fulfilling philosophy adding functionality might incur overheads user explicitly requested objects shared owned accessed via reference raw pointer iterator conceptual generalisation pointers however token c++ provides native ways users opt-into functionality c++11 provides reference counted smart pointers via class enabling automatic shared memory-management dynamically allocated objects programmers use conjunction weak pointers via break cyclic dependencies objects dynamically allocated intended shared lifetime automatically managed using addition c++11 move semantics reduce extent reference counts need modified removing deep copy normally used function returns object allows simple copy pointer said object apple cocoa cocoa touch frameworks related frameworks core foundation use manual reference counting much like com traditionally accomplished programmer manually sending codice_13 codice_14 messages objects automatic reference counting clang compiler feature automatically inserts messages needed added ios 5 mac os x 10.7 mac os x 10.5 introduced tracing garbage collector alternative reference counting deprecated os x 10.8 removed objective-c runtime library macos sierra ios never supported tracing garbage collector one language uses reference counting garbage collection delphi delphi mostly garbage collected language user-defined types must still manually allocated deallocated provide automatic collection however built-in types strings dynamic arrays interfaces ease use simplify generic database functionality programmer decide whether use built-in types delphi programmers complete access low-level memory management like c/c++ potential cost delphi reference counting desired easily circumvented reasons reference counting may preferred forms garbage collection delphi include gobject object-oriented programming framework implements reference counting base types including weak references reference incrementing decrementing uses atomic operations thread safety significant amount work writing bindings gobject high-level languages lies adapting gobject reference counting work language memory management system vala programming language uses gobject reference counting primary garbage collection system along copy-heavy string handling perl also uses reference counting without special handling circular references although cocoa c++ perl support weak references allows programmers avoid creating cycle php uses reference counting mechanism internal variable management since php 5.3 implements algorithm bacon mentioned paper php allows turn cycle collection user-level functions also allows manually force purging mechanism run python also uses reference counting offers cycle detection well reclaim squirrel also uses reference counting offers cycle detection well tiny language relatively unknown outside video game industry however concrete example reference counting practical efficient especially realtime environments tcl 8 uses reference counting memory management values tcl obj structs since tcl values immutable reference cycles impossible form cycle detection scheme needed operations would replace value modified copy generally optimized instead modify original reference count indicates unshared references counted data structure level problems frequent updates discussed arise xojo also uses reference counting without special handling circular references although cocoa c++ xojo support weak references allows programmers avoid creating cycle many file systems maintain count number references particular block file example inode link count unix-style file systems references usually called hard links count falls zero file safely deallocated addition references still made directories unixes allow referencing solely made live processes files exist file system hierarchy
|
Operating systems
|
windows template library windows template library wtl free software object-oriented c++ template library win32 development wtl created microsoft employee nenad stefanovic internal use later released unsupported add-on visual studio win32 framework sdk developed primarily light-weight alternative microsoft foundation classes builds upon microsoft atl another lightweight api widely used create com activex libraries wtl provides support implementing various user interface elements frame popup windows mdi standard common controls common dialogs property sheets pages gdi objects common ui elements scrollable windows splitter windows toolbars command bars wtl main objective deliver small efficient code close size speed straight sdk programs providing higher-level flexible object model developers classes string wrapper syntax-compatible mfc codice_1 templated collections also included wtl api mirror standard win32 calls interface tends familiar windows programmers although official documentation microsoft exists wtl documentation project attempting create comprehensive reference library wtl supported microsoft product support services wtl template library therefore code-based original license similar one used microsoft foundation class library mfc source code although contained usage distribution restrictions 2004 microsoft made complete source code available common public license released sourceforge since version 9.1 library licensed microsoft public license
|
Operating systems
|
robert s. boyer robert stephen boyer retired professor computer science mathematics philosophy university texas austin j strother moore invented boyer–moore string search algorithm particularly efficient string searching algorithm 1977 moore also collaborated boyer–moore automated theorem prover nqthm 1992 following worked moore matt kaufmann another theorem prover called acl2 boyer published extensively including following books
|
Programming language topics
|
veniam veniam technology startup intelligent networking platform moves massive amounts data connected vehicles cloud veniam unique mobile-data platform built future based autonomous vehicles avs emerging “ internet moving things ” brings three essential enablers vision truly smart cities multinetwork mesh networking local data management low-latency company headquartered mountain view california founded 2012 company received 4.9 million dollars 2014 funding round true ventures usv cane investments veniam technology used porto city buses 230,000 users onboard units obus installed 600 buses taxis garbage trucks aim equip many moving things wireless hotspots creating mesh could used build sensors turn city smarter.each vehicle equipped netrider multi network unit wi-fi 802.11p dsrc gps 4g/lte connectivity veniam founded joão barros ceo roy russell former zipcar cto susana sargento professor university aveiro robin chase former ceo zipcar buzzcar veniam platform
|
Distributed computing architecture
|
action description language artificial intelligence action description language adl automated planning scheduling system particular robots considered advancement strips edwin pednault specialist field data abstraction modelling ibm research staff member data abstraction research group since 1996 proposed language 1987 example action language pednault observed expressive power strips susceptible improved allowing effects operator conditional main idea adl-a basically propositional fragment adl proposed pednault adl-b extension -a -b extension actions described indirect effects introduction new kind propositions ” static laws third variation adl adl-c similar -b sense propositions classified static dynamic laws particularities sense planning language represent certain conditions environment based automatically generate chain actions lead desired goal goal certain partially specified condition action executed preconditions must fulfilled execution action yields effects environment changes environment described means certain predicates either fulfilled contrary strips principle open world applies adl everything occurring conditions unknown instead assumed false addition whereas strips positive literals conjunctions permitted adl allows negative literals disjunctions well adl schema consists action name optional parameter list four optional groups clauses labeled precond add delete update precond group list formulae define preconditions execution action set empty value true inserted group preconditions always evaluated holding conditions add delete conditions specified add delete groups respectively group consists set clauses forms shown left-hand column figure 1 update groups used specify update conditions change values function symbols update group consists set clauses forms shown left column figure 2 formal semantic adl defined 4 constraints first constraint actions may change set objects exist world means every action α every current-state/next-state pair ∈ must case domain equal domain second constraint actions adl must deterministic current-state/next-state pairs action ∃ must case third constraint incorporated adl functions introduced must representable first-order formulas every n -ary relation symbol r must exist formula φ x ... x free variables x ... x f given consequently f n ... x true performing action |= φ x ... x true beforehand note representability requirement relies first constraint domain f equal domain fourth final constraint incorporated adl set states action executable must also representable formula every action α represented adl must exist formula π property |= π state ∈ α i.e action α executable state terms computational efficiency adl located strips situation calculus adl problem translated strips instance – however existing compilation techniques worst-case exponential worst case improved willing preserve length plans polynomially thus adl strictly brief strips adl planning still pspace-complete problem algorithms polynomial space even preconditions effects complex formulae top-performing approaches classical planning internally utilize strips like representation fact planners ff lpg fast-downward sgplan5 lama first translate adl instance one essentially strips one without conditional quantified effects goals expressiveness strips language constrained types transformations sets formulas described language transformations sets formulas using strips operators accomplished removing formulas set transformed adding new additional formulas given strips operator formulas added deleted fixed sets formulas transformed consequently strips operators adequately model actions whose effects depend situations performed consider rocket going fired certain amount time trajectory may vary burn duration also velocity mass orientation rocket modelled means strips operator formulas would added deleted would depend set formulas transformed although efficient reasoning possible strips language used generally recognized expressiveness strips suitable modeling actions many real world applications inadequacy motivated development adl language adl expressiveness complexity lies strips language situation calculus expressive power sufficient allow rocket example described represented yet time restrictive enough allow efficient reasoning algorithms developed example complex version blocks world could block twice big blocks b c action xmoveonto b might effect negating clear c already true creating conditional effect depending size blocks kind conditional effects would hard express strips notation without conditional effects consider problem air freight transport certain goods must transported airport another airport plane airplanes need loaded unloaded necessary actions would loading unloading flying descriptors one could express whether freight c airplane p whether object x airport actions could defined follows
|
Programming language topics
|
desktoptwo desktoptwo free webtop whose url desktoptwo.com parked domain developed sapotek whose url sapotek.com also parked domain also called webos although sapotek stated website term premature presumptuous mimics look feel functionality desktop environment operating system software reached beta stage spanish version called computadora.de desktoptwo web-based required adobe flash player operate web applications found desktoptwo built php back end features included drag-and-drop functionality sapotek liberated web applications found desktoptwo sapodesk agpl license desktoptwo belonged category services intended turn web full-fledged platform using web services foundation along presentation technologies replicated experience desktop applications users cloud os functionality server granularized abstracted web services web developers used create composite applications similar desktop software developers use several apis os create applications sites like facebook attempt create similar effect exposing apis allowing developers create applications upon features found desktoptwo file sharing webmail blog creator instant messenger address book calendar rss reader office productivity applications desktoptwo.com since closed longer running goes sapotek website sapotek since gone public market closed doors
|
Distributed computing architecture
|
moblock moblock free software blocking connections specified range hosts moblock ip address filtering program linux similar peerguardian microsoft windows development stopped favor phoenix labs official peerguardian linux parts code merged peerguardian linux
|
Computer security
|
referential transparency referential transparency referential opacity properties parts computer programs expression called referentially transparent replaced corresponding value without changing program behavior requires expression pure say expression value must inputs evaluation must side effects expression referentially transparent called referentially opaque mathematics function applications referentially transparent definition constitutes mathematical function however always case programming terms procedure method used avoid misleading connotations functional programming referentially transparent functions considered programming languages provide means guarantee referential transparency functional programming languages enforce referential transparency functions importance referential transparency allows programmer compiler reason program behavior rewrite system help proving correctness simplifying algorithm assisting modifying code without breaking optimizing code means memoization common subexpression elimination lazy evaluation parallelization concept seems originated alfred north whitehead bertrand russell principia mathematica 1910–13 adopted analytical philosophy willard van orman quine §30 word object 1960 quine gives definition mode containment φ referentially transparent whenever occurrence singular term purely referential term sentence ψ purely referential also containing term sentence φ ψ term appeared contemporary usage discussion variables programming languages christopher strachey seminal set lecture notes fundamental concepts programming languages 1967 lecture notes referenced quine word object bibliography functions involved expression pure functions expression referentially transparent consider function returns input source pseudocode call function might codice_1 codice_2 might identify particular disk file keyboard etc even identical values codice_2 successive return values different therefore function codice_4 neither deterministic referentially transparent subtle example function free variable i.e. depends input explicitly passed parameter resolved according name binding rules non-local variable global variable variable current execution environment dynamic binding variable closure static binding since variable altered without changing values passed parameter results subsequent calls function may differ even parameters identical however pure functional programming destructive assignment allowed thus free variable statically bound value function still referentially transparent neither non-local variable value change due static binding immutability respectively arithmetic operations referentially transparent codice_5 replaced codice_6 instance fact functions mathematical sense referentially transparent codice_7 transparent since always give result particular codice_8 assignments transparent instance c expression codice_9 changes value assigned variable codice_8 assuming codice_8 initially value codice_12 two consecutive evaluations expression yield respectively codice_13 codice_14 clearly replacing codice_9 either codice_13 codice_14 gives program different meaning expression referentially transparent however calling function codice_18 transparent implicitly change input x thus side effects codice_19 transparent evaluate replace value say jan 1 2001 n't get result run tomorrow depends state date languages side-effects like haskell substitute equals equals codice_20 every value x hold languages side-effects substitution expression value valid certain point execution program expression referentially transparent definition ordering sequence points theoretical foundation imperative programming part semantics imperative programming language however referentially transparent expression evaluated time necessary define sequence points guarantee order evaluation programming done without considerations called purely functional programming one advantage writing code referentially transparent style given intelligent compiler static code analysis easier better code-improving transformations possible automatically example programming c performance penalty including call expensive function inside loop even function call could moved outside loop without changing results program programmer would forced perform manual code motion call possibly expense source code readability however compiler able determine function call referentially transparent perform transformation automatically primary disadvantage languages enforce referential transparency make expression operations naturally fit sequence-of-steps imperative programming style awkward less concise languages often incorporate mechanisms make tasks easier retaining purely functional quality language definite clause grammars monads example let use two functions one referentially opaque referentially transparent function codice_21 referentially transparent means codice_22 codice_23 instance codice_24 however ca n't say thing codice_25 uses global variable modifies referential opacity codice_25 makes reasoning programs difficult example say wish reason following statement one may tempted simplify statement however work codice_27 occurrence codice_28 evaluates different value remember return value codice_25 based global value n't passed gets modified call codice_25 means mathematical identities formula_1 longer hold mathematical identities hold referentially transparent functions codice_21 however sophisticated analysis used simplify statement takes steps requires degree insight code infeasible compiler optimization therefore referential transparency allows us reason code lead robust programs possibility finding bugs could n't hope find testing possibility seeing opportunities optimization
|
Programming language topics
|
samsung ativ tab samsung ativ tab tablet manufactured samsung ativ tab announced august 29 2012 ifa 2012 incorporates dual-core 1.2 ghz qualcomm snapdragon s4 processor runs windows rt operating system despite mixed reception windows rt operating system received comparison windows 8 ativ tab received positive reviews lightweight design ability use usb peripherals overall performance first generation windows rt device ativ tab released december 2012 united kingdom release germany united states cancelled due lukewarm reception unclear positioning windows rt design ativ tab relatively similar android-based counterparts galaxy note 10.1 built using mixture plastic glass micro hdmi port microsd slot full-size usb port incorporated design well volume rocker power button headphone jack located top physical windows button located directly screen charging port dock connector located bottom ativ tab uses ips display resolution 1366x768 tablet available either 32 gb 64 gb internal storage ativ tab originally scheduled release united kingdom november 2012 alongside windows phone 8 counterpart samsung ativ delayed mid-december release devices eventually held december 14 2012 january 2013 samsung announced cancelled american release ativ tab citing unclear positioning windows rt operating system modest demand windows rt devices plus effort investment required educate consumers differences windows 8 rt reasons move mike abary senior vice president samsung u.s. pc tablet businesses also stated company unable build ativ tab meet target price pointconsidering lower cost intended selling point windows rt devices samsung also reportedly planned pull ativ tab germany unspecified european markets similar reasons whilst demoing device ifa techradar praised ativ tab crisp screen lightweight design ability expand functionality storage usb port microsd card slot however also said processor relatively responsive certainly n't league galaxy note 2 anandtech said despite best substitute actual notebook due lagging performance arm-based processors rushed nature os ativ tab well executed first-generation windows rt device tablet relatively snappy performance battery life lightweight design regarded positive aspectsdespite considering design nothing particularly new exciting qualcomm apq8060a chipset used ativ tab also judged best processor windows rt far noting performance sufficient surprisingly competitive comparison chipsets used competing windows rt devices rear camera considered neither horrible great lack keyboard accessory dock connector also noted
|
Operating systems
|
computer recycling computer recycling electronic recycling e-waste recycling disassembly separation components raw materials waste electronics although procedures re-use donation repair strictly recycling common sustainable ways dispose waste 2009 38 computers quarter total electronic waste recycled united states 5 3 3 years prior respectively since inception early 1990s devices recycled worldwide due increased awareness investment electronic recycling occurs primarily order recover valuable rare earth metals precious metals short supply well plastics metals resold used new devices purification effect creating circular economy however one also make use useful components dead computers may damaged beyond repair make use parts new computers may cover material costs another cheap way recycling homes working areas recycling considered environmentally friendly prevents hazardous waste including heavy metals carcinogens entering atmosphere landfill waterways electronics consist small fraction total waste generated far dangerous stringent legislation designed enforce encourage sustainable disposal appliances notable waste electrical electronic equipment directive european union united states national computer recycling act obsolete computers old electronics valuable sources secondary raw materials recycled otherwise devices source toxins carcinogens rapid technology change low initial cost planned obsolescence resulted fast-growing surplus computers electronic components around globe technical solutions available cases legal framework collection system logistics services need implemented applying technical solution u.s. environmental protection agency estimates 30 40 million surplus pcs classified hazardous household waste would ready end-of-life management next years u.s. national safety council estimates 75 personal computers ever sold surplus electronics 2007 united states environmental protection agency epa stated 63 million computers u.s. traded replacements discarded today 15 electronic devices equipment recycled united states electronic waste sent landfills incinerated releases materials lead mercury cadmium soil groundwater atmosphere thus negative impact environment many materials used computer hardware recovered recycling use future production reuse tin silicon iron aluminium variety plastics present bulk computers electronics reduce costs constructing new systems components frequently contain copper gold tantalum silver platinum palladium lead well valuable materials suitable reclamation computer components contain many toxic substances like dioxins polychlorinated biphenyls pcbs cadmium chromium radioactive isotopes mercury typical computer monitor may contain 6 lead weight much lead glass cathode ray tube crt typical 15 inch 38 cm computer monitor may contain lead monitors estimated lead circuit boards contain considerable quantities lead-tin solders likely leach groundwater create air pollution due incineration us landfills 40 lead content levels e-waste processing e.g incineration acid treatments required reclaim precious substances may release generate synthesize toxic byproducts export waste countries lower environmental standards major concern basel convention includes hazardous wastes limited crt screens item may exported transcontinentally without prior consent country exporting receiving waste companies may find cost-effective short term sell outdated computers less developed countries lax regulations commonly believed majority surplus laptops routed developing nations high value working reusable laptops computers components e.g ram help pay cost transportation many worthless commodities laws governing exportation waste electronics put place govern recycling companies developed countries ship waste third world countries however concerns impact e-recycling human health health recycling workers environmental degradation remain example due lack strict regulations developing countries sometimes workers smash old products propelling toxins ground contaminating soil putting wear shoes danger procedures include burning away wire insulation acid baths resell circuit boards methods pose environmental health hazards toxins released air acid bath residue enter water supply switzerland first electronic waste recycling system implemented 1991 beginning collection old refrigerators years electric electronic devices gradually added system established producer responsibility organization swico mainly handling information communication organization technology european union implemented similar system february 2003 waste electrical electronic equipment directive weee directive 2002/96/ec pan european adoption legislation slow take-up italy united kingdom final member states pass law success weee directive varied significantly state state collection rates varying 13 kilograms per capita per annum little 1 kg per capita per annum computers electronic wastes collected households within europe treated weee directive via producer compliance schemes whereby manufacturers electronics pay scheme funds recovery household waste recycling centres hwrcs nominated waste treatment facilities known obligated weee however recycling ex corporate computer hardware associated electronic equipment falls outside producer compliance scheme known non-obligated uk waste obsolete corporate related computer hardware treated via third party authorized treatment facilities normally impose charge collection treatment united states congress considers number electronic waste bills like national computer recycling act introduced congressman mike thompson d-ca main federal law governing solid waste resource conservation recovery act 1976 covers crts though state regulations may differ also separate laws concerning battery disposal march 25 2009 house science technology committee approved funding research reducing electronic waste mitigating environmental impact regarded sponsor ralph hall r-tx first federal bill directly address electronic waste many states introduced legislation concerning recycling reuse computers computer parts electronics american computer recycling legislations address within larger electronic waste issue 2001 arkansas enacted arkansas computer electronic solid waste management act requires state agencies manage sell surplus computer equipment establishes computer electronics recycling fund authorizes department environmental quality regulate and/or ban disposal computer electronic equipment arkansas landfills recently passed electronic device recycling research development act distributes grants universities government labs private industries research developing projects line e-waste recycling refurbishment japan sellers manufacturers certain electronics televisions air conditioners required recycle covered least two legislations law promotion effective utilization resources lpur law recycling specified kinds home appliances lrha former passed 2001 encouraged manufacturers voluntarily help recycle goods lrha adopted 2009 required recycling efforts consumers manufacturers home appliances however legislation exists cover recycling computer cellphone-related wastes required south korea taiwan sellers manufacturers electronics responsible recycling 75 used products south korea local governments introduced recycling initiatives case seoul launched specialized e-waste recycling program includes sr center recycling facility takes apart salvages materials fifth 10-ton e-waste city generates year according report unep titled recycling – e-waste resources amount e-waste produced – including mobile phones computers – could rise much 500 percent next decade countries india one theory increased regulation electronic waste concern environmental harm mature economies creates economic disincentive remove residues prior export critics trade used electronics maintain easy brokers calling recyclers export unscreened electronic waste developing countries china india parts africa thus avoiding expense removing items like bad cathode ray tubes processing expensive difficult developing countries becoming big dump yards e-waste proponents international trade point success fair trade programs industries cooperation led creation sustainable jobs bring affordable technology countries repair reuse rates higher organizations like a2z group stepped responsibility collect recycle e-waste various locations india thanks national environmental management act 1998 national environmental management waste act 2008 person position causing harm environment failing comply waste act could fined r10 million put jail receive penalties transgressions consumer recycling options consists see sale donating computers directly organizations need sending devices directly back original manufacturers getting components convenient recycler refurbisher rising price precious metals — coupled high rate unemployment great recession — led larger number amateur profit electronics recyclers computer parts example stripped valuable components sold scrap metals like copper aluminium lead gold palladium recovered computers televisions recycling process tvs monitors mobile phones computers typically tested reuse repaired broken may disassembled parts still high value labour cheap enough e-waste shredded roughly 100 mm pieces manually checked separate toxic batteries capacitors contain poisonous metals remaining pieces shredded ~10 mm passed magnet remove ferrous metals eddy current ejects non-ferrous metals sorted density either centrifuge vibrating plates precious metals dissolved acid sorted smelted ingots remaining glass plastic fractions separated density sold re-processors tvs monitors must manually disassembled remove either toxic lead crts mercury flat screens corporations face risks incompletely destroyed data improperly disposed computers uk recycling companies use specialized weee-registered contractor dispose equipment electrical appliances disposes safely legally america companies liable compliance regulations even recycling process outsourced resource conservation recovery act companies mitigate risks requiring waivers liability audit trails certificates data destruction signed confidentiality agreements random audits information security national association information destruction international trade association data destruction providers online auctions alternative consumers willing resell cash less fees complicated self-managed competitive environment paid listings might sell online classified ads similarly risky due forgery scams uncertainty researching computer companies computer purchase consumers find offer recycling services major computer manufacturers offer form recycling user request may mail old computers arrange pickup manufacturer hewlett-packard also offers free recycling one national recycling programs available nationally rather one two specific states hewlett-packard also offers pick computer product brand fee offer coupon purchase future computers components largest computer recycler america 2003 recycled electronic waste globally since 1995 encourages shared approach collection points consumers recyclers meet manufacturers often offer free replacement service purchasing new pc dell computers apple inc. take back old products one buys new one refurbish resell computers one-year warranty many companies purchase recycle brands working broken laptops notebook computers individuals corporations building market recycling desktop computers proven difficult exchange programs laptops smartphones smaller electronics basic business model provide seller instant online quote based laptop characteristics send shipping label prepaid box seller erase reformat process laptop pay rapidly cheque majority companies also generalized electronic waste recyclers well organizations recycle computers exclusively include cash laptops laptop refurbisher nevada claims first buy laptops online 2001 constant rising costs due inflation many families schools sufficient funds available computers utilized along education standards families also impacted disaster suffer well due financial impact situation incurred many nonprofit organizations interconnection.org found locally well around web give detailed descriptions methods used dissemination detailed instructions donate impact seen locally globally affecting thousands need canada non profit organizations engaged computer recycling electronic recycling association calgary edmonton vancouver winnipeg toronto montreal computers schools canada wide active collecting refurbishing computers laptops help non profit charitable sectors schools term junkyard computing colloquial expression using old inferior hardware fulfill computational tasks handling reliability availability software level utilizes abstraction computational resources via software allowing hardware replacement low effort ease replacement hereby corner point since hardware failures expected time due condition underlying infrastructure paradigm became widely used introduction cluster orchestration software like kubernetes apache mesos since large monolithic applications require reliability availability machine level whereas kind software fault tolerant design orchestration tools also introduced fairly fast set-up processes allowing use junkyard computing economically even making pattern applicable first place use cases introduced continuous delivery getting widely accepted infrastructure execute tests static code analysis needed requires much performance possible extremely cost effective economical technological perspective junkyard computing practicable small number users companies already requires decent number physical machines compensate hardware failures maintaining required reliability availability implies direct need matching underling infrastructure house computers servers scaling paradigm also quite limited due increasing importance factors like power efficiency maintenance efforts making kind computing perfect mid-sized applications although consumer electronics radio popular since 1920s recycling almost unheard early 1990s end 1970s accelerating pace domestic consumer electronics drastically shortened lifespan electronics tvs vcrs audio new innovations appeared quickly making older equipment considered obsolete increased complexity sophistication manufacture made local repair difficult retail market shifted gradually substantially high-value items cherished years repaired necessary short-lived items rapidly replaced owing wear simply fashion discarded rather repaired particularly evident computing highlighted moore law 1988 two severe incidents highlighted approaching e-waste crisis cargo barge khian sea loaded 14,000 tons toxic ash pennsylvania refused acceptance new jersey caribbean sailing 16 months waste dumped topsoil fertiliser haiti bay bengal november 1988 june 1988 large illegal toxic waste dump created italian company discovered led formation basel convention stem flow poisonous substances developed countries 1989 1991 first electronic waste recycling system implemented switzerland beginning collection old refrigerators gradually expanding cover devices organisation swico handles programme partnership retailers first publication report recycling computers electronic waste published front page new york times april 14 1993 columnist steve lohr detailed work advanced recovery inc. small recycler trying safely dismantle computers even waste landfilled several companies emerged early 1990s chiefly europe national 'take back laws compelled retailers use schemes set many countries capacity deal sheer quantity e-waste generated hazardous nature began export problem developing countries without enforced environmental legislation cheaper cost recycling computer monitors us ten times china demand asia electronic waste began grow scrap yards found could extract valuable substances copper iron silicon nickel gold recycling process waste electrical electronic equipment directive weee directive became european law february 2003 covers aspects recycling types appliance followed electronic waste recycling act enshrined californian law january 2005 2000s saw large increase sale electronic devices growth waste stream 2002 e-waste grew faster type waste eu caused investment modern automated facilities cope influx redundant appliances e-cycling e-waste initiative united states environmental protection agency epa refers donations reuse shredding general collection used electronics generically term refers process collecting brokering disassembling repairing recycling components metals contained used discarded electronic equipment otherwise known electronic waste e-waste e-cyclable items include limited televisions computers microwave ovens vacuum cleaners telephones cellular phones stereos vcrs dvds anything cord light takes kind battery investment e-cycling facilities increasing recently due technology ’ rapid rate obsolescence concern improper methods opportunities manufacturers influence secondary market used reused products higher metal prices also recycling taking place controversy around methods stems lack agreement preferred outcomes world markets lower disposable incomes consider 75 repair reuse valuable enough justify 25 disposal debate certification standards may leading better definitions though civil law contracts governing expected process still vital contracted process poorly defined e-cycling e-waste disposal occurring processing reuse repair equipment recovery metals may unethical illegal e-scrap many kinds transported overseas developing countries processing transported repaired and/or recycled processing less valuable e-scrap becomes e-waste/pollution another point view net environmental cost must compared include mining refining extraction waste pollution cost new products manufactured replace secondary products routinely destroyed wealthier nations economically repaired older obsolete products example negative impacts e-waste pollution groundwater become serious areas surrounding china ’ landfills water must shipped away however mining new metals even broader impacts groundwater either thorough e-cycling processing domestic processing overseas repair help environment avoiding pollution e-cycling theoretically sustainable alternative disposing e-waste landfills addition e-cycling allows reclamation potential conflict minerals like gold wolframite requires less mined lessens potential money flow militias exploitative actors third-world profit mining supporters one form required e-cycling legislation argue e-cycling saves taxpayers money financial responsibility would shifted taxpayer manufacturers advocates simple legislation landfill bans e-waste argue involving manufacturers reduce cost consumers reuse value lost resulting costs passed consumers new products particularly affecting markets hardly afford new products theorized manufacturers take part e-cycling would motivated use fewer materials production process create longer lasting products implement safer efficient recycling systems theory sharply disputed never demonstrated critics e-cycling vocal advocates according reason foundation e-cycling raises product waste management costs e-waste consumers limits innovation part high-tech companies also believe e-cycling facilities could unintentionally cause great harm environment critics claim e-waste ’ occupy significant portion total waste according european study 4 waste electronic another opposition e-cycling many problems posed disassembly process costly dangerous heavy metals electronic products composed little 1–5 original cost materials retrieved final problem people find identity fraud common regards disposal electronic products programs legislated creating winners losers among e-cyclers different locations processes may difficult distinguish criticism e-cycling practice criticism specific legislated means proposed enhance hefty criticism often lobbed reuse based recyclers people think recycling electronic waste reality actually exported developing countries like china india nigeria instance free recycling drives recyclers may staying true word selling e-waste overseas parts brokers studies indicate 50–80 300,000 400,000 tons 270,000 360,000 tonnes e-waste sent overseas approximately 2 million tons 1.8 million tonnes per year go u.s. landfills although possible circumstances best way e-cycle upcycle e-waste hand electronic products question generally manufactured repaired warranty nations anti-reuse recyclers depict primitive reuse-based e-recyclers believe fair-trade incentives export markets lead better results domestic shredding continued debate export-friendly e-cycling increased regulation practice european union debate regarding export e-waste resulted significant amendment weee directive january 2012 view significantly diminishing export weee untreated e-waste debate strasburg meps stated 53 million tonnes weee generated 2009 18 collected recycling remainder exported sent landfill amendment voted unanimous 95 representatives removed re-use repair refurbishmet aspect directive placed emphasis upon recycling recovery precious metals base metals changes went placing burden upon registered exporters prove used equipment leaving europe fit purpose currently pieces government legislation number grassroots efforts contributed growth e-cycling processes emphasize decreased exports increased reuse rates electronic waste recycling act passed california 2003 requires consumers pay extra fee certain types electronics collected money redistributed recycling companies qualified properly recycle products state legislates e-waste kind consumer fee states efforts focus producer responsibility laws waste disposal bans study shown per capita recovery greater one type legislated program e.g california versus ordinary waste disposal bans e.g massachusetts though recovery greatly increased states use either method september 2006 dell developed nation ’ first completely free recycling program furthering responsibilities manufacturers taking e-cycling manufacturers retailers best buy sony samsung also set recycling programs program accept televisions expensive used electronic item unpopular markets must deal televisions valuable computers cherry picked another step taken recyclers ’ pledge true stewardship sponsored computer takeback campaign signed numerous recyclers promising recycle responsibly grassroots efforts also played big part issue community organizations formed help responsibly recycle e-waste grassroots campaigns basel computer takeback campaign co-coordinated grassroots recycling network silicon valley toxics coalition study shown difference recycling methods pledge data available demonstrate difference management pledge non-pledge companies though assumed risk making false claims prevent pledge companies wrongly describing processes many people believe u.s. follow european union model regards management e-waste refers concept extended producer responsibility started sweden 1990 program directive forces manufacturers take responsibility e-cycling also demands manufacturers mandatory take-back places bans exporting e-waste developing countries british columbia 20 epr programs recycling regulation legislation stops e-waste put landfills recycles instead 80 programs canada 2013 another longer-term solution computers composed less dangerous products many people disagree data provided show people agree european model based agreement measured outcomes experience-based scientific method e-waste presents potential security threat individuals exporting countries hard drives properly erased computer disposed reopened exposing sensitive information credit card numbers private financial data account information records online transactions accessed willing individuals organized criminals ghana commonly search drives information use local scams government contracts discovered hard drives found agbogbloshie ghana multimillion-dollar agreements united states security institutions defense intelligence agency dia transportation security administration homeland security resurfaced agbogbloshie ways ensure hardware destroyed also private data hard drive customer data stolen lost misplaced contributes ever-growing number people affected identity theft cause corporations lose money image company holds secure data banks law firms pharmaceuticals credit corporations also risk company public image hurt could cause consumers use services could cost millions business losses positive public relation campaigns cost data breaches varies widely ranging 90 50,000 hipaa new hitech amendment came american recovery revitalization act 2009 per customer record depending whether breach “ low-profile ” “ high-profile ” company non-regulated highly regulated area banking medical institutions. ” also major backlash consumer data breach company supposed trusted protect private information organization consumer info file must law red flags clarification act 2010 written information protection policies procedures place serve combat mitigate detect vulnerable areas could result identity theft united states department defense published standard recyclers individuals may meet order satisfy hipaa requirements countries developed standards aimed businesses purpose ensuring security data contained 'confidential computer media nist 800-88 us standard data remenance hmg cesg is5 baseline enhanced uk government protocol data destruction national association information destruction naid international trade association companies providing information destruction services suppliers products equipment services destruction companies also eligible membership naid mission promote information destruction industry standards ethics member companies companies follow guidelines naid also meet federal epa local dep regulations typical process computer recycling aims securely destroy hard drives still recycling byproduct typical process effective computer recycling asset disposal information security alliance adisa publishes adisa asset disposal security standard covers phases e-waste disposal process collection transportation storage sanitization disposal facility also conducts periodic audits disposal vendors
|
Computer security
|
fma instruction set fma instruction set extension 128 256-bit streaming simd extensions instructions x86 microprocessor instruction set perform fused multiply–add fma operations two variants fma3 fma4 instructions almost identical functionality compatible contain fused multiply–add fma instructions floating-point scalar simd operations fma3 instructions three operands fma4 ones four fma operation form round · b c round function performs rounding allow result fit within destination register many significant bits fit within destination four-operand form fma4 allows b c four different registers three-operand form fma3 requires register b c three-operand form makes code shorter hardware implementation slightly simpler four-operand form provides programming flexibility see xop instruction set discussion compatibility issues intel amd incompatibility intel fma3 amd fma4 due companies changing plans without coordinating coding details amd changed plans fma3 fma4 intel changed plans fma4 fma3 almost time history summarized follows different compilers provide different levels support fma4
|
Computer architecture
|
rastan video game released rastan outside japan fantasy-themed side-scrolling action game originally released arcades 1987 taito later ported various platforms player controls barbarian warrior embarked quest slay dragon way dragon lair rastan must fight hordes enemy monsters based mythical creatures chimeras harpies controls rastan consists eight-way joystick two buttons attacking jumping using joystick combination either buttons player determine height rastan jumps well direction swings weapon including downwards jumping game uses health gauge system along limited lives although certain obstacles falling body water crushed spiked ceiling instantly kill rastan regardless much health left total six rounds consisting three areas outdoor scene castle scene throne room player must confront stage boss backgrounds outdoor areas feature broad landscapes changing sunlight effects detail game bosses names according msx2 version order appearance consist player pick item touching well new weapons striking current one weapons power-ups picked rastan equipped limited time rastan picks equipable item icon appear lower right corner screen indicator item effect wears rastan wield one weapon time consists mace axe fireball-shooting sword addition standard sword well one type protector shield mantle body armor items necklace ring worn time also jewels gives bonus points well potion bottles restore deplete player health depending color rare golden sheep head restore rastan health completely used thief murderer otherwise could survive difficult times sit beside listen story days filled adventure succeeded obtaining consent princess ceim exchange dragon head kingdom treasures started quest dragon lair journey begun moment lose must hurry seem cursed dragon expected kill dragon situation getting serious afford die yet regret making promise late withdraw one still alive hang dragon come right away cut head obtaining princess treasures left kingdom ceim search country ruler part long story becoming king chance 'll tell adventurous stories rastan saga japanese version features opening sequence player starts game explains purpose rastan journey included export versions simply titled rastan also japanese version player completes stage round victory screen text pertaining storyline overseas versions generic victory screen generic text brave fighter cleared difficult stage. however overseas versions feature different attract sequence shows items obtained player along effect rastan saga far fewer bats bat swarm sequences castle level 1 rastan rastan initially ported various 8-bit home computers europe commodore 64 zx spectrum amstrad cpc imagine software 1987 zx spectrum version awarded 9/10 july 1988 issue sinclair placed number 54 sinclair top 100 list taito imported imagine c64 version united states releasing alongside two additional versions ibm pc apple iigs ported novalogic previously unreleased version atari st discovered demo form 1988 taito developed conversions msx2 japan master system north america europe ports featured redesigned level layouts master system version replacing boss characters well rastan released formation esrb one two known games sega master system feature frontal female nudity miracle warriors in-game sprites illustrations instruction manual depict several female enemy monsters topless fully nude version later ported game gear released exclusively japan august 9 1991 rastan saga emulation rastan arcade game included taito legends vol 1 released playstation 2 xbox windows pc 2006 game followed two sequels rastan saga ii also known two names nastar europe nastar warrior north america rastan also made appearance another taito game titled champion wrestler miracle rastan saffire corporation developed game barbarian released name warrior blade rastan vs. barbarian japan taito published game region game nothing rastan saga dispute title change game released playstation 2 also country get nintendo gamecube version release cancelled north america europe due poor sales indie game völgarr viking developed crazy viking studios windows os x linux xbox one dreamcast described kickstarter page based rastan
|
Computer architecture
|
commercial product assurance commercial product assurance cpa cesg approach gaining confidence security commercial products intended supplant approaches common criteria cc cct mark uk government use cpa developed auspices uk government cesg uk national technical authority nta information security cesg also produce architectural patterns cover good practices common business problems looks use cpa product current architectural patterns include comparison schemes
|
Computer security
|
aria storage engine aria storage engine mariadb mysql relational database management systems goal make crash-safe alternative myisam yet transactional plans add proper support database transactions point future long-term goal aria default transactional non-transactional storage engine mariadb development since 2007 first announced michael monty widenius blog aria used internal temporary tables mariadb community-developed branch mysql database led widenius aria shipped mysql percona server included tokudb release mariadb maria project hosted launchpad aria initially named maria reference monty youngest child renamed aria 2010 avoid confusion main database developed mariadb aria maria without also pleasant musical term aria similar myisam purpose crash-safe alternative myisam aria support foreign keys currently transactions aria supports non-partitioned aria tables consist three physical files .frm file contains table definition file exists storage engines write data disk .mad file contains data .mai file contains indexes three table formats available aria tables page format available transactional tables fixed dynamic formats used myisam mainly implemented compatibility however myisam compressed format available aria order set table format one use row_format option create table alter table command
|
Databases
|
messaging layer security messaging layer security mls security layer end-to-end encrypting messages groups size two many built ietf mls working group designed efficient practical secure security properties mls include message confidentiality message integrity authentication membership authentication asynchronicity forward secrecy post-compromise security scalability idea born 2016 first discussed unofficial meeting ietf 96 berlin attendees wire mozilla cisco initial ideas based pairwise encryption secure 1:1 group communication 2017 academic paper introducing asynchronous ratcheting trees published university oxford setting focus efficient encryption schemes first bof took place february 2018 ietf 101 london founding members mozilla facebook wire google twitter university oxford inria
|
Computer security
|
management features new windows vista windows vista contains range new technologies features intended help network administrators power users better manage systems notable changes include complete replacement windows setup process completely rewritten deployment mechanisms support per-application remote desktop sessions new diagnostic health monitoring tools range new group policy settings covering many features new windows vista areas interest include major changes task scheduler well addition subsystem unix applications provides posix-compatible environment applications part operating system setup process windows vista completely rewritten image-based setup based windows preinstallation environment winpe version 2.0 amongst features runs entire setup process graphical environment opposed text-based environments previous versions visually user interface resembles windows vista using cleartype fonts aero visual style enabling use mouse prior copying setup image users graphically resize partitions support loading third-party disk drivers improved whereas windows xp supported loading drivers floppy disks setup environment initially loading windows vista additionally supports loading drivers usb firewire storage devices cds dvds within main setup wizard microsoft aimed reduce amount time setup takes complete setup significantly faster windows xp thus windows vista installed little 20 minutes especially notable considering windows vista install three times size predecessor end setup process windows vista automatically downloads applies security device-driver updates windows update new windows recovery environment winre detects fixes startup related problems accessed pressing f8 startup system boots winre interface offers various tests well recovery failure detection tools winre automatically detects blue screen errors registry damage tries repair system get running quickly windows recovery environment tools significantly expanded take advantage new graphical setup environment toolbox presented user offering access repair functions system restore new memory diagnostic tool access complete pc backup restore images access command prompt multiple command prompts spawned command-line tools available command prompts spawned time setup pressing shift+f10 new diagnostic utility dubbed startup repair later automatic repair formerly system recovery troubleshooter wizard designed repair issues may negatively affect windows startup process damaged missing boot system files incompatible drivers issues result damaged hardware startup repair checks corruption operating system components boot configuration data disk file system metadata master boot record windows registry microsoft stated utility intended repair eighty percent issues package manager part windows vista servicing stack replaces previous package installer codice_1 update installer codice_2 microsoft delivers updates windows vista files resources package manager windows update control panel item turn windows features use windows vista servicing stack package manager also install updates offline windows image including updates boot-critical device drivers language packs windows vista introduced component-based servicing cbs architecture installation servicing deployment windows vista uses hardware-independent image windows imaging format wim image file contains necessary bits operating system contents copied target system system specific software device drivers applications installed configured afterwards reduces time taken installation windows vista corporations author image files using wim format might include applications organization wants deploy also multiple images kept single image file target multiple scenarios ability used microsoft include editions windows vista disc install proper version based provided product key addition initial configuration locale settings account names etc supplied xml answer files automate installation microsoft provides tool called imagex support creation custom images edit images created also used generate image running installation including data applications backup purposes wim images also controlled using windows system image manager used edit images create xml answer files unattended installations sysprep also included part windows vista hal-independent also included windows vista improved version files settings transfer wizard known windows easy transfer allows settings inherited previous installations user state migration tool allows migrating user accounts large automated deployments clickonce deployment technology smart client applications enables self-updating windows-based applications installed run minimal user interaction fashion require administrator access activex installer service optional component included business enterprise ultimate editions provides method network administrators domain authorize installation upgrade specific activex controls operating standard user activex components listed group policy installed without user account control consent dialog displayed windows vista includes number self-diagnostic features help identify various problems possible suggest corrective actions event logging subsystem windows vista also completely overhauled rewritten around xml allow applications precisely log events event viewer also rewritten take advantage new features large number different types event logs monitored including administrative operational analytic debug log types instance selecting application logs node scope pane reveals numerous new subcategorized event logs including many labeled diagnostic logs event logs configured automatically forwarded systems running windows vista windows server 2008 event logs also remotely viewed computers multiple event logs centrally logged managed single computer event logs filtered one criteria custom views created one events categorizing advanced filtering allows viewing logs related certain subsystem issue certain component events also directly associated tasks via redesigned event viewer windows error reporting improved significantly windows vista importantly new set public apis created reporting failures application crashes hangs developers create custom reports customize reporting user interface new apis documented msdn architecture windows error reporting revamped focus reliability user experience wer report errors even process bad state example process encountered stack exhaustions peb/teb corruptions heap corruptions etc windows xp process terminated silently without generating error report conditions new feature called problem reports solutions also added control panel applet keeps record system application errors issues well presents probable solutions problems remote desktop protocol 6.0 incorporates support application-level remoting improved security tls 1.0 support connections via ssl gateway improved remoting devices support .net remoting including support remoting windows presentation foundation applications wmi scripting 32-bit color support dual-monitor support network level authentication remote assistance helps troubleshooting remotely full-fledged standalone application use help support center windows messenger based windows desktop sharing api two administrators connect remote computer simultaneously also session automatically reconnects restarting computer also supports session pausing built-in diagnostics xml-based logging reworked use less bandwidth low-speed connections nat traversals also supported session established even user behind nat device remote assistance configurable using group policy supports command-line switches custom shortcuts deployed windows vista also includes windows remote management winrm microsoft ’ implementation ws-management standard allows remote computers easily managed soap-based web service winrm allows obtaining data including wmi management information local remote computers running windows xp windows server 2003 winrm installed computers windows server 2008 ws-management protocol implementations operating systems using winrm scripting objects along compatible command-line tools winrm winrs allows administrators remotely run management scripts winrm session authenticated minimize security risks windows vista includes microsoft management console 3.0 mmc introduced several enhancements including support writing .net snap-ins using windows forms running multiple tasks parallel addition snap-ins present ui different thread operation runs thus keeping snap-in responsive even computationally intensive task new mmc interface includes support better graphics well featuring task pane shows actions available snap-in selected task scheduler windows firewall also thoroughly configurable management console print management enables centralized installation management printers organization allows installation network-attached printers group clients simultaneously provides continually updated status information printers print servers also supports finding printers needing operator attention filtering display printers based error conditions out-of-paper also send e-mail notifications run scripts printer encounters error condition windows vista includes around 2400 group policy settings allow administrators specify configuration connected groups computers especially domain windows vista supports multiple local group policy objects allows setting different levels local group policy individual users new xml based policy definition file format known admx introduced admx files contain configuration settings individual group policy objects gpo domain based gpos admx files centrally stored computers domain retrieve configure using file replication service used replicate files configured system remote location group policy service longer attached winlogon service rather runs service group policy event messages logged system event log group policy uses network location awareness refresh policy configuration soon network configuration change detected new categories policy settings include power management device installations security settings internet explorer settings printer settings among others group policy settings also need used enable two way communication filtering windows firewall default enables incoming data filtering printer settings used install printers based network location whenever user connects different network available printers updated new network group policy settings specify printer available network also printer settings used allow standard users install printers group policy also used specifying quality service qos settings device installation settings used prevent users connecting external storage devices means prevent data theft windows vista improves folder redirection introducing ability independently redirect 10 user profile sub-folders network location windows xp application data desktop documents pictures start menu folders redirected file server also management console snap-in windows vista allow users configure folder redirection clients running windows vista windows xp windows 2000 redesigned task scheduler based management console used automate management configuration tasks already number preconfigured system-level tasks scheduled run various times addition time-based triggers task scheduler also supports calendar event-based triggers starting task particular event logged event log even multiple events occurred also several tasks triggered event configured run either simultaneously pre-determined chained sequence series actions instead create multiple scheduled tasks tasks also configured run based system status idle pre-configured amount time startup logoff specified time tasks triggered xpath expression filtering events windows event log tasks also delayed specified time triggering event occurred repeat event occurs actions need done task fails also configured several actions defined across various categories applications components task scheduler keeps history log execution details tasks features task scheduler include several new command-line tools included windows vista several existing tools also updated tools windows resource kit built-in operating system services unix renamed subsystem unix-based applications included enterprise ultimate editions windows vista network file system nfsv3 client support also included however utilities sdk required downloaded separately also server components sfu product line namely server nfs user name mapping server nis password synchronization etc included windows vista supports scripting automation capabilities using windows powershell object-oriented command-line shell released microsoft included operating system also wmi classes expose controllable features operating system accessed scripting languages 13 new wmi providers included addition dhtml coupled scripting languages even powershell used create desktop gadgets gadgets also created configuration various aspects system
|
Operating systems
|
van jacobson tcp/ip header compression van jacobson tcp/ip header compression data compression protocol described rfc 1144 specifically designed van jacobson improve tcp/ip performance slow serial links van jacobson compression reduces normal 40 byte tcp/ip packet headers 3-4 bytes average case saving state tcp connections ends link sending differences header fields change makes big difference interactive performance low speed links although anything processing delay inherent dialup modems van jacobson header compression also vj compression header compression option versions ppp versions serial line internet protocol slip vj compression often called cslip compressed slip
|
Internet protocols
|
unix philosophy unix philosophy originated ken thompson set cultural norms philosophical approaches minimalist modular software development based experience leading developers unix operating system early unix developers important bringing concepts modularity reusability software engineering practice spawning software tools movement time leading developers unix programs ran established set cultural norms developing software norms became important influential technology unix termed unix philosophy unix philosophy emphasizes building simple short clear modular extensible code easily maintained repurposed developers creators unix philosophy favors composability opposed monolithic design unix philosophy documented doug mcilroy bell system technical journal 1978 later summarized peter h. salus quarter-century unix 1994 award-winning unix paper 1974 ritchie thompson quote following design considerations preface 1984 book unix programming environment brian kernighan rob pike bell labs give brief description unix design unix philosophy authors write goal book communicate unix programming philosophy october 1984 brian kernighan rob pike published paper called program design unix environment paper criticize accretion program options features found newer unix systems 4.2bsd system v explain unix philosophy software tools performing one general function authors contrast unix tools cat larger program suites used systems mcilroy head bell labs computing sciences research center inventor unix pipe summarized unix philosophy follows beyond statements also emphasized simplicity minimalism unix programming conversely mcilroy criticized modern linux software bloat remarking adoring admirers fed linux goodies disheartening state obesity contrasts earlier approach taken bell labs developing revising research unix stated mcilroy generally accepted throughout unix community unix programs always expected follow concept dotadiw one thing well limited sources acronym dotadiw internet discussed length development packaging new operating systems especially linux community patrick volkerding project lead slackware linux invoked design principle criticism systemd architecture stating attempting control services sockets devices mounts etc. within one daemon flies face unix concept one thing well book art unix programming first published 2003 eric s. raymond american programmer open source advocate summarizes unix philosophy kiss principle keep simple stupid provides series design rules 1994 mike gancarz member team designed x window system drew experience unix well discussions fellow programmers people fields depended unix produce unix philosophy sums nine paramount precepts richard p. gabriel suggests key advantage unix embodied design philosophy termed worse better simplicity interface implementation important attributes system—including correctness consistency completeness gabriel argues design style key evolutionary advantages though questions quality results example early days unix used monolithic kernel means user processes carried kernel system calls user stack signal delivered process blocked long-term i/o kernel done signal delayed possibly long time maybe indefinitely i/o completed signal handler could executed process kernel mode sensitive kernel data stack kernel back-out system call store replay restart later assuming signal handler completes successfully cases ken thompson dennis ritchie favored simplicity perfection unix system would occasionally return early system call error stating done nothing—the interrupted system call error number 4 codice_1 today systems course call aborted order call signal handler could happen handful long-running system calls codice_2 codice_3 codice_4 codice_5 plus side made i/o system many times simpler design understand vast majority user programs never affected handle experience signals codice_6 would die right away one raised programs—things like shells text editors respond job control key presses—small wrappers could added system calls retry call right away codice_1 error raised thus problem solved simple manner 1981 article entitled truth unix user interface horrid published datamation norman criticized design philosophy unix lack concern user interface writing background cognitive science perspective then-current philosophy cognitive engineering focused end users comprehend form personal cognitive model systems -- case unix fail understand result disastrous mistakes losing hour worth work easy
|
Operating systems
|
playstation playstation ps cloud gaming subscription service developed sony interactive entertainment service allows members stream playstation 2 playstation 3 playstation 4 games playstation 4 pc playstation 2 playstation 4 games also available download playstation 4 non-playstation devices need dualshock 3 4 xinput-compatible controller xbox game pad use service members intend stream games sony recommends players 5 mbps internet connection achieve good performance playstation announced january 7 2014 2014 consumer electronics show ces sony presented demos last us puppeteer playable ps bravia tvs playstation vita closed beta began united states january 28 ps3 may 19 extended ps4 implement service sony created single motherboard equivalent 8 ps3 console units server rack allow games function opposed software emulation due architectural complexity playstation launched open beta united states canada ps4 july 31 2014 ps3 september 18 2014 ps vita ps tv october 14 2014 support select 2014 bravia tvs coming later year gamescom 2014 sce announced ps would arrive europe 2015 united kingdom first european country access service december 24 2014 sony announced playstation would expand electronic brands ces 2015 sony confirmed playstation would arrive north america ps4 full release january 13 2015 march 7 2015 revealed playstation accessible europe official beta invites europe started going ps4 owners april 15 2015 february 17 2017 sony announced would discontinue playstation playstation 3 playstation vita playstation tv sony bravia televisions modeled 2013–15 sony blu-ray players samsung televisions august 15 2017 september 20 2018 sony announced users playstation 4 would able download playstation 2 playstation 4 games offered via service sony started gradually roll new feature subscribers playstation 3 games however able downloaded playstation 3 architecture different playstation 4 january 23 2019 sony announced service would launching spain italy portugal norway denmark finland sweden later year beta countries launched early february full service launched march 12 2019 currently playstation 2 playstation 3 playstation 4 games service streamed playstation 4 pc 2019 750 games available 300 available download playstation 4 new games added every month 7-day free trial three pricing options north america subscription service 19.99 one month 44.99 3 months 99.99 12 months two pricing options france germany belgium netherlands luxembourg €14.99 one month €99.99 12 months playstation includes access online multiplayer playstation 3 playstation 4 games playstation currently available austria belgium canada denmark finland france germany ireland italy japan luxembourg netherlands norway portugal spain sweden switzerland united states qatar united kingdom
|
Computer architecture
|
collaber collaber collaboration software built eclipse software rcp collaber features include file sharing task management shared calendar group discussion contains tools like address book backup tool calendar chat discussion database file tool tasks notepad picture polls shared folder wiki web links tool collaber 1.1 released completely new architecture enable users download account information anywhere device functionality collaber appears similar microsoft groove unlike groove limited microsoft windows platform collaber supported microsoft windows mac os x linux even though originally designed p2p architecture similar microsoft groove switched client server model appears better reliability compared p2p model collaber client automatically synchronized collaber server connects internet changes done workspace sent members synchronized users collaber install number systems installations always stay sync see data system without manual intervention concept workspace core working collaber users create workspace workspace 15 built tools tools data inside tool shared members workspace collaber developed vimukti technologies based hyderabad india
|
Internet protocols
|
realms darkness realms darkness fantasy video game developed strategic simulations released 1986 developed apple ii commodore 64 object game completion seven different quests 30 dungeon levels exploration several cities shops wilderness areas ssi sold 9,022 copies realms darkness north america computer gaming world called game moderate interest described graphics quests puzzles mediocre stated game might suitable beginner computer rpgs compute called realms darkness well-planned product several interesting features previously implemented fantasy game fantasy gamers want take look game reviewed 1987 dragon 122 patricia lesser role computers column lesser felt game combines excitement danger menu-driven fantasy role-playing game flexibility thought-provoking requirements text-adventure game game revisited dragon 124 reviewers stated realms darkness enjoyable despite mediocre graphics ’ immerse secrets many many hours
|
Computer architecture
|
zephyr protocol created mit part project athena zephyr designed instant messaging protocol application-suite heavy unix background using one thing well philosophy unix made several separate programs working together make complete messaging system zephyr irc first widely used ip-based instant-messaging systems zephyr invention ciarán anthony dellafera time employee digital equipment corporation visiting research scientist project athena design originated solution reverse remote procedure call rpc problem service providers servers client–server system locate communicate service users initial concept emerged conversations ciarán michael r. gretzinger another systems engineer project athena early 1986 mid late 1986 ciarán distilled problem two specific issues ability locate users distributed computing environment known today presence detection ability deliver scalable light-weight authentic messages distributed computing environment zephyr development team mark w. eichin robert s. french david c. jedlinsky john t. kohl william e. sommerfeld responsible creation initial code-base subsequent releases issued throughout late 1980s zephyr still use today university environments carnegie mellon iowa state university maryland college park brown university mit largely replaced modern popular instant messenger systems xmpp mit currently operates zephyr xmpp zephyr uses udp datagrams sent ports 2102 2103 2104 incompatible routers nat reports internal ip address returning datagrams incorrectly routed sites deployed zephyr using kerberos 4 authentication exclusively though late 2007 sites including iowa state deployed zephyr using kerberos 5
|
Internet protocols
|
playstation 2 models many revisions playstation 2 ps2 history 2000 2013 internal construction others involving substantial external changes colloquially known among ps2 hardware hackers v0 v1 v2 ... v18 region receives different model number example v18 released north america scph-90001 australia scph-90002 hong kong scph-90006 final digit region code bearing hardware many games dvds restricted certain regions system software displays different languages ps2 primarily differentiated models original fat case design slimline models introduced end 2004 2010 television incorporating ps2 introduced three original ps2 launch models scph-10000 scph-15000 scph-18000 sold japan lacked expansion bay later ps2 models models instead included pcmcia slot scph-10000 scph-15000 built-in dvd movie playback instead relied encrypted playback software copied memory card included cd-rom normally ps2 execute encrypted software memory card see ps2 independence exploit v3 substantially different internal structure subsequent revisions featuring several interconnected printed circuit boards v4 everything except power supply unified onto one board v5 introduced minor internal changes difference v6 sometimes called v5.1 v5 orientation power/reset switch board connector reversed prevent use no-solder modchips v5 also introduced reliable laser ones used previous models v7 v8 included minor revisions v6 also scph-30001 50001 90001 models beginning model scph-500xx i.link port removed infrared receiver added use remote control dvd playback leaving controller ports free external receiver ps2 standard color matte black several different variations color produced different quantities regions including ceramic white light yellow metallic blue aqua metallic silver navy star blue opaque blue astral blue opaque black midnight black pearl white sakura purple satin gold satin silver snow white super red transparent blue ocean blue also limited edition color pink distributed regions including oceania parts asia small playstation logo front disc tray could rotated 90 degrees order logo right way vertical horizontal console orientations feature also used slimline consoles playstation 3 september 2004 sony unveiled third major hardware revision v12 model number scph-700xx available late october 2004 smaller thinner quieter older versions includes built-in ethernet port markets also integrated modem due thinner profile contain 3.5 expansion bay therefore support internal hard disk drive also lacks internal power supply similar gamecube modified multitap expansion removal expansion bay criticized limitation due existence titles final fantasy xi require use hdd official ps2 linux also requires expansion bay function currently modified multitap sold stores however also compatible older versions also added support multiple memory cards games third-party connectors soldered unit giving hard drive support due still containing necessary i/o controllers firmware process involved requiring user solder 39 ide pinouts directly board two special aftermarket kit created make mod easier consumer first hd connect simply board sat attached back console communication wires taped ps2 air vents drive power one 5 v usb headers second expensive option hd combo included replacement case room hard drive certain modchips enable use usb hard drive mass storage device two sub-versions scph-700xx one old emotion engine ee graphics synthesizer gs chips newer unified ee+gs chip otherwise identical sub-versions variously referred v12 models v11.5 older v12 newer model v12 older v13 newer model v12 model first released black silver edition available united kingdom germany australia united arab emirates gcc countries france italy south africa north america limited edition pink console also became available march 2007 v12 v13 succeeded v14 scph-7500x contains different asics previous revisions chips copyright date 2005 compared 2000 2001 earlier models also different lens compatibility issues different number playstation games even ps2 games addon add hdd support newer 7500x onward models called hdpro created limited success beginning 2005 found black slimline console power transformers manufactured august december 2004 defective could overheat units recalled sony replaced 2005 model later hardware revisions better compatibility playstation games metal gear solid vr missions operates silver models however new japanese slim models issues playing playstation games first ps2 revisions 2006 sony released new hardware revisions v15 model numbers scph-7700x scph-7700x v15 first released japan september 15 2006 including silver edition release japan released north america europe parts world new revision uses integrated unified ee+gs chip redesigned asic different laser lens updated bios updated drivers july 2007 sony started shipping revision slimline playstation 2 scph-7900x featuring reduced weight 600 grams compared 900 g scph-7700x achieved reduction parts unit also uses smaller motherboard well custom asic houses ee gs rdram ac adaptor weight reduced 250 g previous 350 g. another refinement slimline playstation 2 scph-9000x released japan november 22 2007 well cosmetic changes design hardware overhauled incorporating power supply console like original fat playstation 2 revisions also increases total weight scph-9000x series consoles manufactured third quarter 2008 last revision playstation 2 changes made indicated date code 8c incorporate revised bios disables exploit present older models allowed homebrew applications launched memory card sony also manufactured consumer device called psx used digital video recorder dvd burner addition playing ps2 games device released japan december 13 2003 first sony product include xrossmediabar interface sell well japan released anywhere else psx featured one usb port memory stick card reader two playstation 2 memory card slots released 2010 sony bravia kdl22px300 22 inch 56 cm 720p television incorporates playstation 2 console four hdmi ports 720p tv also includes bravia internet video access allowing users access streaming services youtube on-demand television released europe although maximum resolution 720p/1366×768 1080p input sources used displayed
|
Computer architecture
|
collaboration-oriented architecture collaboration oriented architecture coa computer system designed collaborate use services systems outside operators control collaboration oriented architecture often use service oriented architecture deliver technical framework collaboration oriented architecture ability collaborate systems based jericho forum principles commandments bill gates craig mundie microsoft clearly articulated need people work outside organizations secure collaborative manner opening keynote rsa security conference february 2007 successful implementation collaboration oriented architecture implies ability successfully inter-work securely internet typically mean resolution problems come de-perimeterisation term collaboration oriented architectures defined developed meeting jericho forum meeting held hsbc 6 july 2007 key elements qualify security architecture collaboration oriented architecture follows working collaborative multi-sourced environment implies need authentication authorization accountability must interoperate exchange outside locus area control
|
Computer security
|
daml-s darpa agent markup language services daml-s semantic markup language describing web services related ontologies daml-s built top daml+oil daml-s superseded owl-s
|
Web technology
|
reification linguistics reification natural language processing refers natural language statement transformed actions events become quantifiable variables example john chased duck furiously transformed something like another example would sally said john mean could expressed something like representations allow one use tools classical first-order predicate calculus even statements due use tense modality adverbial constructions propositional arguments e.g sally said x etc. would seemed intractable advantage predicate calculus better understood simpler complex alternatives higher-order logics modal logics temporal logics etc exist better automated tools e.g automated theorem provers model checkers manipulating reified forms used purposes besides application first-order logic one example automatic discovery synonymous phrases reified forms sometimes called quasi-logical forms existential variables sometimes treated skolem constants natural language constructs admit uniform translation first order logic see donkey sentence examples discussion
|
Computational linguistics
|
king amp balloon player controls two green men orange cannon stationed parapet castle fires fleet hot-air balloons cannon king moves slowly back forth ground balloons return fire dive toward balloon reaches ground sit king walks time lifts player must shoot balloon free king parachute safely ground times two diving balloons combine form single larger one awards extra points splits apart hit cannon destroyed collision balloons shots replaced brief delay effect number remaining lives one life lost whenever balloon carries king top screen game ends lives lost galaxian round number stops increasing round 48 king speaks captured help rescued thank carried away bye bye balloons make droning sound aliens galaxian released previous year cannon shots also make sound player ship galaxip game original japanese version game king speaks english heavy japanese accent saying herupu help sankyū thank baibai bye bye u.s. version game features different voice king without japanese accent rare glitch game psp port game namco museum battle collection sometimes glitch happen overlapping continue option repeatedly reaches level 72 far away limit press 1p start glitch level 72 game encounter glitch rendering high score z another glitch features split second opening animation play level resulting blank screen copyright info level ca n't played sounds repeated synth drone must press start quit game quitting level 72 king balloon later featured namco museum encore playstation japan-only release made north american console debut namco museum battle collection psp player could choose king voice original japanese later u.s. version unlocking manic settings also appeared namco museum virtual arcade xbox 360 well namco museum megamix wii
|
Computer architecture
|
lincoln d. faurer lieutenant general lincoln d. faurer february 7 1928 – november 7 2014 united states air force officer served director national security agency chief central security service 1981 1985 faurer born february 7 1928 medford massachusetts graduated central high school philadelphia 1945 attended cornell university graduated united states military academy west point new york 1950 bachelor science degree commission second lieutenant received master science degree engineering management rensselaer polytechnic institute new york 1964 faurer completed national war college fort lesley j. mcnair washington d.c. 1968 concurrently earned master degree international affairs george washington university also washington d.c. graduation united states military academy faurer attended flying schools goodfellow air force base texas vance air force base oklahoma received pilot wings august 1951 completed b-29 pilot training randolph air force base texas january 1952 assigned 308th bombardment wing forbes air force base kansas may 1952 moved wing hunter air force base georgia april 1953 september 1955 faurer flew weather reconnaissance flights wb-29s 56th weather reconnaissance squadron yokota air base japan aerial observer training james connally air force base texas faurer returned forbes air force base may 1956 rb-47 aircraft commander 320th strategic reconnaissance squadron may 1958 transferred headquarters 90th strategic reconnaissance wing also forbes chief training procedures section faurer began career missile space fields august 1959 assigned headquarters 2nd air force barksdale air force base louisiana serving successively operations officer missile section guided missiles operations officer chief missile branch training division directorate operations barksdale associated 2nd air force growing inventory intercontinental ballistic missiles atlas e f titan ii minuteman i. faurer attended graduate engineer management program rensselaer polytechnic institute june 1963 july 1964 graduation assigned defense intelligence agency washington d.c. directorate scientific technical intelligence served technical intelligence officer development engineer later chief space systems division missiles space office july 1967 upon graduation national war college july 1968 faurer named director current operations 14th aerospace force ent air force base colorado served commander 16th surveillance squadron shemya air force base alaska august 1969 september 1970 appointed commander 71st missile warning wing mcguire air force base new jersey faurer assigned director j-2 united states southern command canal zone july 1971 june 1973 transferred headquarters u.s. air force washington d.c. duty deputy assistant chief staff intelligence may 1974 faurer returned defense intelligence agency deputy director intelligence july 1976 became vice director production assigned director j-2 u.s. european command vaihingen west germany august 1977 moved brussels belgium august 1979 deputy chairman north atlantic treaty organization military committee became director national security agency april 1981 faurer military decorations awards include air force distinguished service medal defense superior service medal oak leaf cluster legion merit meritorious service medal joint service commendation medal oak leaf cluster air force commendation medal oak leaf cluster faurer also presented national intelligence medal achievement recognition service national intelligence community faurer promoted lieutenant general september 1 1979 date rank retired april 1 1985 faurer president corporation open systems not-for-profit industry research center promotion osi isdn international communications standards 1986 1991 served chairman association intelligence officers consults national security issues 1990s linc faurer also served board directors aegis research corporation rosslyn later falls church virginia chairman board directors national cryptologic museum foundation october 2014 faurer died november 7 2014 buried arlington national cemetery
|
Computer security
|
george hotz george francis hotz born october 2 1989 alias geohot american hacker creative consumer known unlocking iphone allowing phone used wireless carriers contrary apple intentions developed limera1n jailbreak tool bootrom exploit ios also noted technical efforts publicity reverse engineering playstation 3 video game console subsequently sued settling sony september 2015 working vehicle automation machine learning company comma.ai attended bergen county academies magnet public high school hackensack new jersey attended academy engineering design technology hotz alumnus johns hopkins center talented youth program hotz also briefly attended rochester institute technology carnegie mellon university august 2007 seventeen-year-old george hotz became first person reported carrier-unlock iphone according hotz blog traded second unlocked 8 gb iphone terry daidone founder certicell nissan 350z three 8 gb iphones september 2007 anonymous group achieved software-only unlocking method complement hotz hardware-based unlocking method july 13 2010 hotz announced discontinuation jailbreaking activities citing demotivation technology unwanted personal attention nevertheless continued release new software-based jailbreak techniques october 2010 december 2009 hotz announced initial intentions breach security sony playstation 3 five weeks later january 22 2010 announced performed first theoretical achievement consists initial read write access machine system memory well hypervisor level access machine cpu january 26 2010 hotz released exploit public march 28 2010 sony responded announcing intention release playstation 3 firmware update would remove otheros feature models feature already absent newer slim revisions machine july 13 2010 never achieved method reading installing modifying software ps3 hotz posted message twitter account stating abandoned efforts trying crack ps3 due system security extreme difficulty december 29 2010 notable hacking group fail0verflow known reverse engineering security models found consumer electronics devices performed academic presentation 27th chaos communications congress technical conference accomplishments playstation 3 presented methods 'd devised successfully penetrated device security model yielding root signing encryption keys keys essential element full even minimally usable breach capable installing running new software playstation 3 unit january 2 2011 hotz posted copy root keys playstation 3 website keys later removed website result legal action sony fail0verflow hotz response continued publication ps3 exploit information sony filed january 11 2011 application temporary restraining order tro us district court northern california january 14 2011 hotz appeared interview g4 loop explained involvement playstation 3 root keys console published sony initiated litigation george hotz predecessor playstation 3 hacking group known fail0verflow hotz published commentary case including song disaster sony sony turn demanded social media sites including youtube hand ip addresses people visited geohot social pages videos latter case watched video 'documents reproducing records usernames ip addresses posted published comments response video paypal granted sony access geohot paypal account judge case granted sony permission view ip addresses everyone visited geohot.com april 2011 revealed sony hotz settled lawsuit court condition hotz would never resume hacking work sony products end april 2011 anonymous hacker broke playstation network stole personal information 77 million users hotz denied responsibility attack said running homebrew exploring security devices cool hacking someone else server stealing databases user info cool led 2011 playstation network incident time sony aware compromised accounts system june 2014 hotz published root exploit software hack samsung galaxy s5 devices used us market exploit built around linux kernel cve-2014-3153 discovered hacker pinkie pie involves issue futex subsystem turn allows privilege escalation exploit known towelroot designated one-click android rooting tool hacking community designed installed quickly like app rooting hacks typically uploaded nearby pc cable necessitated rebooting device special set key presses although originally released verizon galaxy s5 root exploit made compatible android devices available time example tested found work galaxy s5 nexus 5 galaxy s4 active updates continued applied root exploit increase capabilities devices running android updates android operating system closed source exploit samsung officially responded towelroot exploit releasing updated software designed immune exploit addition made meaningful side income public donations solicited exploits hotz employed facebook google june 27 2011 zdnet freelance reporter emil protalinski reported according facebook spokesman hotz hired company unknown role however according cnet article actually employed since may confirmed facebook january 2012 hotz longer employed facebook july 16 2014 google hired hotz work software security auditing team called project zero hopes find zero-day vulnerabilities nsa hotz worked project zero 5 months developed qira open source program dynamically analysing application binaries january 2015 vicarious.com hired hotz develop ai algorithms worked 7 months hotz founded ai startup comma.ai september 2015 interview bloomberg hotz revealed company building vehicular automation technology based artificial intelligence algorithms hotz built working self-driving 2016 acura ilx demonstrated i-280 video resulting cease desist letter california department motor vehicles hotz wanted sell technology tesla motors meeting ceo elon musk tesla later released statement website citing corrections bloomberg article stressing autopilot system developed in-house vision chip component mobileye instead one separate autopilot system manufactured mobileye suggested bloomberg reporter ashlee vance tesla ceo elon musk offered advice hotz self-driving car project december 2015 interview october 27 2016 nhtsa informed hotz product legally required comply federal motor vehicle safety standards requested information would confirm compliance day later george hotz tweeted shenzhen comma one cancelled kristen lee stated jalopnik nhtsa simply trying open dialog commented instead got worst attitude possible silicon valley try regulate us thought leaders ’ take ball go home comma.ai open sourced self driving car software called openpilot november 30 2016 emphasizing intended use research without warranty september 14th 2018 comma.ai announced hotz would become head research team project appointed riccardo biasini new ceo company left march 2019 returned may 2019 become president hotz finalist 2004 isef competition portland oregon project mapping robot recognition included interviews today show larry king hotz finalist 2005 isef competition project googler continuing robots hotz competed school highly successful titanium knights battlebots team hotz competed 2007 intel international science engineering fair science competition high school students 3d imaging project entitled want holodeck received awards prizes several categories including 20,000 intel scholarship travelled sweden speak project stockholm international youth science seminar hotz received considerable attention mainstream media including interviews today show fox cnn nbc cbs g4 abc cnbc articles several magazines newspapers websites including forbes bbc march 2008 pc world magazine listed hotz one top 10 overachievers 21 august 2013 hotz attended def con carnegie mellon plaid parliament pwning ppp ppp placed first def con capture flag ctf tournament later 2013 hotz also competed csaw 2013 working alone hotz took first place pseudonym tomcr00se august 2014 hotz competed part carnegie mellon plaid parliament pwning win def con ctf tournament second year row team also def con crack tournament south southwest 2019 hotz discussed simulation theory announced plans create church dedicated helping society break simulation
|
Computer security
|
oscar protocol oscar open system communication realtime aol proprietary instant messaging presence information protocol used aol aim instant messaging system icq despite name specifications protocol remain proprietary aol gone great lengths keep competitors namely microsoft xmpp cerulean studios implementing compatible clients proprietary messaging systems 2002 aol signed contract apple inc. allowing use oscar well aol code libraries ichat application allowed ichat users interact icq aim users directly deal also permitted users apple .mac service log aim network using .mac email addresses carried apple mobileme service oscar protocol used separately aol network fact aol expands general concept oscar adding systems service side buddy lists icons well features file transfers using bonjour march 6 2006 aol released aim sdk launched developer website allowing developers build plugins aim triton build custom clients connect oscar protocol point however released information protocol march 5 2008 aol released portions oscar protocol documentation google also provided ability sign aim network via google talk client built gmail packets sent oscar encapsulated manner 16-bit integers sent network unsigned big endian see endianness 32-bit integers 8-bit integers bytes special frame layer protocol flap container encloses every packet carries information packet size channel number sequence within almost every packet sent channel 2 packets contain snac simple network atomic communication always either one zero contained packet therefore contain need length
|
Internet protocols
|
xenocara xenocara openbsd build infrastructure project customised x.org server utilises dedicated _x11 user default drop privileges perform privilege separation accordance openbsd least privilege policy patches applying rather important security protection provided upstream benefit unix-like systems linux however care apply maintain unfortunately happened date release 6.9 x.org used imake recent modularised versions switched gnu autotools xenocara uses bsd make designed ease building maintenance modularised x.org within openbsd cvs tree first appeared openbsd 4.2 released openbsd different build system repositories x cvs since completely retired favour xenocara apart x.org xenocara builds several projects including window managers fvwm cwm
|
Operating systems
|
influenster influenster product discovery reviews platform consumers influenster uses social media analytics measure users ’ influence social media influenster launched 2010 ios app influenster launched 2014 android app launched 2015 january 2018 influenster community consists 4 million users influenster platform consisting 11 million reviews 880,000 new reviews generated month products represent 100k consumer brands 1.7 million product pages users review ask/answer questions upload photos/videos based user impact score supplied demographic information invited influenster campaigns influenster runs variety different types campaigns generally involve sending invited users complimentary product service sample discuss social media sampling user asked complete final market-research survey influenster offers coupons offers partner retailers brands users access product discovery experience platform uses facebook twitter instagram youtube tumblr foursquare google+ multi-platform blog widget friend referrals determine impact score impact points largely calculated based number followers friends user given social network influenster allows users unlock expert lifestyle badges completing survey questions interests behaviors writing reviews products answering users questions sharing influenster product pages across social media channels badges part gamification system reward specific types users invites specific influenster campaigns matching demographic primary business model influenster involves brands working influenster voxbox virtualvox campaigns voxbox virtualvox campaigns brands offer complimentary products digital rewards influenster users meet brand product-specific criteria 2016 influenster raised 8 million financing ebates leading online cashback shopping service
|
Web technology
|
aravind joshi aravind krishna joshi august 5 1929 – december 31 2017 henry salvatori professor computer cognitive science computer science department university pennsylvania joshi defined tree-adjoining grammar formalism often used computational linguistics natural language processing joshi studied pune university indian institute science awarded electrical engineering diisc communication engineering respectively joshi graduate work done electrical engineering department university pennsylvania awarded phd 1960 became professor penn co-founder co-director institute research cognitive science april 21 2005 joshi awarded franklin institute benjamin franklin medal computer cognitive science franklin institute citation states awarded medal fundamental contributions understanding language represented mind developing techniques enable computers process efficiently wide range human languages advances led new methods computer translation
|
Computational linguistics
|
comodo mobile security comodo mobile security cms mobile application provided free comodo group protects android devices viruses worms scripts also features sms call blocking software process manager data apps backup data traffic monitor anti-theft feature allows users recover lost stolen devices first security app comodo specialists internet security android platform comodo mobile security requires android 2.2 cms 1.2 cms 2.4 br cms 2.4 released january 2014 major enhancements cms 2.4 include cms 2.5 cms 2.5 released june 2014 new features enhancements cms 2.7 cms 2.7 released december 2014 changes comodo mobile security 2.7 june 17 2013 av-test labs released test results 30 android mobile security products conducted may 2013 using android 4.2.2 comodo mobile security 2.0 scored 5.5 6 protection perfect 6 usability av-test two testing categories january 2015 av-test labs released test results 30 android mobile security products conducted january 2015 using android 5.0.1 comodo mobile security 2.7 scored 5.5 6 protection perfect 6 usability av-test two testing categories softonic.com reviewed comodo mobile security 1.1 january 2012 gave 9 10 stars rating excellent rosemary hattersley pc advisor gave comodo mobile security 1.2 3 ½ 5 stars wrote “ smartphone app good all-rounder offering initial health check plus ‘ anti-theft ’ tools guise remote lock wipe device location plus alert someone changes sim phone free
|
Computer security
|
rogue dhcp rogue dhcp server dhcp server network administrative control network staff network device modem router connected network user may either unaware consequences actions may knowingly using network attacks man middle kind computer viruses malicious software found set rogue dhcp especially classified category clients connect network rogue legal dhcp server offer ip addresses well default gateway dns servers wins servers among others information provided rogue dhcp differs real one clients accepting ip addresses may experience network access problems including speed issues well inability reach hosts incorrect ip network gateway addition rogue dhcp set provide default gateway ip address machine controlled misbehaving user sniff traffic sent clients networks violating network security policies well user privacy see man middle vmware virtual machine software also act rogue dhcp server inadvertently run client machine joined network vmware act rogue dhcp server handing random ip addresses clients around network end result large portions network cut internet rest domain without access rogue dhcp servers stopped means intrusion detection systems appropriate signatures well multilayer switches configured drop packets one common methods deal rogue dhcp servers called dhcp snooping dhcp snooping drops dhcp messages dhcp server trusted rogue dhcp servers detected using software manual examination perusing scapy package python
|
Computer security
|
virtual dos machine virtual dos machines vdm refer technology allows running 16-bit/32-bit dos 16-bit windows programs already another operating system running controlling hardware virtual dos machines operate either exclusively typical software emulation methods e.g dynamic recompilation rely virtual 8086 mode intel 80386 processor allows real mode 8086 software run controlled environment catching operations involve accessing protected hardware forwarding normal operating system exceptions operating system perform emulation resume execution dos software vdms generally also implement support running 16- 32-bit protected mode software dos extenders conform dos protected mode interface dpmi dos program running inside vdm needs access peripheral windows either allow directly rarely present dos program virtual device driver vdd emulates hardware using operating system functions vdm systematically emulations intel 8259a interrupt controllers 8254 timer chips 8237 dma controller etc january 1985 digital research together intel previewed concurrent dos 286 1.0 version concurrent dos capable running real mode dos programs 80286 protected mode method devised b-1 stepping processor chips however may 1985 stopped working c-1 subsequent processor steppings shortly digital research release product although e-1 stepping intel started address issues august 1985 digital research 8086 emulation mode worked utilizing undocumented loadall processor instruction slow practical microcode changes e-2 stepping improved speed early implementation seen predecessor actual virtual dos machines eventually concurrent dos 286 reworked potential desktop operating system become flexos 286 industrial use 1986 also licenced ibm 4680 os 1986 intel 80386 virtual 8086 mode became available samples since october 1985 quantities since june 1986 digital research switched use run real mode dos programs virtual dos machines protected mode concurrent dos 386 1.0 february 1987 flexos 386 1.0 june 1987 however architecture multiuser multitasking protected mode operating systems dos-based concurrent dos 386 later developed become multiuser dos since 1991 real/32 since 1995 flexos 386 later became 4690 os 1993 contrast protected mode operating systems dos default real-mode operating system switching protected mode virtual 86 mode behalf memory managers dos extenders order provide access extended memory map memory first megabyte accessible normal dos programs dos-based vdms appeared microsoft windows/386 2.01 september 1987 dos-based virtual dos machines also present windows 3.0 3.1x windows workgroups 3.1x running 386 enhanced mode well windows 95 98 98 se one characteristics solutions running top dos memory layout shown inside virtual dos machines virtual instances dos system dos driver configuration run multitasker loaded requests handled protected mode passed system domain executed underlying dos system similar windows 3.x 386 enhanced mode architecture emm386 3.xx novell dos 7 caldera opendos 7.01 dr-dos 7.02 later also uses dos-based vdms support pre-emptive multitasking multiple dos applications emm386 /multi option used component development digital research novell since 1991 codename vladivar originally separate device driver krnl386.sys instead module emm386 primarily developed next major version dr dos released novell dos 7 1994 also used never released dr dos panther star trek project 1992/1993 vdms called mvdm multiple virtual dos machine used os/2 2.0 later since 1992 os/2 mvdms considerably powerful ntvdm example block devices supported various dos versions booted os/2 mvdm os/2 1.x dos box based dos 3.0 os/2 2.x mvdms emulate dos 5.0 seamless integration windows 3.1 later win32s applications os/2 concept looking similar surface seamless integration xp mode based windows virtual pc windows 7 redirector guest vdm ntvdm allows access disks os/2 nt host applications guest use named pipes communication host ntvdm system component ia-32 editions windows nt family since 1993 allows execution 16-bit windows 16-bit 32-bit dos applications included 64-bit versions windows nt 32-bit user-mode executable forms basis single dos windows 3.x environment called ntvdm.exe order execute dos programs ntvdm loads ntio.sys turn loads ntdos.sys executes modified command.com order run application passed ntvdm command-line argument 16-bit real-mode system files stripped derivations ms-dos 5.0 equivalents io.sys msdos.sys command.com hard-wired assumptions fat file system removed using invalid opcode 0xc4 0xc4 bop 32-bit ntvdm handle requests originally ntdos reported dos version 30.00 programs soon changed report version 5.00 int 21h/ah=30h 5.50 int 21h/ax=3306h allow programs run unmodified holds true even newest releases windows many additional ms-dos functions commands introduced ms-dos versions 6.x windows 9x missing 16-bit applications run thread within single preemptively multithreaded 32-bit ntvdm process 16-bit processes default cooperatively multitasked respect unless run separate memory space option checked run box application shortcut file ntvdm emulates bios calls tables well windows 3.1 kernel 16-bit api stubs 32-bit wow translation layer thunks 16-bit api routines 32-bit dos emulation present dos protected mode interface dpmi 32-bit memory access layer converts necessary extended expanded memory calls dos functions windows nt memory calls wowexec.exe emulation layer emulates 16-bit windows windows 2000 windows xp added sound blaster 2.0 emulation 16-bit virtual device drivers dos block device drivers e.g. ram disks supported inter-process communication subsystems take place ole dde named pipes since virtual 8086 mode available non-x86-based processors specifically mips dec alpha powerpc ntvdm instead implemented full emulator versions nt using code licensed insignia softpc windows nt 3.51 80286 emulation available windows nt 4.0 486 emulation added following list commands part windows xp ms-dos subsystem january 2010 google security researcher tavis ormandy revealed serious security flaw windows nt vdm implementation allowed unprivileged users escalate privileges system level noted applicable security x86 versions windows nt kernel since 1993 included 32-bit versions windows nt 2000 xp server 2003 vista server 2008 windows 7 ormandy publish proof-of-concept exploit vulnerability prior microsoft release security patch workaround issue turn 16-bit application support prevented older programs written dos windows 3.1 running 64-bit versions windows affected since include ntvdm subsystem microsoft security patches applied affected operating systems vdm could safely reenabled limitation exists windows xp 16-bit subsystem earlier versions windows nt raised per-session limit gdi objects causes gdi handles shifted right two bits converting 32 16 bits result actual handle larger 14 bits consequently 16-bit applications happen served handle larger 16384 gdi system crash terminate error message x86-64 cpu virtual 8086 mode available sub-mode legacy mode running 16- 32-bit operating systems native 64-bit long mode ntvdm supported x86-64 windows including dos programs ntvdm uses vm86 ᴄᴘᴜ mode instead local descriptor table order enable 16‑bits segment required addressing aaarch64 microsoft ’ release full emulator incompatible instruction set like previous incompatible architecture way run use windows xp mode virtualization software use ntvdmx64 unofficial port older emulated implementation ntvdm provided nt 4 non-x86 platforms uses otvdm running 16 bits windows programs non virtualized way general vdm similar technologies satisfactorily run older dos games today computers emulation provided basic peripherals often implemented incompletely example sound emulation ntvdm limited nt-family versions windows update real screen times per second dos program writes emulate higher resolution graphics modes software mostly runs native speed host cpu timing loops expire prematurely either makes game run much fast causes software even notice emulated hardware peripherals wait long enough answer
|
Operating systems
|
manchester united video game series manchester united football video game series licensed manchester united highly popular early 1990s game series programmed krisalis ordered release date game series programmed codemasters ordered release date
|
Computer architecture
|
data source name computing data source name dsn sometimes known database source name though data sources comprise repositories apart databases string associated data structure used describe connection data source commonly used connection odbc dsns also exist jdbc data access mechanisms term often overlaps connection string systems make distinction dsns connection strings term often used interchangeably dsn attributes may include limited system administrator client machine generally creates separate dsn relevant data source standardizing dsns offers level indirection various applications example apache/php iis/asp take advantage accessing shared data sources two kinds dsn exist broken software e.g. crystal reports microsoft excel php perl python ruby users submit crud create read update delete queries data source establishing connection dsn asp vbscript code open dsn connection might look like following dim databaseobject1 set databaseobject1 server.createobject adodb.connection databaseobject1.open dsn=example php using pear :db package open connection without external dsn dsn-less connection i.e. using connection string code might resemble following require_once db.php // dsn driver // username password host port database dsn mysql //john pass localhost:3306/my_db db db :connect dsn php pdo dsn mysql host=localhost dbname=example dbh new pdo dsn username password perl using perl dbi module driver syntax dsn attributes requirement dbi makes information except username password supplied single string argument dsn dbi pg database=finance host=db.example.com port= port dbh dbi- connect dsn 'username 'password
|
Databases
|
partitioning cryptanalysis cryptography partitioning cryptanalysis form cryptanalysis block ciphers developed carlo harpes 1995 attack generalization linear cryptanalysis harpes originally replaced bit sums affine transformations linear cryptanalysis general balanced boolean functions demonstrated toy cipher exhibits resistance ordinary linear cryptanalysis susceptible sort partitioning cryptanalysis full generality partitioning cryptanalysis works dividing sets possible plaintexts ciphertexts efficiently-computable partitions distribution ciphertexts significantly non-uniform plaintexts chosen uniformly given block partition partitioning cryptanalysis shown effective linear cryptanalysis variants des crypton specific partitioning attack called mod n cryptanalysis uses congruence classes modulo integer partitions
|
Computer security
|
podcast capture podcast capture introduced mac os x 10.5 leopard allows users record distribute podcasts software requires connection computer running mac os x server podcast producer users record input local remote audio video device capture screen activity choose existing file upload distribute
|
Operating systems
|
yosemite server backup yosemite server backup cross-platform backup software developed barracuda networks inc. acquiring yosemite technologies barracuda networks released yosemite server backup first offering barracuda ware line products yosemite server backup software gained popularity among backup administrators used many big giants world ysb runs native 32- 64-bit systems back hard disks tapes microsoft windows support includes microsoft exchange microsoft sql server active directory yosemite server backup longer stand alone package sept. 30 2017 part barracuda backup
|
Computer security
|
piggyback attack piggyback attack active form wiretapping fact attacker gains access system via intervals inactivity another user ’ legitimate connection also called “ line attack ” piggyback-entry wiretapping security piggybacking actually someone tags along another person authorized gain entry restricted area pass something apply concept computer networks workstations
|
Computer security
|
marid marid ietf working group applications area tasked propose standards email authentication 2004 name acronym authorization records d. lightweight mta authentication protocol lmap generic name set 'designated sender proposals discussed asrg fall 2003 including schemes attempt list valid ip addresses send mail domain lightweight lmap essentially stands crypto opposed domainkeys successor dkim march 2004 internet engineering task force ietf held bof proposals result meeting task force chartered marid working group microsoft caller-id proposal late highly controversial addition mix came following features working group decided postpone question rfc 2821 smtp identities i.e mail covered spf helo covered csv spf favour rfc 2822 identities covered caller-id later sender-id purported responsible address pra wg arrived point sender policies could split different scopes like 2821 mail 2822 pra marid spf2.0 syntax also allowed join different scopes one policy record sets permitted ips identical often case less week publication first mfrom mail draft wg terminated unilaterally leadership marid existed seven months rfcs published responsible ietf area director agreed sponsor publication unfinished marid discussions ietf experiments happened 2005 pre-marid spf sender id approved experimental rfcs latter certain degree result marid growing caller-id proposal ongoing disputes technical issues incompatibilities sender id resulted later appeals iesg iab
|
Computer security
|
write system call write one basic routines provided unix-like operating system kernel writes data buffer declared user given device maybe file primary way output data program directly using system call destination identified numeric code data written instance piece text defined pointer size given number bytes codice_1 thus takes three arguments write call interface standardized posix specification data written file calling write function function prototype syntax codice_2 codice_3 signed data type defined codice_4 note codice_5 return unsigned value returns -1 error occurs must return signed value. br write function returns number bytes successfully written array may times less specified nbytes returns -1 exceptional condition encountered see section errors listed errors could encountered writing file errors macros listed errno.h write system call ordinary function spite close resemblance example linux x86 architecture system call uses instruction int 80h order transfer control kernel write system call counterpart read low level functions capable understanding bytes write used write records like classes thus higher level input-output functions like printf required often high-level interface preferred compared cluttered low-level interface functions call functions internally turn make calls write giving rise layered assembly functions use assembly higher level functions collect bytes data write required data file
|
Computer architecture
|
peoplebrowsr peoplebrowsr technology company provides enterprise government top level domain owners ability launch blockchain integrated social networks analyze engage members networks owner new tlds peoplebrowsr creator .ceo .best sold best sas july 2018 .kred peoplebrowsr works enterprise government tld owners multiple industries december 2008 launched deep search dashboard managing engaging social stream peoplebrowsr receiving analyzing indexing full twitter firehose since 2008 combination sources peoplebrowsr compiled trillion conversation datamine enables conduct analytics using kred influence measurement company combined trillion conversation datamine kred influencer analytics socialos network platform three tlds become leading social network provider organizations around world october 2011 company debuted kred measuring influence outreach social networks peoplebrowsr engaged research projects including development artificial intelligence new social networking platforms peoplebrowsr ceo jodee rich believes documenting history real time social networking platforms creating wealth data used help computers better understand human behavior way machines trained mine human data learn behavior rather taught think like humans june 2013 peoplebrowsr launched socialos set apis bridges existing networks enables new social networks rapidly rolled-out peoplebrowsr owns top level domains .ceo .kred formerly .best domains released late 2013 early 2014 powered company products socialos kred trillion conversation datamine june 2018 peoplebrowsr received approval icann internet corporation assigned names numbers sell besttld pty ltd subsidiary best sas paris based company led president cyril fremont strategic deal would leverage peoplebrowsr socialos technology besttld pty ltd owns .best top level domain distribution agreements godaddy 50 domain registrars november 2012 peoplebrowsr sued twitter proposed shutdown peoplebrowser access twitter firehose set occur november 30 2012 peoplebrowsr injunction prevent disconnection twitter firehose twitter attempted move case federal court may invalidated injunction march 2013 peoplebrowsr battle keep case within california court system thereby keeping injunction place twitter peoplebrowsr reached out-of-court settlement april 2013
|
Web technology
|
luca cardelli luca andrea cardelli frs italian computer scientist assistant director microsoft research cambridge uk cardelli well known research type theory operational semantics among contributions helped design modula-3 implemented first compiler non-pure functional programming language ml defined concept typeful programming helped develop polyphonic c experimental programming language born montecatini terme italy attended university pisa receiving phd university edinburgh 1982 joining microsoft research 1997 worked bell labs digital equipment corporation contributed unix software including vismon 2004 inducted fellow association computing machinery fellow royal society 2007 cardelli awarded senior aito ole-johan dahl kristen nygaard prize
|
Programming language topics
|
xor ddos xor ddos trojan malware hijacks windows macintosh systems uses launch ddos attacks reached loads 150+ gbps.this trojan created steal data intercepting system network traffic searching banking usernames passwords credit card data paypal information social security numbers sensitive user data..it malicious computer program removed antiviruses like malware bytes microsoft security essentials norton mcafee webroot kaspersky sophos avast etc .it enables cyber-criminals spy steal sensitive data gain backdoor access system actions include deleting data blocking data modifying data copying data disrupting performance computers computer networks removed help windows security windows activated security blocks virus installing order gain access launches brute force attack order discover password secure shell services linux secure shell credentials acquired login successful uses root privileges run script downloads installs xor ddos believed asian origin based targets tend located asia several things noteworthy xor ddos built exclusively arm x86 systems appears programmed c/c++
|
Computer security
|
f-secure f-secure corporation formerly data fellows finnish cyber security privacy company based helsinki finland company 20 country offices presence 100 countries security lab operations helsinki finland kuala lumpur malaysia company develops sells antivirus password management endpoint security cyber security products services radar managed services vulnerability scanning rapid detection service flagship products company continues expand corporate market f-secure first established name data fellows petri allas risto siilasmaa 1988 data fellows trained computer users built customized databases three years later company launched first major software project developed first heuristic scanner antivirus products f-secure ’ first antivirus product windows pcs launched 1994 data fellows became f-secure 1999 f-secure first company developed anti-rootkit technology called blacklight 2005 june 2015 f-secure expanded enterprise market acquiring nsense danish company specializes security consultation vulnerability assessment purchase inverse path privately owned security italian consultancy experience avionics automative industrial control sectors february 2017 continues expansion cyber security services f-secure client security received av-test best protection award fifth time 2016 june 2018 f-secure acquired security company mwr infosecurity co-operation aalto university school science technology f-secure runs one semester course future virus analysts material available on-line media coverage magic lantern claims av vendors purposely leave backdoor products f-secure announced policy detecting spying programs f-secure corporation would like make known leave backdoors f-secure anti-virus products regardless source tools draw line every sample get regarding whether detect decision-making influenced technical factors nothing else within applicable laws regulations case meaning eu laws also adding detection program see might used terrorist activity benefit organized crime would like state record received queries regarding whether would guts detect something obviously made known violent mafia terrorist organization yes would
|
Computer security
|
c10k problem c10k problem problem optimising network sockets handle large number clients time name c10k numeronym concurrently handling ten thousand connections note concurrent connections requests per second though similar handling many requests per second requires high throughput processing quickly high number concurrent connections requires efficient scheduling connections words handling many requests per second concerned speed handling requests whereas system capable handling high number concurrent connections necessarily fast system one request deterministically return response within necessarily fixed finite amount time problem socket server optimisation studied number factors must considered allow web server support many clients involve combination operating system constraints web server software limitations according scope services made available capabilities operating system well hardware considerations multi-processing capabilities multi-threading model single threading model preferred concurrently aspect involves considerations regarding memory management usually operating system related strategies implied relate diverse aspects i/o management term coined 1999 dan kegel citing simtel ftp host cdrom.com serving 10,000 clients 1 gigabit per second ethernet year term since used general issue large number clients similar numeronyms larger number connections recently c10m 2010s early 2010s millions connections single commodity 1u server became possible 2 million connections whatsapp 24 cores using erlang freebsd 10–12 million connections migratorydata 12 cores using java linux common applications high number connections include pub/sub servers chat file servers web servers software-defined networking
|
Web technology
|
segoe segoe typeface family fonts best known use microsoft company uses segoe online printed marketing materials including recent logos number products additionally segoe ui font sub-family used numerous microsoft applications may installed applications microsoft office 2007 windows live messenger 2009 adopted microsoft default operating system font beginning windows vista also used outlook.com microsoft web-based email service august 2012 microsoft unveiled new corporate logo typeset segoe replacing logo used previous 25 years segoe name registered trademark microsoft corporation although typeface originally developed monotype segoe designed steve matteson employment agfa monotype licensed microsoft use branding typeface user interface font designed friendly legible matteson created range weights italics humanist feel 2004 microsoft registered certain segoe segoe italic fonts original font designs european union trademark design office german font foundry linotype protested citing segoe ui similarity licensed frutiger family typefaces submission eu microsoft claimed linotype failed prove selling frutiger frutiger next prior 2004 eu rejected claims february 2006 eu revoked microsoft registration microsoft appeal decision microsoft still holds united states design patents various segoe based fonts period late 2004 six years agfa corporation monotype assets acquired ta associates company incorporated monotype imaging later august 2006 monotype imaging acquired linotype end 2006 linotype company challenged validity microsoft segoe patents wholly owned subsidiary monotype company originally licensed segoe microsoft several letters distinctly different forms segoe ui frutiger reflecting segoe ui different intended use low-resolution screen display rather airport signage frutiger however ulrich stiehl asserts many differences introduced later versions segoe ui – earlier versions segoe ui closer frutiger june 7 2005 scala electronic signage company unrelated typeface ff scala announced segoe removed infochannel product due licensing issues scala replaced segoe bitstream vera fonts november 2005 simon daniels program manager microsoft typography group stated original segoe fonts created microsoft existing monotype design licensed extensively extended customized meet requirements different processes apps devices april 2006 microsoft public relations spokesman asked named stated segoe original design developed agfa monotype monotype imaging 2000 2003 acquired original segoe fonts used develop extended family fonts retaining segoe name many new fonts received design patent protection united states segoe derived frutiger microsoft also current up-to-date license allows us distribute certain frutiger fonts connection microsoft products including office windows distinct differences segoe frutiger additionally unlike clone typefaces segoe family fonts metrically compatible frutiger used replacements united states copyright law abstract letter shapes functional text fonts copyrighted computer programming code font given copyright protection makes production distribution clone fonts possible early version segoe possibly evaluation version included certain versions suse linux longer ships part operating system segoe ui member segoe family used microsoft products user interface text well online user assistance material intended improve consistency users see text across languages distinguishable predecessor tahoma os x user interface font lucida grande rounder letters segoe ui produced monotype imaging light semibold versions segoe ui introduced windows 7 windows 8 8.1 10 segoe ui undergone number changes stylistic additions windows 8.1 segoe ui gained black black italic weights latin greek cyrillic scripts segoe ui optimized vista default cleartype rendering environment significantly less legible cleartype disabled except key user interface sizes 8 9 10 point segoe ui hinted bi-level rendering standard font size increased 9 point windows vista accommodate better layout readability languages windows vista version segoe ui version 5.00 contains complete unicode 4.1 coverage latin greek cyrillic arabic romans totaling 2843 glyphs regular weight segoe ui true cursive italic unlike oblique used frutiger helvetica members segoe family include one time microsoft also posted package called print ad microsoft dynamics business management solutions brief description microsoft downloads center package included truetype postscript type 1 beta versions segoe branding fonts along powerpoint templates marketing material windows phones also include customised version called segoe wp n designed clarity narrow enhance take cleartype microsoft released selawik metric-compatible segoe ui replacement symbols segoe ui symbols segoe mdl2 assets fallback sil ofl 2015 fonts used winjs winstrap selawik also one microsoft recommended fonts universal windows platform apps latin glyphs segoe segoe ui also found following microsoft font families malgun gothic korean microsoft jhenghei traditional chinese microsoft yahei simplified chinese gisha hebrew leelawadee thai windows 7 also found ebrima n'ko tifinagh vai khmer ui khmer lao ui lao microsoft new tai lue tai lue microsoft phagspa phags-pa microsoft tai le tai le fonts glyph shapes diverge significantly segoe ui frutiger/myriad model ways calligraphic gisha leelawadee capital narrower raised apex lowercase l tails capital serifs characteristics also seen segoe ui italic
|
Operating systems
|
runlevel runlevel mode operation computer operating systems implement unix system v-style initialization conventionally seven runlevels exist numbered zero six sometimes used synonym one levels one runlevel executed startup run levels executed one another i.e runlevel 2 3 4 executed sequentially order runlevel defines state machine boot different runlevels typically assigned necessarily particular order single-user mode multi-user mode without network services started multi-user mode network services started system shutdown system reboot system states exact setup configurations varies operating systems linux distributions example runlevel 4 might multi-user gui no-server configuration one distribution nothing another runlevels commonly follow general patterns described article however distributions employ certain specific configurations standard practice computer enters runlevel zero halts enters runlevel six reboots intermediate runlevels 1–5 differ terms drives mounted network services started default runlevels typically 3 4 5 lower runlevels useful maintenance emergency repairs since usually n't offer network services particular details runlevel configuration differ widely among operating systems also among system administrators various linux distributions traditional script used version 7 unix first replaced runlevels systemd states major distributions although systemd used default major linux distributions runlevels still used means provided sysvinit project linux kernel booted program reads file determine behavior runlevel unless user specifies another value kernel boot parameter system attempt enter start default runlevel systems conforming linux standard base lsb need provide exact run levels given give meanings described may map level described different level provides equivalent functionality slackware linux uses runlevel 1 maintenance linux distributions runlevels 2 3 5 identically configured console services active runlevel 4 adds x window system starting solaris 10 smf service management facility used instead svr4 run levels latter emulated preserve compatibility legacy startup scripts aix follow system v r4 svr4 runlevel specification runlevels 0 9 available well c h 0 1 reserved 2 default normal multi-user mode runlevels 3 9 free defined administrator runlevels c h allow execution processes runlevel without killing processes started another runlevels true runlevels used tell init command enter maintenance mode system enters maintenance mode another runlevel system console used terminal
|
Operating systems
|
aes instruction set advanced encryption standard instruction set integrated many processors purpose instruction set improve speed well resistance side-channel attacks applications performing encryption decryption using advanced encryption standard aes often implemented instructions implementing single round aes along special version last round slightly different method aes-ni intel advanced encryption standard new instructions aes-ni first major implementation aes-ni extension x86 instruction set architecture microprocessors intel amd proposed intel march 2008 following intel processors support aes-ni instruction set several amd processors support aes instructions aes support unprivileged processor instructions also available latest sparc processors t3 t4 t5 m5 forward latest arm processors sparc t4 processor introduced 2011 user-level instructions implementing aes rounds instructions addition higher level encryption commands armv8-a processor architecture announced 2011 including arm cortex-a53 a57 previous v7 processors like cortex a5 7 8 9 11 15 also user-level instructions implement aes rounds august 2012 ibm announced then-forthcoming power7+ architecture would aes support commands architectures directly compatible aes-ni commands implement similar functionality ibm z9 later mainframe processors support aes single-opcode km kmc aes ecb/cbc instructions via ibm cryptoexpress hardware single-instruction aes versions therefore easier use intel ni ones may extended implement algorithms based aes round functions whirlpool hash function via x86 cpus amd geode marvell kirkwood arm mv_cesa linux use driver-based accelerated aes handling instead see crypto api linux following chips supporting aes hardware acceleration support aes instruction set programming information available arm architecture reference manual armv8 armv8-a architecture profile aes-ni performance analyzed patrick schmid achim roos found impressive results handful applications already optimized take advantage intel aes-ni capability performance analysis using crypto++ security library showed increase throughput approximately 28.0 cycles per byte 3.5 cycles per byte aes/gcm versus pentium 4 acceleration modern compilers emit aes instructions much security cryptography software supports aes instruction set including following core infrastructure
|
Computer architecture
|
mail unix mail command-line email client unix unix-like operating systems electronic mail start m. douglas mcilroy writes article research unix reader annotated excerpts programmer ’ manual 1971-1986 mail command included first released version research unix first edition unix version mail capable send append messages mailboxes users unix system helped managing reading mailbox current user 1978 kurt shoens wrote completely new version mail bsd2 referred berkeley mail although initially installed /usr/ucb/mail earlier unix mail still available /bin/mail modern unix linux systems commands mail mail and/or mailx invoke descendant berkeley mail much later base standardization mail program opengroup posix standardized variant mailx
|
Internet protocols
|
cellius cellius 株式会社セリウス kabushiki-gaisha seriusu located shibuya tokyo computer game developer founded 2007 venture sony bandai namco holdings aim company help take share microsoft corp. nintendo co. sony hopes company make losses made quarter two financial year 'father playstation ken kutaragi announced ceo bandai namco holdings holds 51 company sony holds 49 company plans use sony cell microprocessor heart playstation 3 playstation 3 games games mobile phones personal computers project ridge racer game playstation vita panned critics
|
Computer architecture
|
ntopng ntopng computer software monitoring traffic computer network designed high-performance low-resource replacement ntop name derived ntop next generation ntopng open-source software released gnu general public license gplv3 software source code versions available operating systems unix linux bsd mac os x windows binary versions available centos ubuntu os x demo binary available windows limits analysis 2,000 packets ntopng engine written programming language c++ optional web interface written lua ntopng relies redis key-value server rather traditional database takes advantage ndpi protocol detection supports geolocation hosts able display real-time flow analysis connected hosts explanation run ntopng executable set dns mode decode dns responses resolve numeric ips use fifth network interface operate daemon mode use redis server running local host operate verbose mode
|
Computer security
|
packet capture appliance packet capture appliance standalone device performs packet capture packet capture appliances may deployed anywhere network however commonly placed entrances network i.e internet connections front critical equipment servers containing sensitive information general packet capture appliances capture record network packets full header payload however appliances may configured capture subset network ’ traffic based user-definable filters many applications especially network forensics incident response critical conduct full packet capture though filtered packet capture may used times specific limited information gathering purposes network data packet capture appliance captures depends appliance installed network two options deploying packet capture appliances network one option connect appliance span port port mirroring network switch router second option connect appliance inline network activity along network route traverses appliance similar configuration network tap information captured stored packet capture appliance rather passing another device connected via span port packet capture appliance may receive record ethernet/ip activity ports switch router connected inline packet capture appliances captures network traffic traveling two points traffic passes cable packet capture appliance connected two general approaches deploying packet capture appliances centralized decentralized centralized approach one high-capacity high-speed packet capture appliance connects data-aggregation point advantage centralized approach one appliance gain visibility network ’ entire traffic approach however creates single point failure attractive target hackers additionally one would re-engineer network bring traffic appliance approach typically involves high costs decentralized approach place multiple appliances around network starting point entry proceeding downstream deeper network segments workgroups advantages include network re-configuration required ease deployment multiple vantage points incident response investigations scalability single point failure – one fails others combined electronic invisibility approach practically eliminates danger unauthorized access hackers low cost cons potential increased maintenance multiple appliances past packet capture appliances sparingly deployed oftentimes point entry network packet capture appliances deployed effectively various points around network conducting incident response ability see network data flow various vantage points indispensable reducing time resolution narrowing parts network ultimately affected placing packet capture appliances entry point front work group following path particular transmission deeper network would simplified much quicker additionally appliances placed front workgroups would show intranet transmissions appliance located entry point would able capture packet capture appliances come capacities ranging 500 gb 192 tb organizations extremely high network usage would use upper ranges capacities organizations would well served capacities 1 tb 4 tb good rule thumb choosing capacity allow 1 gb per day heavy users 1 gb per month regular users typical office 20 people average usage 1 tb would sufficient 1 4 years ratio 100/0 means simplex traffic real links even traffic full packet capture appliances capture record ethernet/ip activity filtered packet capture appliances capture subset traffic based set user-definable filters ip address mac address protocol unless using packet capture appliance specific purpose covered filter parameters generally best use full packet capture appliances otherwise risk missing vital data particularly using packet capture network forensics cybersecurity purposes paramount capture everything packet captured spot packet gone forever impossible know ahead time specific characteristics packets transmissions needed especially case advanced persistent threat apt apts hacking techniques rely success network administrators knowing work thus solutions place counteract intelligent packet capture uses machine learning filter reduce amount network traffic captured traditional filtered packet capture relies rules policies manually configured capture potentially malicious traffic intelligent packet capture uses machine learning models including features cyber threat intelligence feeds scientifically target capture threatening traffic machine learning techniques network intrusion detection traffic classification anomaly detection used identify potentially malicious traffic collection packet capture appliances encrypt captured data saving disk others considering breadth information travels network internet connection least portion could considered sensitive encryption good idea situations measure keep captured data secure encryption also critical element authentication data purposes data/network forensics sustained captured speed rate packet capture appliance capture record packets without interruption error long period time different peak capture rate highest speed packet capture appliance capture record packets peak capture speed maintained short period time appliance ’ buffers fill starts losing packets many packet capture appliances share peak capture speed 1 gbit/s actual sustained speeds vary significantly model model packet capture appliance permanent storage ideal network forensics permanent record-keeping purposes data captured overwritten altered deleted drawback permanent storage eventually appliance becomes full requires replacement packet capture appliances overwritable storage easier manage reach capacity start overwriting oldest captured data new however network administrators run risk losing important capture data gets overwritten general packet capture appliances overwrite capabilities useful simple monitoring testing purposes permanent record necessary permanent non-overwritable recording must network forensics information gathering businesses use gigabit ethernet speed networks continue time business intends use one centralized packet capture appliance aggregate network data would probably necessary use 10 gbe packet capture appliance handle large volume data coming network effective way use multiple 1 gbit/s inline packet capture appliances placed strategically around network need re-engineer gigabit network fit 10 gbe appliance since packet capture appliances capture store large amount data network activity including files emails communications could become attractive targets hacking packet capture appliance deployed length time incorporate security features protect recorded network data access unauthorized parties deploying packet capture appliance introduces many additional concerns security cost securing may outweigh benefits best approach would packet capture appliance built-in security features security features may include encryption methods “ hide ” appliance ’ presence network example packet capture appliances feature “ electronic invisibility ” stealthy network profile requiring using ip mac addresses though face connecting packet capture appliance via span port appears make secure packet capture appliance would ultimately still connected network order allow management data retrieval though accessible via span link appliance would accessible via management link despite benefits ability control packet capture appliance remote machine presents security issue could make appliance vulnerable packet capture appliances allow remote access robust system place protect unauthorized access one way accomplish incorporate manual disable switch toggle allows user physically disable remote access simple solution effective doubtful hacker would easy time gaining physical access appliance order flip switch final consideration physical security network security features world moot someone simply able steal packet capture appliance make copy ready access data stored encryption one best ways address concern though packet capture appliances also feature tamperproof enclosures
|
Computer security
|
pragmatic mapping pragmatic mapping — term current use linguistics computing cognitive psychology related fields — process given abstract predicate symbol comes associated action dynamic index particular logical object icon logical object may thing person relation event situation string conceivable level complexity relatively simple example conventional — successful appropriate mundanely “ true ” — linking proper name person conventional designation three parts process succeeds abstract symbol used represent something else name entire signifying predication instance something else represented symbol whatever signified act using symbol conventional way represent whatever usually represents act signifying pragmatic mapping process material argument imagined one comes associated predicate purports succeeds predicate must appropriate true mundane sense relative logical object predication may simple naming act complex representation consisting many distinct propositions many associated clauses instance say jesse james american outlaw name jesse james purports certain historical person may know shot another individual named robert ford may know movie featuring brad pitt jesse james released september 2007 select theaters across america pragmatic mapping name jesse james complete i.e. succeeds mapped onto certain individual actually shot robert ford nothing importance changes pragmatic mapping process turns jesse james robert ford figments someone ’ imagination excepting course truth value propositions include logical object name jesse james ordinary conversation human communication general demonstrated logically mathematically meaning utterly dependent true appropriate pragmatic mapping symbols conventional logical objects infants depend exemplification mapping relations acquire languages meaningful linguistic representations proved depend mappings
|
Computational linguistics
|
double fault x86 architecture double fault exception occurs processor encounters problem trying service pending interrupt exception example situation double fault would occur interrupt triggered segment interrupt handler resides invalid processor encounters problem calling double fault handler triple fault generated processor shuts double faults happen due kernel bugs rarely caused user space programs modern protected mode operating system unless program somehow gains kernel access viruses also low-level dos programs processors like powerpc sparc generally save state predefined reserved machine registers double fault situation another exception happens processor still using contents registers process exception sparc processors four levels registers i.e 4-window register system
|
Computer architecture
|
len sassaman leonard harris sassaman 1980 – july 3 2011 advocate privacy maintainer mixmaster anonymous remailer code operator randseed remailer sassaman graduated hill school 1998 sassaman employed security architect senior systems engineer anonymizer phd candidate katholieke universiteit leuven belgium researcher computer security industrial cryptography cosic research group led bart preneel david chaum bart preneel advisors sassaman well-known cypherpunk cryptographer privacy advocate worked network associates pgp encryption software member shmoo group contributor openpgp ietf working group gnu privacy guard project frequently appeared technology conferences like def con sassaman co-founder codecon along bram cohen co-founder hotpets workshop roger dingledine tor thomas heydt-benjamin co-author zimmermann–sassaman key-signing protocol age 21 organizer protests following arrest russian programmer dmitry sklyarov february 11 2006 fifth codecon sassaman proposed returning speaker noted computer scientist meredith l. patterson q presentation married couple worked together several research collaborations including critique privacy flaws olpc bitfrost security platform proposal formal methods analysis computer insecurity february 2011 meredith patterson current startup osogato aims commercialize patterson support vector machine-based query example research sassaman patterson announced osogato first product downloadable music recommendation tool superhappydevhouse 21 san francisco 2009 dan kaminsky presented joint work sassaman patterson black hat las vegas showing multiple methods attacking x.509 certificate authority infrastructure using techniques team demonstrated attacker could obtain certificate clients would treat valid domains attacker control sassaman reported died july 3 2011 patterson reported husband death suicide presentation given kaminsky 2011 black hat briefings revealed testimonial honor sassaman permanently embedded bitcoin block chain
|
Computer security
|
kernal kernal commodore name rom-resident operating system core 8-bit home computers original pet 1977 followed extended strongly related versions used successors vic-20 commodore 64 plus/4 c16 c128 commodore 8-bit machines kernal consists low-level close-to-the-hardware os routines roughly equivalent bios ibm pc compatibles contrast basic interpreter routines also located rom well higher-level device-independent i/o functionality user-callable via jump table whose central oldest part reasons backwards compatibility remains largely identical throughout whole 8-bit series kernal rom occupies last 8 kb 8-bit cpu 64 kb address space e000- ffff jump table modified point user-written routines example rewriting screen display routines display animated graphics copying character set ram use jump table new small computers time adventure international games published vic-20 cartridge example software uses kernal use jump table games memory dumped disk loaded commodore 64 run without modification kernal initially written commodore pet john feagans introduced idea separating basic routines operating system developed several people notably robert russell added many features vic-20 c64 simple yet characteristic example using kernal given following 6502 assembly language subroutine written ca65 assembler format/syntax code stub employs codice_1 routine whose address found address codice_2 65490 send text string default output device e.g. display screen kernal known kernel inside commodore since pet days 1980 robert russell misspelled word kernal notebooks commodore technical writers neil harris andy finkel collected russell notes used basis vic-20 programmer manual misspelling followed along stuck according early commodore myth reported writer/programmer jim butterfield among others word kernal acronym maybe likely backronym standing keyboard entry read network link fact makes good sense considering role berkeley softworks later used naming core routines gui os 8-bit home computers geos kernal surprisingly kernal implemented device-independent i/o api entirely dissimilar unix plan-9 nobody actually exploited far publicly known whereas one could reasonably argue everything file latter systems others could easily claim everything gpib-device former due limitations 6502 architecture time opening i/o channel requires three system calls first typically sets logical filename codice_3 system call second call codice_4 establishes gpib/ieee-488 device address communicate finally codice_5 called perform actual transaction application used codice_6 codice_7 system calls set application current input output channels respectively applications may number concurrently open files system-dependent limit e.g. c64 allows ten files opened thereafter codice_8 codice_1 prove useful actually conducting input output respectively codice_10 closes channel observe system call exists create i/o channel devices created destroyed dynamically normal circumstances likewise means exists seeking performing i/o control functions ioctl unix indeed kernal proves much closer plan-9 philosophy application would open special command channel indicated device conduct meta out-of-band transactions example delete scratch file disk user typically open resource called codice_11 device 8 9 channel 15 per established convention commodore 8-bit world channel 15 represents command channel peripherals relying message-passing techniques communicate commands results including exceptional cases example commodore basic might find software unlike following device numbers per established documentation restricted range 0,16 however limitation came specific adaptation ieee-488 protocol effect applies external peripherals relevant kernal system calls vectored programmers intercept system calls implement virtual devices address range 32,256 conceivably one load device driver binary memory patch kernal i/o vectors moment forward new virtual device could addressed far capability never publicly known utilized presumably two reasons 1 kernal provides means dynamically allocating device ids 2 kernal provides means loading relocatable binary image thus burden collisions i/o space memory space falls upon user platform compatibility across wide range machines falls upon software author nonetheless support software functions could easily implemented desired logical filename formats tends depend upon specific device addressed common device used course floppy disk system uses format similar codice_12 flag sorts directory listing indicating desire overwrite file already exists unused otherwise optional physical disk unit number 0 1 dual-drive systems 0 single-disk units like 1541 et al. defaults 0 left unspecified codice_13 resource name 16 characters length characters allowed except certain special characters codice_14 optional comma-separated list attributes flags example user wants overwrite program file called codice_15 might see filename like codice_16 used conjunction device 8 9 meanwhile filename rs-232 driver device 2 consists simply four characters encoded binary format devices keyboard device 0 cassette device 1 display interface device 3 printer device 4 5 require filenames function either assuming reasonable defaults simply needing
|
Computer architecture
|
doxing doxing dox abbreviation documents doxxing internet-based practice researching broadcasting private identifying information especially personally identifying information individual organization methods employed acquire information include searching publicly available databases social media websites like facebook hacking social engineering closely related internet vigilantism hacktivism doxing may carried various reasons including aid law enforcement business analysis risk analytics extortion coercion inflicting harm harassment online shaming vigilante justice doxing neologism evolved brief history comes spelling alteration abbreviation docs documents refers compiling releasing dossier personal information someone essentially doxing revealing publicizing records individual previously private difficult obtain term dox derives slang dropping dox according wired writer mat honan old-school revenge tactic emerged hacker culture 1990s hackers operating outside law era used breach opponent anonymity means expose opponents harassment legal repercussions consequently doxing often comes negative connotation vehicle revenge via violation privacy doxware cryptovirology attack invented adam young developed moti yung carries doxing extortion via malware first presented west point 2003 attack rooted game theory originally dubbed non-zero sum games survivable malware attack summarized book malicious cryptography follows attack differs extortion attack following way extortion attack victim denied access valuable information pay get back attack presented victim retains access information disclosure discretion computer virus doxware converse ransomware ransomware attack originally called cryptoviral extortion malware encrypts victim data demands payment provide needed decryption key doxware cryptovirology attack attacker malware steals victim data threatens publish unless fee paid anyone harvest information internet individuals particular structure place doxing meaning someone may seek kind information related target basic web search yield results social media platforms like facebook twitter myspace linkedin offer wealth private information many users high levels self-disclosure i.e sharing photos place employment phone number email address low levels security also possible derive person name home address cell-phone number services reverse phone lookup social engineering used extract information government sources phone companies addition tactics doxxer may use methods harvest information include information search domain name location searching based individual ip address people exposed doxing may targeted harassment methods harassment person fake signups mail pizza deliveries swatting dispatching armed police house spoofed tips hacker may obtain individual dox without making information public hacker may look information order extort coerce known unknown target also hacker may harvest victim information order break internet accounts take social media accounts victim may also shown details proof doxed order intimidate perpetrator may use fear intimidation gain power victim order extort coerce doxing therefore standard tactic online harassment used people associated 4chan gamergate vaccine controversies ethics doxing journalists matters assert issues public interest area much controversy many authors argued doxing journalism blurs line revealing information interest public releasing information individual private life wishes st. louis cardinals lost 1985 world series umpire denkinger became victim two st. louis disc jockeys publicly revealed telephone number home address 1990s anti-abortion activists secured abortion providers personal information home addresses phone numbers photographs posted hit list ruled courts immediate incitement violence site legend explained black font working greyed-out name wounded strikethrough fatality website included blood-dripping graphics celebrated providers deaths incited others kill injure remaining providers list 1993 2016 eight abortion providers killed anti-abortion terrorists starting march 2006 chinese internet phenomenon human flesh search engine (人肉搜索)shares much common doxing specifically refers distributed sometimes deliberately crowdsourced searches similar kinds information use digital media term dox entered mainstream public awareness media attention attracted anonymous internet-based group hacktivists pranksters make frequent use doxing well related groups like antisec lulzsec washington post described consequences innocent people incorrectly accused wrongdoing doxed nightmarish december 2011 anonymous exposed detailed information 7,000 members law enforcement response investigations hacking activities november 2014 anonymous began releasing identities members ku klux klan relation local klan members ferguson missouri making threats shoot anyone provoked protesting shooting michael brown anonymous also hijacked group twitter page resulted veiled threats violence members anonymous november 2015 major release information kkk planned discredited information released prematurely anonymous denied involvement november 5 2015 guy fawkes night anonymous released official list supposed currently unverified kkk members sympathizers following 2013 boston marathon bombing vigilantes reddit wrongly identified number people suspects notable among misidentified bombing suspects sunil tripathi student reported missing bombings took place body reported tripathi found rhode island providence river april 25 2013 reported rhode island health department cause death immediately known authorities said suspect foul play family later confirmed tripathi death result suicide reddit general manager erik martin later issued apology behavior criticizing online witch hunts dangerous speculation took place website journalists journal news westchester county new york accused doxing gun owners region story paper published december 2012 newsweek came fire writer leah mcgrath goodman claimed revealed identity anonymous creator bitcoin satoshi nakamoto though source sleuthing primarily public record heavily criticized doxing users reddit satoshi nakamoto case brought doxing greater attention particularly platforms twitter users questioned ethics doxing journalism many twitter users condemned doxing journalism wherein argued practice seemingly acceptable professional journalists wrong anyone else users discussed effect popularization concept doxing could journalism public interest raising questions journalism concerning public private figures many users argued doxing journalism blurs line revealing information interest public releasing information individual private life wishes march 2015 former major league baseball mlb pitcher curt schilling used doxing identify several people responsible twitter troll posts obscene sexually explicit comments teenaged daughter one person suspended community college another lost part-time job new york yankees december 2015 minneapolis city councilwoman alondra cano used twitter account publish private cellphone numbers e-mail addresses critics wrote involvement black lives matter rally 2016 fox business news anchor lou dobbs revealed address phone number jessica leeds one women accused american presidential candidate donald trump inappropriate sexual advances dobbs later apologized july 2016 wikileaks released 300,000 e-mails called erdoğan emails initially thought damaging turkish president recep tayyip erdoğan included leak michael best uploaded turkish citizens personal information databases wikileaks promoted came forward say mistake site uploaded information took files removed due privacy concerns included spreadsheets private sensitive information appears every female voter 79 81 provinces turkey including home addresses private information sometimes including cellphone numbers november 2016 politico editor michael hirsh resigned publishing home address white nationalist richard b. spencer facebook july 2017 united states presidential advisory commission election integrity established may 2017 u.s. president donald trump investigate controversial allegation voter fraud published 112-page document unredacted emails public comment work included critics supporters commission commission included personal details critics names emails phone numbers home addresses commenters wrote white house expressed concern publication personal information one person writing release voter data period despite person name email address published commission act drew criticism theresa lee staff attorney american civil liberties union voting rights project stated cavalier attitude toward public personal information especially concerning given commission request sensitive data every registered voter country white house defended publication personal information noting everyone warned might happen however former deputy secretary labor chris lu stated regardless legality white house moral obligation protect sensitive data saying whether legal disclose personal information clearly improper responsible white house would federal agencies often solicit release public comments proposed legislation regulations.gov designated public comments includes detailed set guidelines explaining submit comments type personal information collected information may used stating agencies may require include personal information name email address comment form securities exchange commission instance warns commenters 'submit information wish make available publicly another agency federal trade commission tells commenters published comments include commenter last name state/country well entire text comment please include sensitive confidential information however white house appear issued public guidelines warnings many emails sent marc lotter press secretary mike pence stated public comments similar individuals appearing commission make comments providing name making comments commission ’ federal register notice asking public comments website make clear information 'including names contact information sent email address may released october 3 2018 jackson cosko house fellow democratic party arrested u.s. capitol police uscp allegedly posted private identifying information several senators wikipedia according uscp personal information republican senators lindsey graham mike lee orrin hatch anonymously posted wikipedia week thursday september 27 2018 information included home addresses phone numbers three lawmakers senate judiciary committee alleged doxing occurred hearing supreme court nominee judge brett kavanaugh cosko initially charged witness tampering threats interstate communications unauthorized access government computer identity theft second degree burglary unlawful entry cosko fired arrest worked democratic rep. sheila jackson lee d-tx sen. dianne feinstein d-calif sen. maggie hassan d-n.h. former sen. barbara boxer d-calif convicted six charges cosko faces 20 years prison june 2019 sentenced judge thomas f. hogan four years prison
|
Computer security
|
socket fp3 socket fp3 µbga906 cpu socket laptops released june 2014 amd mobility apu products codenamed kaveri kaveri -branded products combine steamroller crystal series gcn uvd 4.2 vce 2 video acceleration amd trueaudio audio acceleration amd eyefinity-based multi-monitor support two non-displayport- four displayport monitors pcie links capable supporting pcie 2.x data rates addition gfx link capable supporting pcie 3.x data rate fp3 package supports two different voltage levels vddp rail 1.05 v nominal setting gfx link support pci express 3.x data rate 0.95 v setting maximum data rate supported gfx link pci express 2.x desktop counterpart socket fm2+
|
Computer architecture
|
parallel text parallel text text placed alongside translation translations parallel text alignment identification corresponding sentences halves parallel text loeb classical library clay sanskrit library two examples dual-language series texts reference bibles may contain original languages translation several translations ease comparison study origen hexapla greek sixfold placed six versions old testament side side famous example rosetta stone large collections parallel texts called parallel corpora see text corpus alignments parallel corpora sentence level prerequisite many areas linguistic research translation sentences split merged deleted inserted reordered translator makes alignment non-trivial task four main corpora types distinguished noisy parallel corpus contains bilingual sentences perfectly aligned poor quality translations nevertheless contents bilingual translations specific document comparable corpus built non-sentence-aligned untranslated bilingual documents documents topic-aligned quasi-comparable corpus includes heterogeneous non-parallel bilingual documents may may topic-aligned rarest parallel corpora corpora contain translations document two languages aligned sentence level least large corpora used training sets machine translation algorithms usually extracted large bodies similar sources databases news articles written first second languages describing similar events however extracted fragments may noisy extra elements inserted corpus extraction techniques differentiate bilingual elements represented corpora monolingual elements represented one corpus order extract cleaner parallel fragments bilingual elements comparable corpora used directly obtain knowledge translation purposes high-quality parallel data difficult obtain however especially under-resourced languages field translation studies bitext merged document composed source- target-language versions given text bitexts generated piece software called alignment tool bitext tool automatically aligns original translated versions text tool generally matches two texts sentence sentence collection bitexts called bitext database bilingual corpus consulted search tool concept bitext shows certain similarities translation memory generally salient difference bitext translation memory translation memory database segments matched sentences stored way totally unrelated original context original sentence order lost bitext retains original sentence order however implementations translation memory translation memory exchange tmx standard xml format exchanging translation memories computer-assisted translation cat programs allow preserving original order sentences bitexts designed consulted human translator machine small alignment errors minor discrepancies would cause translation memory fail importance original 1988 article harris also posited bitext represents translators hold source target texts together mental working memories progress however hypothesis followed
|
Computational linguistics
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.