text
stringlengths 6
1.88M
| source
stringclasses 13
values |
---|---|
quack.com quack.com early voice portal company domain name later used quack ipad search application aol founded 1998 steven woods jeromy carriere alex quilici pittsburgh pennsylvania usa based voice portal infrastructure company named quackware quack first company try create voice portal consumer-based destination site consumers could access information voice alone also complete transactions quackware launched beta phone service 1999 allowed consumers purchase books sites amazon cds sites cdnow answering short set questions quack followed set information services movie listings inspired expanding upon moviefone news weather stock quotes concept introduced series lookalike startups including tellme networks raised money internet startup history similar concept quack received venture funding 1999 moved operations mountain view silicon valley california 1999 deal lycos announced may 2000 september 2000 quack acquired 200 million america online aol moved onto netscape campus left netscape team quack attacked canadian press representative canadian brain drain us internet bubble focusing recruiting efforts university waterloo hiring 50 engineers waterloo less 10 months quack competitor tellme networks raised enormous funds became highly competitive market 2000 emergence dozen additional competitors 12-month period following acquisition america online effort led ted leonsis bring quack aol interactive quack voice service became aolbyphone one aol web properties along mapquest moviefone others quack secured several patents underlie technical challenges delivering interactive voice services constructing voice portal required integrations innovations speech recognition speech generation also databases application specification constraint-based reasoning artificial intelligence computational linguistics quack name derived company goal providing voice-based services broadly quick ubiquitous access consumer knowledge patents assigned quack.com include system method voice access internet-based information system method advertising internet voice portal recognizing axiom interactive voice systems one must know set possible answers question asking system method determining one web site information another web site quack.com spoofed simpsons march 2002 episode blame lisa comquaak sign replaced another equally crazy telecom company name july 2010 quack.com became focus new aol ipad application web search experience product delivers web results blends picture video twitter results enables preview web results go site search within result flip results pages making full use ipad touch screen features ipad app free via itunes support discontinued 2012
|
Computational linguistics
|
meiryo decided new japanese font needed current ones mainly ms gothic ms mincho incompatible microsoft cleartype subpixel rendering technology meiryo intended increase legibility characters lcd screens cleartype available windows latin fonts since release windows xp october 2001 however unlike latin fonts use cleartype hinting system sizes japanese fonts distributed windows included embedded bitmap versions fonts small sizes although fonts using hinted cjk glyphs exist arial unicode ms distributed windows prior vista meiryo ui version uses condensed kana reduced line height compared meiryo introduced windows 7 also available update windows vista windows server 2008 similar ms gothic meiryo ui fonts bundled meiryo ttc files respective weights meiryo ui update also available windows vista windows server 2008 meiryo designed enhanced version verdana regarded highly readable font font baseline raised slightly improve readability mixing latin cjk texts meiryo glyphs kanji kana also height-to-width ratio 95:100 previous japanese fonts distributed windows embedded bitmap glyphs used whenever font size set around 9 points unlike previous fonts designed cjk environments meiryo contains embedded bitmaps improve readability small font sizes without using embedded bitmaps truetype hinting language used stroke-reduction similar technology used mingliu pmingliu versions 5.03 meiryo developed comply jis x 0213:2004 also use newest set personal name characters provided japanese minister justice addition contains opentype tables jis78 jis83 jis90 forms legacy usages meiryo supports following opentype layout features cyrillic greek han ideographic kana latin scripts nalt afrc dnom dlig frac fwid hwid hkna ital jp78 jp83 jp90 numr qwid ruby sinf zero smcp c2sc liga sups twid vkna vrt2 vert kern meiryo also contains glyphs normally accessible without font editor glyphs include circled 00 51–100 negative circled 00 21–100 a–z a–z kana rounded square-enclosed characters negative rounded square-enclosed characters 2x2 cjk words italic version meiryo provides italicized glyphs latin alphabet written japanese traditionally italicized microsoft windows meiryo distributed two truetype collection files regular bold glyphs stored separate files file also contains italic variant font stated earlier font included windows vista operating system windows xp font become available free charge obtaining japanese version microsoft visual c 2008 express edition electing install microsoft silverlight runtime downloading installing japanese cleartype fonts windows xp microsoft also makes meiryo available windows xp meiryo also distributed japanese version microsoft office 2008 mac microsoft office 2010 microsoft office 2013 japanese characters meiryo designed c g inc. eiichi kōno also redesigned johnston font used london underground new johnston latin characters designed matthew carter british-born creator verdana font visibly similar characters verdana font designed combination japanese latin font experts microsoft strived create font written english japanese could present well together side-by-side screen american tom rickner ascender corporation extensive programming font hinting meiryo rickner helped create first truetype fonts apple font hinting microsoft ’ georgia verdana fonts according rickner meiryo one first japanese fonts created computer screen took two years create engineer font name comes japanese word meiryō means clarity referring cleartype making text written meiryo appear clearer screen japanese spelling taken english pronunciation actual japanese spelling katakana according eiichi kōno name chosen exotic-sounding pronunciation compactness although proportional font font name contain p indicate windows font lists tokyo type directors club awarded 2007 type design prize eiichi kōno c g inc satoru akamoto takeharu suzuki yukiko ueda matthew carter meiryo font
|
Operating systems
|
hyper-v microsoft hyper-v codenamed viridian formerly known windows server virtualization native hypervisor create virtual machines x86-64 systems running windows starting windows 8 hyper-v superseded windows virtual pc hardware virtualization component client editions windows nt server computer running hyper-v configured expose individual virtual machines one networks hyper-v first released alongside windows server 2008 available without additional charge since windows server 2012 windows 8 standalone windows hyper-v server free command line interface beta version hyper-v shipped certain x86-64 editions windows server 2008 finalized version released june 26 2008 delivered windows update hyper-v since released every version windows server microsoft provides hyper-v two channels hyper-v server 2008 released october 1 2008 consists windows server 2008 server core hyper-v role windows server 2008 roles disabled limited windows services hyper-v server 2008 limited command-line interface used configure host os physical hardware software menu driven cli interface freely downloadable script files simplify configuration addition hyper-v server supports remote access via remote desktop connection however administration configuration host os guest virtual machines generally done network using either microsoft management consoles another windows computer system center virtual machine manager allows much easier point click configuration monitoring hyper-v server hyper-v server 2008 r2 edition windows server 2008 r2 made available september 2009 includes windows powershell v2 greater cli control remote access hyper-v server requires cli configuration network interfaces windows firewall also using windows vista pc administer hyper-v server 2008 r2 fully supported hyper-v implements isolation virtual machines terms partition partition logical unit isolation supported hypervisor guest operating system executes must least one parent partition hypervisor instance running supported version windows server 2008 later virtualization software runs parent partition direct access hardware devices parent partition creates child partitions host guest oss parent partition creates child partitions using hypercall api application programming interface exposed hyper-v. child partition access physical processor handle real interrupts instead virtual view processor runs guest virtual address depending configuration hypervisor might necessarily entire virtual address space depending vm configuration hyper-v may expose subset processors partition hypervisor handles interrupts processor redirects respective partition using logical synthetic interrupt controller synic hyper-v hardware accelerate address translation guest virtual address-spaces using second level address translation provided cpu referred ept intel rvi formerly npt amd child partitions direct access hardware resources instead virtual view resources terms virtual devices request virtual devices redirected via vmbus devices parent partition manage requests vmbus logical channel enables inter-partition communication response also redirected via vmbus devices parent partition also virtual devices redirected reaches parent partition gain access physical devices parent partitions run virtualization service provider vsp connects vmbus handles device access requests child partitions child partition virtual devices internally run virtualization service client vsc redirect request vsps parent partition via vmbus entire process transparent guest os virtual devices also take advantage windows server virtualization feature named enlightened i/o storage networking graphics subsystems among others enlightened i/o specialized virtualization-aware implementation high level communication protocols like scsi allows bypassing device emulation layer takes advantage vmbus directly makes communication efficient requires guest os support enlightened i/o currently following operating systems support enlightened i/o allowing therefore run faster guest operating systems hyper-v operating systems need use slower emulated hardware hyper-v role available x86-64 variants standard enterprise datacenter editions windows server 2008 later well pro enterprise education editions windows 8 later windows server installed regardless whether installation full core installation addition hyper-v made available part hyper-v server operating system freeware edition windows server either way host computer needs following amount memory assigned virtual machines depends operating system number cpus assigned virtual machine also depends os also maximum number concurrently active virtual machines following table lists supported guest operating systems windows 10 pro rs5 windows server 2019 fedora 8 9 unsupported however reported run third-party support freebsd 8.2 later guests provided partnership netapp citrix includes emulated paravirtualized modes operation well several hyperv integration services windows 10 home support hyper-v desktop virtualization vdi products third-party companies quest software vworkspace citrix xendesktop systancia applidis fusion ericom powerterm webconnect provide ability host centrally manage desktop virtual machines data center giving end users full pc desktop experience guest operating systems enlightened i/o hypervisor-aware kernel windows server 2008 later server versions windows vista sp1 later clients offerings citrix xenserver novell able use host resources better since vsc drivers guests communicate vsps directly vmbus non- enlightened operating systems run emulated i/o however integration components include vsc drivers available windows server 2003 sp2 windows vista sp1 linux achieve better performance july 20 2009 microsoft submitted hyper-v drivers inclusion linux kernel terms gpl microsoft required submit code discovered incorporated hyper-v network driver gpl-licensed components statically linked closed-source binaries kernels beginning 2.6.32 may include inbuilt hyper-v paravirtualization support improves performance virtual linux guest systems windows host environment hyper-v provides basic virtualization support linux guests box paravirtualization support requires installing linux integration components satori inputvsc drivers xen-enabled linux guest distributions may also paravirtualized hyper-v. microsoft officially supported suse linux enterprise server 10 sp1/sp2 x86 x64 manner though xen-enabled linux able run february 2008 red hat microsoft signed virtualization pact hypervisor interoperability respective server operating systems enable red hat enterprise linux 5 officially supported hyper-v. hyper-v windows server 2012 windows server 2012 r2 changes support list follows hyper-v like microsoft virtual server windows virtual pc saves guest os single virtual hard disk file supports older .vhd format well newer .vhdx older .vhd files virtual server 2005 virtual pc 2004 virtual pc 2007 copied used hyper-v old virtual machine integration software equivalents hyper-v integration services must removed virtual machine migrated guest os configured started using hyper-v guest os detect changes virtual hardware installing hyper-v integration services installs five services improve performance time adding new guest video network card drivers hyper-v virtualize audio hardware windows 8.1 windows server 2012 r2 possible work around issue connecting virtual machine remote desktop connection network connection use audio redirection feature windows 8.1 windows server 2012 r2 add enhanced session mode provides redirection without network connection optical drives virtualized guest vm read-only officially hyper-v support host/root operating system optical drives pass-through guest vms result burning discs audio cds video cd/dvd-video playback supported however workaround exists using iscsi protocol setting iscsi target host machine optical drive talked standard microsoft iscsi initiator microsoft produces iscsi target software alternative third party products used cpus without second level address translation slat installation wddm accelerated graphics drivers primary os cause dramatic drop graphic performance occurs graphics drivers access memory pattern causes translation lookaside buffer flushed frequently cache thrashing windows server 2008 microsoft officially supported hyper-v default vga drivers support windows aero higher resolutions rotation multi-monitor display however unofficial workarounds available certain cases older non-wddm graphics drivers sometimes cause performance issues though drivers always install smoothly windows server intel integrated graphics cards cause tlb flushing even wddm drivers nvidia graphics drivers experience problems long windows aero turned 3d applications running windows server 2008 r2 microsoft added support second level address translation hyper-v since slat required run hyper-v windows server problem continue occur non-slat cpu used accelerated graphics drivers however slat required run hyper-v client versions windows 8 hyper-v windows server 2008 support live migration guest vms live migration defined maintaining network connections uninterrupted services vm migration physical hosts instead hyper-v server 2008 enterprise datacenter editions supports quick migration guest vm suspended one host resumed another host operation happens time takes transfer active memory guest vm network first host second host however release windows server 2008 r2 live migration supported use cluster shared volumes csvs allows failover individual vm opposed entire host failover seems node hyper-v server vm fails vm running failed node may migrate live nodes independently vms lun running nodes share lun failed node hyper-v clustering hyper-v nodes vms. see also cluster shared volumes windows server 2012 implementation hyper-v version 3.0 introduced many new features increase vm mobility including ability execute simultaneous live migrations windows server 2008 r2 supported live migrating single vm time significantly increasing time required carry administrative tasks draining node scheduled maintenance real limiting factor hardware network bandwidth available windows server 2012 also supports new shared nothing live migration option traditional shared storage required order complete migration also referred “ live system migration ” shared nothing live migration move running vm storage one hyper-v host another without perceived downtime live migration different host os versions possible although soon addressed windows server 2012 r2 windows server 2012 also introduced ability use simple smb shares shared storage option conjunction new scale file services role server 2012 highly available environments alleviating need expensive sans particularly useful low budget environments without need sacrifice performance due many new improvements smb3 stack windows server 2012 fully support live migration vms running smb shares whether live live system migration hyper-v windows server 2012 also supports ability migrate running vm storage whereby active virtual machines storage moved one infrastructure another without vm workload affected reducing limitations associated vm mobility introduction windows server 2012 r2 smb 3.0 introduced transport option live migration either clustered non-clustered virtualization hosts enables hyper-v live migration leverage additional benefits smb 3.0 brings smb multichannel smb direct conjunction rdma nics increased live migration performance windows xp frequently accesses cpu apic task-priority register tpr interrupt request level changes causing performance degradation running guests hyper-v. microsoft fixed problem windows server 2003 later intel adds tpr virtualization flexpriority vt-x intel core 2 stepping e onwards alleviate problem amd similar feature amd-v uses new register purpose however means guest use different instructions access new register amd provides driver called amd-v optimization driver installed guest network card teaming link aggregation supported nic manufacturer supplied drivers support nic teaming however windows server 2012 thus version hyper-v included supports software nic teaming hyper-v management tools compatible windows vista home basic home premium windows 7 home premium home basic starter hyper-v 2012 managed windows 8 windows server 2012 successors hyper-v uses vt-x intel amd-v amd x86 virtualization since hyper-v native hypervisor long installed third-party software use vt-x amd-v. instance intel haxm android device emulator used android studio microsoft visual studio run hyper-v installed 64-bit skus windows 8 pro enterprise later come special version hyper-v called client hyper-v. windows server 2012 introduced many new features hyper-v. windows server 2012 r2 microsoft introduced another set new features hyper-v windows server 2016 windows 10 1607 adds hyper-v windows server 2019 windows 10 1809 adds
|
Operating systems
|
yseop yseop pronounced easy-op privately held multinational computer software company offices new york oxford uk lyon bogota dallas paris company commercialises artificial intelligence powered natural language generation software yseop compose flagship solution automates writing written reports financial services business intelligence marketing writes english spanish french german dutch japanese yseop commercializes natural language generation nlg software applies reasoning data turns written recommendations reports speed 3,000 pages per second software also used write newspaper stories data explain motivation context behind numbers date yseop software write english spanish french german premise self-service nlg software market yseop software used across variety industries financial industry including example société générale factset insurance 2014 tom austin vice president fellow gartner cited yseop narrative science automated insights part smart machine technological revolution promise one disruptive changes ever 2014 yseop also listed one top 10 innovative startups france electronic business group digital innovation summit paris 2015 yseop honored leading vendor—digital solutions financial advisors 2015 myprivatebanking research 2015 economist featured yseop one front cover articles 2016 ventana research named yseop software one innovative us year 2016 2019 future finance partnership deloitte granted societe generale innovative initiative year award digitization management control processes based yseop platform https //www.businesswire.com/news/home/20190410005068/fr/ research development yseop technology began 20 years ago team mathematical lab called ens cachan france yseop first commercialized product middleware end 2008 opened american subsidiary dallas texas 2012 yseop founded alain kaeser john rauscher sold start-up called sunopsis oracle 2006 competing companies yseop composein nlg industry include narrative science firm based chicago automated insights firm based durham north carolina retresco based berlin germany united robots sweden arria nlg yseop software suite also competes indirectly ibm watson
|
Computational linguistics
|
java processor java processor implementation java virtual machine jvm hardware words java bytecode makes instruction set abstract machine becomes instruction set concrete machine today popular form high-level language computer architecture many java processors available including
|
Computer architecture
|
sorcerian first game developed nihon falcom fifth dragon slayer line games originally released nec pc-8801 1987 later ported personal computer platforms nec pc-9801 nec pc-88va sharp x1 turbo msx2 released title dragon slayer v sorcerian english version ms-dos pcs published sierra entertainment 1990 ports atari st commodore amiga apple iigs macintosh platforms announced released 1997 falcom released sorcerian forever microsoft windows-based pcs 2000 falcom released sorcerian original remake sorcerian microsoft windows-based pcs addition console versions sorcerian somewhat differing content pc counterparts developed version mega drive developed sega version pc engine cd developed victor musical industries version dreamcast developed victor interactive software mega drive version re-released wii virtual console september 16 2008 ios version released january 20 2012 sorcerian side-scrolling action-rpg player create ten characters four members present party time character highly customizable four different classes/races fighter wizard elf dwarf 60 possible jobs/occupations ranging clown exorcist available perform strengths weaknesses affecting seven primary attributes strength intelligence protection magic resistance vitality dexterity karma different ways well different equipment limitations player choose fifteen different scenarios quests play order choice party must battle enemies perform tasks within given levels clear scenario moving onto another scenario choice player controls entire party time four members running line jumping sequence attacking unison party members follow behind manner similar options arcade shooter gradius 1985 sorcerian also employs class-based puzzles using high-strength character force open doors characters default starting age 16 time player begins new scenario year passes additional time passes towns character goes training enchants items characters age different rates depending race humans reaching old age 60 dwarves 100 elves 200 upon reaching old age every year passes character die permanently random time also “ advance time ” speed flow time another new feature sorcerian episodic format extended across various expansion packs besides default fifteen scenarios come game number additional scenario packs released aging system created additional scenario packs mind number add-on expansion packs containing new scenarios developed pc-8801 version sorcerian falcom companies soundtrack original sorcerian composed yuzo koshiro mieko ishikawa reiko takebayashi hideya nagata takahito abe falcom-developed additional scenarios handled solely ishikawa music original sorcerian arranged kenji kawai pc engine cd release rob atesalp ken allen composed mt-32 midi-compatible arrangement soundtrack sierra entertainment english version game soundtrack releases sorcerian include 1990 famicom tsūshin famitsu reviewed sega mega drive genesis version game giving generally positive score 27 40 computer gaming world reviewed pc dos version october 1991 issue noted interesting feature two liked game division many miniquests stating instead usual long adventure one sports fifteen separate small quests allows certain amount variety however disliked magic system stated action arcade style typical japanese game find irksome noted hack-and-slash puzzles solved along way magazine concluded sorcerian good change pace comfortable arcade action 2008 game designer hideki kamiya listed sorcerian among favorite games time citing one games influenced work production platinumgames title scalebound kamiya said inspired sorcerian well hydlide 3 noted influence sorcerian nowiki /nowiki fantasy theme gigantic monsters different scenarios expansive possibilities tons adventures enemies hydra boss lots amazing dragons version sorcerian ios base game includes 5 free scenarios maximum party size 5 characters pay versions include 10 extra scenarios maximum party size 10 characters part sorcerian 25th anniversary 2012-12-06 2012-12-20 sorcerian ios released free 3 in-game items 10000gold revival lv3 x2 magic item x3 free registering aeriagames member gets revival lv3 x3 in-game items
|
Computer architecture
|
deus ex machina video game deus ex machina video game designed created mel croucher published automata uk zx spectrum october 1984 later converted popular 8-bit formats game first accompanied fully synchronised soundtrack featured narration celebrity artists music cast included ian dury jon pertwee donna bailey frankie howerd e.p thompson croucher also composed music andrew stagg coded original spectrum version colin jones later known author/publisher colin bradshaw-jones programmer commodore 64 version game charts life defect formed machine conception growth evolution eventually death progression loosely based seven ages man shakespeare play like includes many quotations parodies despite critical acclaim time game conform conventions packaging pricing required distributors retailers game sold mail-order direct public subsequently gained cult status underground art game game name latin expression deus ex machina literally meaning god machine players game take control defected machine taken form human body players would experience different stages life way cell senile old considered visual-audio entertainment although game sound separated audio cassette tape needs played alongside game length audio cassette 46 minutes also length game although game could played without audio cassette would make easier understand help soundtrack soundtrack includes songs musical compositions also voices famous actors game comes full transcript speech could times played without audio deus ex machina zx spectrum 1984 mobygames retrieved 2018-12-11 croucher retrospectively viewed game disappointment saying sold game sensible price wanted put lovely poster nice packaging double vinyl gatefold result price £15 compared usual £8 meant sales low game broke even 2010 game included one titles book 1001 video games must play die re-imagining game went production 2010 title deus ex machina 2 design creation croucher new cast led sir christopher lee programmer chyna whyne machine chris madin defect joaquim de almeida defect police original ian dury session vocals 2014 croucher released book game history making new game book entitled deus ex machina best game never played life game sequel eventually released 2015 2018 rights automata uk games transferred company subvert ltd
|
Computer architecture
|
criticism desktop linux criticism desktop linux history comment perceived shortcomings linux operating system installed desktop computers criticisms questioned plethora choice usefulness desktop systems also multi-media playback audio development linux based android operating system dominates smartphone market many countries linux used new york stock exchange supercomputers used relatively desktop laptop computers linus torvalds expressed intended linux kernel used desktop operating systems argues android widely used comes pre-installed new phones linux distributions would need bundled new computers gain market share linux criticized number reasons including lack user-friendliness steep learning curve inadequate desktop use lacking support exotic hardware relatively small games library lacking native versions widely used applications missing gui api standardization critics believe linux ever gain large share desktop market may 2009 preston gralla contributing editor computerworld.com believed linux never important desktop/notebook users even though felt simple straightforward use low usage indicative low importance desktop market essay luxury ignorance open-source horror story eric s. raymond stated lack usability many open-source linux tools lack manuals lack thought users experience james donald princeton university analyzed shared library concepts several operation systems 2003 paper titled improved portability shared libraries worried lack windows application compatibility group equivalent desktop linux criticized late 2010 missed opportunity become significant force desktop computing pc world executive editor robert strohmeyer commented although linux exceptional security stability well great performance usability time desktop linux succeed missed nick farrell writing techeye felt release windows vista missed opportunity grab significant market share critics indicated linux fail desktop due geeky hard use obscure praise distributions strohmeyer saying best-known distribution ubuntu received high marks usability every major player technology press laid blame failure open-source community strohmeyer named fierce ideology open-source community large responsible farrell stated biggest killer putting penguin software desktop linux community think apple fanboys completely barking role models sanity loudmouthed open sauce religious loonies like many fundamentalists totally inflexible – waving gnu handed god richard stallman accusation over-zealous advocacy dealt previously 2006 dominic humphries stated aims linux community desktop market-share popularity linux best operating system made community choice applications free software development offers led people criticize linux confusing new users past well large number choices linux desktop operating systems although argued choice one key strengths linux tony mobily editor free software magazine identified problems server roots linux article 2009 software installation gnu/linux still broken – path fixing august 2014 debconf portland also linus torvalds voiced unhappiness binary application packaging linux distro ecosystem lack strong api standards multimedia criticised example adobe systems development blog penguin.swf discusses complicated linux audio infrastructure analysis welcome jungle nearly one dozen actively supported systems called audio jungle pulseaudio main developer lennart poettering stated difficult programmers know audio api use purpose linux past criticized lack driver support however largely due manufacturers supporting linux system n't 2004 ati started development linux drivers major adoption linux servers android encouraged driver development linux wireless driver support problem area linux one time many drivers missing users required use solutions ndiswrapper utilizes drivers made windows operating system broadcom particularly criticized releasing drivers issue also worked around extracting proprietary firmware use linux broadcom since released free open-source drivers linux kernel eliminating issues modern broadcom chipsets problem largely fixed recent years fairly large number drivers adding support wireless cards available today however many features still missing drivers mostly due manufacturers providing specifications documentation thus forcing developers reverse engineer cards
|
Operating systems
|
schema migration software engineering schema migration also database migration database change management refers management incremental reversible changes relational database schemas schema migration performed database whenever necessary update revert database schema newer older version migrations performed programmatically using schema migration tool invoked specified desired schema version tool automates successive application reversal appropriate sequence schema changes brought desired state schema migration tools aim minimize impact schema changes existing data database despite preservation data general guaranteed schema changes deletion database column destroy data i.e values stored column rows table deleted instead tools help preserve meaning data reorganize existing data meet new requirements since meaning data often encoded configuration tools usually needs manual intervention schema migration allows fixing mistakes adapting data requirements change essential part software evolution especially agile environments see applying schema migration production database always risk development test databases tend smaller cleaner data better understood everything else fails amount data small enough human process production databases usually huge old full surprises surprises come many sources reasons migration process needs high level discipline thorough testing sound backup strategy developing software applications backed database developers typically develop application source code tandem evolving database schema code typically rigid expectations columns tables constraints present database schema whenever needs interact one version database schema code developed considered fully compatible version source code software testing developers may mock presence compatible database system unit testing level testing higher e.g integration testing system testing common developers test application local remote test database schematically compatible version source code test advanced applications migration subject migration testing schema migration technology data models longer need fully designed up-front capable adapted changing project requirements throughout software development lifecycle teams software developers usually use version control systems manage collaborate changes made versions source code different developers develop divergent relatively older newer branches source code make changes additions development supposing software development interacts database every version source code associated least one database schema compatible good software testing practice schema migrations performed test databases ensure schema compatible source code streamline process schema migration tool usually invoked part automated software build prerequisite automated testing phase schema migration tools said solve versioning problems database schemas version control systems solve versioning problems source code practice many schema migration tools actually rely textual representation schema changes files containing sql statements version history schema changes effectively stored alongside program source code within vcs approach ensures information necessary recover compatible database schema particular code branch recoverable source tree another benefit approach handling concurrent conflicting schema changes developers may simply use usual text-based conflict resolution tools reconcile differences schema migration tooling could seen facility track history evolving schema developers longer need remove entire test database order create new test database scratch e.g using schema creation scripts ddl generation tools generation test data costs lot time developers avoid regenerating test data small non-destructive changes schema
|
Databases
|
oil well oil well computer game published sierra on-line 1983 game written atari 8-bit family thomas j. mitchell oil well similar 1982 arcade game anteater re-themed drilling oil instead hungry insectivore ports released 1983 apple ii commodore 64 1984 colecovision ibm pc booter 1985 msx sharp x1 version improved visuals without mitchell involvement released ms-dos 1990 player attempts manage oil drilling operation collect oil done moving drill head maze using four directional control buttons head trailed pipeline connecting base subterranean creatures populate maze head destroy creatures pipeline vulnerable player traverses maze pipe grows longer pressing button quickly retracts head player advance eight different levels ahoy stated commodore version graphics sounds serviceable gameplay experience unique ... recommended infoworld called ibm pcjr version clever basic game early 1980s u.s. gaming magazine computer games awarded oil well 1984 golden floppy award excellence category maze game year despite already clone anteater several additional clones borrowed theme oil well pipeline run commodore 64 1990 oilmania atari st 1991
|
Computer architecture
|
locks ordered sharing databases transaction processing term locks ordered sharing comprises several variants two phase locking 2pl concurrency control protocol generated changing blocking semantics locks upon conflicts one variant identical strict commitment ordering sco
|
Databases
|
kelihos botnet kelihos botnet also known hlux botnet mainly involved spamming theft bitcoins kelihos botnet first discovered around researchers originally suspected found new version either storm waledac botnet due similarities modus operandi source code bot analysis botnet showed instead new 45,000-infected-computer-strong botnet capable sending estimated spam messages day microsoft took botnet operation codenamed operation b79 time microsoft filed civil charges dominique alexander piatti dotfree group sro 22 john doe defendants suspected involvement botnet issuing 3,700 subdomains used botnet charges later dropped microsoft determined named defendants intentionally aid botnet controllers january 2012 new version botnet discovered one sometimes referred kelihos.b version 2 consisting estimated 110,000 infected computers month microsoft pressed charges russian citizen andrey sabelnikov former security professional alleged creator kelihos botnet sourcecode second version botnet shut several privately owned firms sinkholing – technique gave companies control botnet cutting original controllers following shutdown second version botnet new version surfaced early 2 april though disagreement research groups whether botnet simply remnants disabled version 2 botnet new version altogether version botnet currently consists estimated 70,000 infected computers kelihos.c version mostly infects computers facebook sending users website malicious download links clicked trojan horse named fifesoc downloaded turns computer zombie part botnet 24 november 2015 kelihos botnet event occurred causing widespread false positives blacklisted ips ″november 24 2015 widespread false positives earlier today large scale kelihos botnet event occurred large scale many email installations seeing excess 20 kelihos spam see inbound email volume jump volume much 500 n't unusual thing normally cbl/xbl successfully dealing large scale kelihos spam spikes like often daily years email allegedly us federal reserve saying something restrictions u.s. federal wire ach online payments notice fraudulent attached excel spreadsheet .xls contained macro instructions downloader download windows executable virus likely dyreza dridex malware detection rules initially deployed cbl unfortunately insufficiently detailed listed number ip addresses error.″ affidavit unsealed february 5 2018 showed apple ’ unexpected role bringing russian spam king justice peter levashov allegedly ran kelihos botnet alias “ severa ” renting access spammers cybercriminals despite levashov ’ significant efforts anonymity court records show federal agents surveilling icloud account since may 20th 2016 funneling back crucial information may led arrest standing federal icloud warrant would given authorities running tab ip addresses used log account could easily tipped vacation barcelona spain arrested request us law enforcement extradited united states prosecution kelihos botnet so-called peer-to-peer botnet individual botnet nodes capable acting command-and-control servers entire botnet traditional non-peer-to-peer botnets nodes receive instructions work limited set servers – servers removed taken botnet longer receive instructions therefore effectively shut peer-to-peer botnets seek mitigate risk allowing every peer send instructions entire botnet thus making difficult shut first version botnet mainly involved denial-of-service attacks email spam version two botnet added ability steal bitcoin wallets well program used mine bitcoins spam capacity allows botnet spread sending malware links users order infect trojan horse though later versions mostly propagate social network sites particular facebook comprehensive list kelihos spam found following research paper february 2 2018 united states department justice announced russian national extradited spain arraigned connecticut charges stemming alleged operation kelihos botnet peter yuryevich levashov 37 also known pyotr levashov petr levashov peter severa petr severa sergey astakhov st. petersburg detained april 7 2017 barcelona arrested spanish authorities based upon criminal complaint arrest warrant issued united states district connecticut 3 february 2018 pleaded guilty charges wire email fraud hacking identity theft conspiracy appearing federal judge u.s. state connecticut remains detention september 2018 peter yuryevich levashov pleaded guilty
|
Computer security
|
sun microsystems sun microsystems inc. american company sold computers computer components software information technology services created java programming language solaris operating system zfs network file system nfs sparc sun contributed significantly evolution several key computing technologies among unix risc processors thin client computing virtualized computing sun founded february 24 1982 height sun headquarters santa clara california part silicon valley former west campus agnews developmental center april 20 2009 announced oracle corporation would acquire sun 7.4 billion deal completed january 27 2010 sun products included computer servers workstations built risc-based sparc processor architecture well x86-based amd opteron intel xeon processors sun also developed storage systems suite software products including solaris operating system developer tools web infrastructure software identity management applications technologies included java platform nfs general sun proponent open systems particularly unix also major contributor open-source software evidenced 1 billion purchase 2008 mysql open-source relational database management system various times sun manufacturing facilities several locations worldwide including newark california hillsboro oregon linlithgow scotland however time company acquired oracle outsourced manufacturing responsibilities initial design became sun first unix workstation sun-1 conceived andy bechtolsheim graduate student stanford university palo alto california bechtolsheim originally designed sun workstation stanford university network communications project personal cad workstation designed around motorola 68000 processor advanced memory management unit mmu support unix operating system virtual memory support built first ones spare parts obtained stanford department computer science silicon valley supply houses february 24 1982 scott mcnealy andy bechtolsheim vinod khosla stanford graduate students founded sun microsystems bill joy berkeley primary developer berkeley software distribution bsd joined soon counted one original founders sun name derived initials stanford university network sun profitable first quarter july 1982 1983 sun known producing 68k-based systems high-quality graphics computers dec vax run 4.2bsd licensed computer design manufacturers typically used build multibus-based systems running unix unisoft sun initial public offering 1986 stock symbol sunw sun workstations later sun worldwide symbol changed 2007 java sun stated brand awareness associated java platform better represented company current strategy sun logo features four interleaved copies word sun form rotationally symmetric ambigram designed professor vaughan pratt also stanford initial version logo orange sides oriented horizontally vertically subsequently rotated stand one corner re-colored purple later blue dot-com bubble sun began making much money shares rose dramatically also began spending much hiring workers building genuine demand much web start-up companies anticipating business would never happen 2000 bubble burst sales sun important hardware division went free-fall customers closed shop auctioned high-end servers several quarters steep losses led executive departures rounds layoffs cost cutting december 2001 stock fell 1998 pre-bubble level 100 kept falling faster many tech companies year later dipped 10 tenth even 1990 bounced back 20 mid-2004 sun closed newark california factory consolidated manufacturing hillsboro oregon 2006 rest newark campus put market 2004 sun canceled two major processor projects emphasized high instruction-level parallelism operating frequency instead company chose concentrate processors optimized multi-threading multiprocessing ultrasparc t1 processor codenamed niagara company also announced collaboration fujitsu use japanese company processor chips mid-range high-end sun servers servers announced april 17 2007 m-series part sparc enterprise series february 2005 sun announced sun grid grid computing deployment offered utility computing services priced us 1 per cpu/hour processing per gb/month storage offering built upon existing 3,000-cpu server farm used internal r 10 years sun marketed able achieve 97 utilization august 2005 first commercial use grid announced financial risk simulations later launched first software service product january 2005 sun reported net profit 19 million fiscal 2005 second quarter first time three years followed net loss 9 million gaap basis third quarter 2005 reported april 14 2005 january 2007 sun reported net gaap profit 126 million revenue 3.337 billion fiscal second quarter shortly following news announced kohlberg kravis roberts kkr would invest 700 million company sun engineering groups bangalore beijing dublin grenoble hamburg prague st. petersburg tel aviv tokyo trondheim 2007–2008 sun posted revenue 13.8 billion 2 billion cash first-quarter 2008 losses 1.68 billion revenue fell 7 12.99 billion sun stock lost 80 value november 2007 november 2008 reducing company market value 3 billion falling sales large corporate clients sun announced plans lay 5,000 6,000 workers 15–18 work force expected save 700 million 800 million year result moves also taking 600 million charges may 11 2009 following shareholders held 100,000 common shares sun 9.50 per share offered oracle received amounts indicated acquisition closed first decade sun history company positioned products technical workstations competing successfully low-cost vendor workstation wars 1980s shifted hardware product line emphasize servers storage high-level telecom control systems operational support systems service predominantly used sun equipment sun originally used motorola 68000 family central processing units sun-1 sun-3 computer series sun-1 employed 68000 cpu sun-2 series 68010 sun-3 series based 68020 later sun-3x using 68030 1987 company began using sparc risc processor architecture design computer systems starting sun-4 line sparc initially 32-bit architecture sparc v7 introduction sparc v9 architecture 1995 added 64-bit extensions sun developed several generations sparc-based computer systems including sparcstation ultra sun blade series workstations sparcserver netra enterprise sun fire line servers early 1990s company began extend product line include large-scale symmetric multiprocessing servers starting four-processor sparcserver 600mp followed 8-processor sparcserver 1000 20-processor sparccenter 2000 based work done conjunction xerox parc 1995 company introduced sun ultra series machines equipped first 64-bit implementation sparc processors ultrasparc late 1990s transformation product line favor large 64-bit smp systems accelerated acquisition cray business systems division silicon graphics 32-bit 64-processor cray superserver 6400 related sparccenter led 64-bit sun enterprise 10000 high-end server otherwise known starfire september 2004 sun made available systems ultrasparc iv first multi-core sparc processor followed ultrasparc iv+ september 2005 revisions higher clock speeds 2007 cpus used powerful enterprise class high-end cc-numa servers developed sun sun fire e25k november 2005 sun launched ultrasparc t1 notable ability concurrently run 32 threads execution 8 processor cores intent drive efficient use cpu resources particular importance data centers increasing need reduce power air conditioning demands much comes heat generated cpus t1 followed 2007 ultrasparc t2 extended number threads per core 4 8 sun open sourced design specifications t1 t2 processors via opensparc project 2006 sun ventured blade server high density rack-mounted systems market sun blade distinct sun blade workstation april 2007 sun released sparc enterprise server products jointly designed sun fujitsu based fujitsu sparc64 vi later processors m-class sparc enterprise systems include high-end reliability availability features later t-series servers also badged sparc enterprise rather sun fire april 2008 sun released servers ultrasparc t2 plus smp capable version ultrasparc t2 available 2 4 processor configurations first coolthreads cpu multi-processor capability made possible build standard rack-mounted servers could simultaneously process massive 256 cpu threads hardware sun sparc enterprise t5440 considered record industry since 2010 development sun machines based sparc architecture including new sparc t-series servers sparc t3 t4 chips done part oracle corporation hardware division late 1980s sun also marketed intel 80386-based machine sun386i designed hybrid system running sunos time supporting dos applications remained market brief time follow-up 486i upgrade announced prototype units ever manufactured sun brief first foray x86 systems ended early 1990s decided concentrate sparc retire last motorola systems 386i products move dubbed mcnealy wood behind one arrowhead even sun kept hand x86 world release solaris pc compatibles began shipping 1993 1997 sun acquired diba inc. followed later acquisition cobalt networks 2000 aim building network appliances single function computers meant consumers sun also marketed network computer term popularized eventually trademarked oracle javastation diskless system designed run java applications although none business initiatives particularly successful cobalt purchase gave sun toehold return x86 hardware market 2002 sun introduced first general purpose x86 system lx50 based part previous cobalt system expertise also sun first system announced support linux well solaris 2003 sun announced strategic alliance amd produce x86/x64 servers based amd opteron processor followed shortly sun acquisition kealia startup founded original sun founder andy bechtolsheim focusing high-performance amd-based servers following year sun launched opteron-based sun fire v20z v40z servers java workstation w1100z w2100z workstations september 12 2005 sun unveiled new range opteron-based servers sun fire x2100 x4100 x4200 servers designed scratch team led bechtolsheim address heat power consumption issues commonly faced data centers july 2006 sun fire x4500 x4600 systems introduced extending line x64 systems support solaris also linux microsoft windows january 22 2007 sun announced broad strategic alliance intel intel endorsed solaris mainstream operating system mission critical unix xeon processor-based systems contributed engineering resources opensolaris sun began using intel xeon processor x64 server line starting sun blade x6250 server module introduced june 2007 may 5 2008 amd announced operating system research center osrc expanded focus include optimization sun opensolaris xvm virtualization products amd based processors although sun initially known hardware company software history began founding 1982 co-founder bill joy one leading unix developers time contributed vi editor c shell significant work developing tcp/ip bsd unix os sun later developed software java programming language acquired software staroffice virtualbox mysql sun used community-based open-source licensing major technologies support products open source technologies gnome-based desktop software called java desktop system originally code-named madhatter distributed solaris operating system one point linux sun supported java enterprise system middleware stack linux released source code solaris open-source common development distribution license via opensolaris community sun positioning includes commitment indemnify users software intellectual property disputes concerning software offers support services variety pricing bases including per-employee per-socket 2006 report prepared eu unu-merit stated sun largest corporate contributor open source movements world according report sun open source contributions exceed combined total next five largest commercial contributors sun best known unix systems reputation system stability consistent design philosophy sun first workstation shipped unisoft v7 unix later 1982 sun began providing sunos customized 4.1bsd unix operating system workstations late 1980s tapped sun help develop next release branded unix 1988 announced would purchase 20 stake sun unix system v release 4 svr4 jointly developed sun sun used svr4 foundation solaris 2.x became successor sunos 4.1.x later retrospectively named solaris 1.x mid-1990s ensuing unix wars largely subsided sold unix interests relationship two companies significantly reduced 1992 sun also sold interactive unix operating system acquired bought interactive systems corporation eastman kodak company popular unix variant pc platform major competitor market leader sco unix sun focus interactive unix diminished favor solaris sparc x86 systems dropped product 2001 sun dropped solaris 2.x version numbering scheme solaris 2.6 release 1997 following version branded solaris 7 first 64-bit release intended new ultrasparc cpus based sparc v9 architecture within next four years successors solaris 8 solaris 9 released 2000 2002 respectively following several years difficult competition loss server market share competitors linux-based systems sun began include linux part strategy 2002 sun supported red hat enterprise linux suse linux enterprise server x64 systems companies canonical ltd. wind river systems montavista also supported versions linux sun sparc-based systems 2004 cultivated reputation one microsoft vocal antagonists sun entered joint relationship resolving various legal entanglements two companies receiving us 1.95 billion settlement payments sun supported microsoft windows x64 systems announced collaborative agreements microsoft including plans support virtualization environments 2005 company released solaris 10 new version included large number enhancements operating system well novel features previously unseen industry solaris 10 update releases continued next 8 years last release sun microsystems solaris 10 10/09 following updates released oracle new license agreement final release solaris 10 1/13 previously sun offered separate variant solaris called trusted solaris included augmented security features multilevel security least privilege access model solaris 10 included many capabilities trusted solaris time initial release solaris 10 11/06 included solaris trusted extensions give remaining capabilities needed make functional successor trusted solaris releasing solaris 10 source code opened cddl free software license developed open contributing opensolaris community sxce used svr4 .pkg packaging supported opensolaris releases used ips following acquisition sun oracle opensolaris continued develop open illumos illumos distributions oracle corporation continued develop opensolaris next solaris release changing back license proprietary released oracle solaris 11 november 2011 java platform developed sun james gosling early 1990s objective allowing programs function regardless device used sparking slogan write run anywhere wora objective entirely achieved prompting riposte write debug everywhere java regarded largely hardware- operating system-independent java initially promoted platform client-side applets running inside web browsers early examples java applications hotjava web browser hotjava views suite however since java successful server side internet platform consists three major parts java programming language java virtual machine jvm several java application programming interfaces apis design java platform controlled vendor user community java community process jcp java object-oriented programming language since introduction late 1995 became one world popular programming languages java programs compiled byte code executed jvm regardless environment java apis provide extensive set library routines apis evolved standard edition java se provides basic infrastructure gui functionality enterprise edition java ee aimed large software companies implementing enterprise-class application servers micro edition java used build software devices limited resources mobile devices november 13 2006 sun announced would licensing java implementation gnu general public license released java compiler jvm time february 2009 sun entered battle microsoft adobe systems promoted rival platforms build software applications internet javafx development platform music video applications builds java programming language 1999 sun acquired german software company star division office suite staroffice sun later released openoffice.org gnu lgpl sissl sun industry standards source license openoffice.org supported microsoft office file formats though perfectly available many platforms primarily linux microsoft windows mac os x solaris used open source community principal differences staroffice openoffice.org staroffice supported sun available either single-user retail box kit per-user blocks licensing enterprise included wider range fonts document templates commercial quality spellchecker staroffice also contained commercially licensed functions add-ons openoffice.org either replaced open-source free variants present packages native support opendocument format 2007 sun announced sun xvm virtualization datacenter automation product suite commodity hardware sun also acquired virtualbox 2008 earlier virtualization technologies sun like dynamic system domains dynamic reconfiguration specifically designed high-end sparc servers logical domains supports ultrasparc t1/t2/t2 plus server platforms sun marketed sun ops center provisioning software datacenter automation client side sun offered virtual desktop solutions desktop environments applications could hosted datacenter users accessing environments wide range client devices including microsoft windows pcs sun ray virtual display clients apple macintoshes pdas combination supported devices variety networks supported lan wan public internet virtual desktop products included sun ray server software sun secure global desktop sun virtual desktop infrastructure sun acquired mysql ab developer mysql database 2008 us 1 billion ceo jonathan schwartz mentioned blog optimizing performance mysql one priorities acquisition february 2008 sun began publish results mysql performance optimization work sun contributed postgresql project java platform sun contributed supported java db sun offered software products software development infrastructure services many developed house others came acquisitions including tarantella waveset technologies seebeyond vaau sun acquired many netscape non-browser software products part deal involving netscape merger aol software products initially offered iplanet brand sun-netscape alliance ended re-branded sun one sun open network environment sun java system sun middleware product branded java enterprise system jes marketed web application serving communication calendaring directory identity management service-oriented architecture sun open esb software suites available free charge systems running solaris red hat enterprise linux hp-ux windows support available optionally sun developed data center management software products included solaris cluster high availability software grid management package called sun grid engine firewall software sunscreen network equipment providers telecommunications customers sun developed sun netra high-availability suite sun produced compilers development tools sun studio brand building developing solaris linux applications sun entered software service saas market zembly social cloud-based computing platform project kenai open-source project hosting service sun sold storage systems complement system offerings also made several storage-related acquisitions june 2 2005 sun announced would purchase storage technology corporation storagetek us 4.1 billion cash 37.00 per share deal completed august 2005 2006 sun introduced sun storagetek 5800 system first application-aware programmable storage solution 2008 sun contributed source code storagetek 5800 system bsd license sun announced sun open storage platform 2008 built open source technologies late 2008 sun announced sun storage 7000 unified storage systems codenamed amber road transparent placement data systems solid-state drives ssd conventional hard drives managed zfs take advantage speed ssds economy conventional hard disks storage products included sun fire x4500 storage server sam-qfs filesystem storage management software sun marketed sun constellation system high-performance computing hpc even introduction sun constellation system 2007 sun products use many top500 systems supercomputing centers sun hpc clustertools product set message passing interface mpi libraries tools running parallel jobs solaris hpc clusters beginning version 7.0 sun switched implementation mpi open mpi donated engineering resources open mpi project sun participant openmp language committee sun studio compilers tools implemented openmp specification shared memory parallelization 2006 sun built tsubame supercomputer june 2008 fastest supercomputer asia sun built ranger texas advanced computing center tacc 2007 ranger peak performance 500 tflops 6th powerful supercomputer top500 list november 2008 sun announced opensolaris distribution integrated sun hpc products others notable sun employees included john gilmore whitfield diffie radia perlman marc tremblay sun early advocate unix-based networked computing promoting tcp/ip especially nfs reflected company motto network computer coined john gage james gosling led team developed java programming language jon bosak led creation xml specification w3c sun staff published articles company blog site staff encouraged use site blog aspect work personal life restrictions placed staff commercially confidential material jonathan i. schwartz one first ceos large companies regularly blog postings frequently quoted analyzed press 2005 sun microsystems one first fortune 500 companies instituted formal social media program sun sold oracle corporation 2009 5.6b sun staff asked share anecdotes experiences sun web site containing videos stories photographs 27 years sun made available september 2 2009 october sun announced second round thousands employees laid blamed partially delays approval merger transaction completed early 2010 january 2011 oracle agreed pay 46 million settle charges submitted false claims us federal government agencies paid kickbacks systems integrators february 2011 sun former menlo park california campus sold announced would become headquarters facebook sprawling facility built around enclosed courtyard nicknamed sun quentin september 1 2011 sun india legally became part oracle delayed due legal issues indian court
|
Distributed computing architecture
|
coldspring framework coldspring web application framework coldfusion application programming language based java spring framework originally created dave ross chris scott framework provides dependency injection inversion control aspect-oriented programming design pattern capabilities effort make configuration dependencies coldfusion components cfcs easier manage noted strength coldspring ability provide complementary services applications frameworks coldspring deeply embedded within core model-glue framework since model-glue 2.0 also fusebox since 5.0 ships coldspring-specific lexicon reverse coldspring ships connection points model-glue mach-ii unit testing framework cfcunit coldspring historically long development release cycle compared coldfusion frameworks coldspring first mentioned dave ross released pre-alpha version february 9 2005 interest found quickly within coldfusion community support group formed around software later 2005 coldspring framework web site eventually release candidate released june 2 2006 coldspring 1.0 finally released three days cfunited dave ross scheduled speak topic 1.2 release included changes make working beans especially using xml bean factory much easier including creating bean aliases including bean configuration files creating collections within configuration file fixes
|
Programming language topics
|
linuxfund linux fund organization raising money making donations free open source software foss projects since 1999 irs 501 c 3 status granted linux fund august 2007 allowing direct solicitations individuals charitable foundations prior receiving 501 c 3 letter principal funding source affinity credit card program credit cards bearing graphic tux linux penguin visa cards currently offered usa us bank linux fund founded peak 1999 high-tech boom affinity credit card mbna gave away first t-shirt summer 1999 linuxworld expo summer 2000 grants developers program begun years surviving dot-com bubble organization fell stagnation june 2005 investigating reports website newsforge jay lyman revealed organization actively distributing funds foss projects lyman reported funds mbna cards continued flow organization 126,155.29 growing bank then-executive-director jerritt collord told lyman gotten burned largely one-man organization sitting idle lackluster success open oregon technology center fall 2005 founding directors met decided clean organizational backlog start funding foss projects june 2005 bank america bought mbna april 2007 bank america gave linux fund notice affinity mastercard program would discontinued effective june 30 2007 july 1 2007 us bank released linux fund visa card august 2007 irs granted linux fund 501 c 3 status may 2009 open hardware foundation joined linux fund prior cancellation bank america linux fund supporting 10 different projects including debian wikimedia foundation blender software free geek freenode openssh typical grant 500/month renewable 6 12-month commitments linux fund also given lump-sum donations order 1,000– 5,000 project funding frozen briefly bank america canceled usa mastercard agreement funding since resumed new us bank visa card current projects include mix open-source software hardware projects including gnash inkscape lives open graphics project 2005 debian project leader branden robinson thanked linux fund continued support debian project noted benefit long-term grants foss projects funding ... enable us bit forward planning debian runs entirely donations ... steady predictable flow revenue help us feel comfortable long-range resource planning linux fund deserves thanks credit pioneering new funding models free software community scott rainey michael dexter iris oren benjamin cox candace ramcharan dan carrere
|
Operating systems
|
direction flag direction flag flag controls left-to-right right-to-left direction string processing stored flags register x86-compatible cpus bit number 10 flag used determine direction 'forward 'backward several bytes data copied one place memory another direction important mainly original data position memory target data position overlap
|
Computer architecture
|
darwin core darwin core often abbreviated dwc extension dublin core biodiversity informatics meant provide stable standard reference sharing information biological diversity terms described standard part larger set vocabularies technical specifications development maintained biodiversity information standards tdwg formerly known taxonomic databases working group tdwg darwin core body standards includes glossary terms contexts might called properties elements fields columns attributes concepts intended facilitate sharing information biological diversity providing reference definitions examples commentaries darwin core primarily based taxa occurrence nature documented observations specimens samples related information included standard documents describing terms managed set terms extended new purposes terms used simple darwin core specification one particular way use terms share data taxa occurrences simply-structured way likely meant someone suggest formatting data according darwin core term definition commentaries meant promote consistent use terms across applications disciplines evolving commentaries discuss refine expand translate definitions examples referred links comments attribute term approach documentation allows standard adapt new purposes without disrupting existing applications meant clear separation terms defined standard applications make use example though data types constraints provided term definitions recommendations made restrict values appropriate practice darwin core decouples definition semantics individual terms application terms different technologies xml rdf simple csv text files darwin core provides separate guidelines encode terms xml text files darwin core originally created z39.50 profile z39.50 biology implementers group zbig supported funding usa national science foundation award name darwin core first coined allen allison first meeting zbig held university kansas 1998 commenting profile conceptual similarity dublin core darwin core profile later expressed xml schema document use distributed generic information retrieval digir protocol tdwg task group created revise darwin core ratified metadata standard officially released 9 october 2009 though ratified tdwg/biodiversity information standards standard since darwin core numerous previous versions production usage published standard contains history details versions leading current standard
|
Computer architecture
|
xml configuration access protocol xml configuration access protocol xcap application layer protocol allows client read write modify application configuration data stored xml format server xcap maps xml document sub-trees element attributes http uris components directly accessed clients using http protocol xcap server used xcap clients store data like buddy lists presence policy combination sip presence server supports publish subscribe notify methods provide complete sip simple server solution following operations supported via xcap protocol client-server interaction operations executed following items xcap addressing mechanism based xpath provides ability navigate around xml tree following applications provided xcap using specific auid application unique id xcap protocol based following ietf standards rfc4825 rfc4826 rfc4827 rfc5025 application org.openmobilealliance.pres-rules standard added
|
Internet protocols
|
pkgsrc pkgsrc package source package management system unix-like operating systems forked freebsd ports collection 1997 primary package management system netbsd since evolved independently 1999 support solaris added followed support operating systems pkgsrc currently contains 22,000 packages includes popular open-source software native package manager netbsd smartos minix 3 portable across 23 different operating systems including aix various bsd derivatives hp-ux irix linux macos solaris qnx multiple ways install programs using pkgsrc pkgsrc bootstrap contains traditional ports collection utilizes series makefiles compile software source another method install pre-built binary packages via pkg_add pkg_delete tools high-level utility named pkgin also exists designed automate installation removal update binary packages manner similar debian advanced packaging tool several vendors including joyent subsidiary samsung provide binary packages popular operating systems including macos linux october 3 1997 netbsd developers alistair crooks hubert feyrer created pkgsrc based freebsd ports system intended support netbsd packages collection officially released part netbsd 1.3 january 4 1998 dragonfly bsd used pkgsrc official package system version 1.4 2006 3.4 2013 2017-09-12 commit message policy accommodates dvcs established project netbsd foundation provides official pre-built binary packages multiple combinations netbsd pkgsrc releases occasionally certain operating systems well 2018 several vendors provide pre-built binary packages several platforms
|
Operating systems
|
catalog server catalog server provides single point access allows users centrally search information across distributed network words indexes databases files information across large network allows keywords boolean searches need provide comprehensive searching service intranet extranet even internet catalog server standard solution
|
Databases
|
last armageddon described antithesis dragon quest fantasy series introductory story deals life organisms humans animals wiped mysterious force music game considered representative hiroharu hayama early works composer japanese video games late 1980s early 1990s hayama often used music make games feel spooky dark game sequel armageddon gaiden released sega cd 1994 working designs planned release game north america side story armageddon 1995 localization cancelled due demise sega cd system humans breathed toxin-filled air earth surface became one earth kept dissolving history humanity ended dominion planet returned demons mutant creatures depend oxygen survive therefore able breathe air use land meanwhile army robots wage world war iv demons order conquer known makai demon world robots came planet wave energy created explosion turned world wasteland much later game concurrent themes including adolf hitler war creating perfect race people destruction humanity year 1999 revealed player inside one robot main bases demons gain dominion humans old planet robots impose millennium logic dictatorial force throughout makai playing robots option open player therefore player must take advantage mutant army crush robot invaders game builds theme impending world domination machines popularized famously terminator series gameplay similar final fantasy featuring turn-based fights viewed third-person perspective demon soldiers enemies may cast magic spells physical attacks magic attacks ability inflict poison damage player creatures creature poisoned player must spare creature magic points order cure affected monster spell letting creature remain poisoned certain amount time eventually lead death game plays like role-playing video game graves fallen demons home base remind player situation game player first starts game go right experienced monsters lie stadium-shaped power station southeastern corner map take foursome level 5-10 characters order defeat robots inside dome characters advance level monster images change slightly time characters advance levels 17 34 maximum possible levels monsters look completely slimy fusion cells get ugly two groups four monsters player controls daytime group nighttime group becomes night game daytime group becomes inactive nighttime group takes however hp/mp replenishment group becomes inactive next morning night phase although monsters use healing spells cure conditions like poisoning known way cure hp game via items spread throughout dungeons game using magic spell nintendo family computer version lacks monster encyclopedia exists versions game none background music game resemble pc engine fm towns version likely famicom version developed different company also four different people worked soundtrack two versions existed fm towns version large memory version normal levels animation small memory version slightly reduced levels animation fm towns version also comes series three cd-roms requires 1 megabyte ram low memory version 2 megabytes ram high memory version one character equipped powerful sword azotto person pre-determined game 3.5 floppy disk needed save game purchased separately game pc engine version 3d maps shown flat two-dimensional dungeons goblins orcs equipped swords unlike versions transition time daytime night time characters eliminated pc engine version leading immediate swap characters
|
Computer architecture
|
knight orc knight orc standard text adventure game limited graphics platforms level 9 released 1987 comes short novella peter mcbride sign orc explaining background story night heavy drinking friends grindleguts orc awakes find strapped horse joust human knight friends nowhere seen must somehow escape predicament get even grindleguts must survive world hostile humans seeking revenge tormentors first chapter game switches science fiction setting grindleguts revealed malfunctioning non-player character futuristic massively multiplayer online role-playing game using power transitioning fantasy reality convinces several bots join escapes simulated reality facility sinclair user say knight orc ordinary adventure oh multi-user adventure ... players simulated one nice touch little bits added end descriptions tell players 'somewhere male voice cries anyone got spare treasure ... location descriptions exquisite make absence graphics ... humour worked text like something douglas adams novel quick-fire enjoyable never droll ... high spot game interactive characters ... characters goal complete one thing common hate orcs ... technically pawn may superior plot enjoyment atmosphere knight orc wins hands computer gaming world stated graphics waste disk space puzzles uneven however excellent parser virtues resulted average game computer magazine said disappointing atari magazine page 6 said excellent value money atari 8-bit version
|
Computer architecture
|
carrier cloud cloud computing carrier cloud class cloud integrates wide area networks wan attributes communications service providers ’ carrier grade networks enable deployment highly demanding applications cloud contrast classic cloud computing focusses data center address network connecting data centers cloud users may result unpredictable response times security issues business critical data transferred internet advent virtualization technology cost effective computing hardware well ubiquitous internet connectivity enabled first wave cloud services starting first years 21st century many businesses organizations hesitated move demanding applications on-premises dedicated hardware private public clouds response communications service providers started 2010/2011 time frame develop carrier clouds address perceived weaknesses existing cloud services weaknesses cited vary often include performance availability security service level agreements slas enable deployment time-sensitive business critical applications cloud carrier cloud designed match even exceed characteristics on-premises deployments therefore carrier cloud characterized following items carrier clouds encompass data centers different network tiers wide area networks connect multiple data centers well cloud users links data centers used instance failover overflow backup geographic diversity carrier clouds set public private hybrid clouds carrier cloud federates cloud entities using single management system orchestrate manage monitor data center network resources single system
|
Distributed computing architecture
|
theta networks theta networks new jersey based telecommunication solutions company founded 2005 company develops deep packet inspection-based software used monitoring optimization subscriber management security mobile networks theta networks major supplier nokia siemens networks ericsson motorola orange china mobile assisted china mobile olympic games recently theta networks also working china mobile monitoring support new td-scdma networks theta solutions reassembles finds relationships subscriber application sessions open systems interconnection layer 7 using deep packet inspection cross packet inspection cross session inspection technology applied mobile use wap mms sms http dns streaming technology theta networks also offers virusguardmax dpi-based network security product company offices new jersey south america china theta networks company works france partner also recently established partnerships australia russia
|
Computer security
|
fault tolerance fault tolerance property enables system continue operating properly event failure one faults within components operating quality decreases decrease proportional severity failure compared naively designed system even small failure cause total breakdown fault tolerance particularly sought high-availability life-critical systems ability maintaining functionality portions system break referred graceful degradation fault-tolerant design enables system continue intended operation possibly reduced level rather failing completely part system fails term commonly used describe computer systems designed continue less fully operational perhaps reduction throughput increase response time event partial failure system whole stopped due problems either hardware software example another field motor vehicle designed continue drivable one tires punctured structure able retain integrity presence damage due causes fatigue corrosion manufacturing flaws impact within scope individual system fault tolerance achieved anticipating exceptional conditions building system cope general aiming self-stabilization system converges towards error-free state however consequences system failure catastrophic cost making sufficiently reliable high better solution may use form duplication case consequence system failure catastrophic system must able use reversion fall back safe mode similar roll-back recovery human action humans present loop highly fault-tolerant system might continue level performance even though one components failed example building backup electrical generator provide voltage wall outlets even grid power fails system designed fail safe fail-secure fail gracefully whether functions reduced level fails completely way protects people property data injury damage intrusion disclosure computers program might fail-safe executing graceful exit opposed uncontrolled crash order prevent data corruption experiencing error similar distinction made failing well failing badly fail-deadly opposite strategy used weapon systems designed kill injure targets even part system damaged destroyed system designed experience graceful degradation fail soft used computing similar fail safe operates reduced level performance component failures example building may operate lighting reduced levels elevators reduced speeds grid power fails rather either trapping people dark completely continuing operate full power computing example graceful degradation insufficient network bandwidth available stream online video lower-resolution version might streamed place high-resolution version progressive enhancement example computing web pages available basic functional format older small-screen limited-capability web browsers enhanced version browsers capable handling additional technologies larger display available fault-tolerant computer systems programs considered robust designed continue operation despite error exception invalid input instead crashing completely software brittleness opposite robustness resilient networks continue transmit data despite failure links nodes resilient buildings infrastructure likewise expected prevent complete failure situations like earthquakes floods collisions system high failure transparency alert users component failure occurred even continues operate full performance failure repaired imminent complete failure anticipated likewise fail-fast component designed report first point failure rather allow downstream components fail generate reports allows easier diagnosis underlying problem may prevent improper operation broken state single fault condition situation one means protection hazard defective single fault condition results unavoidably another single fault condition two failures considered one single fault condition source offers following example redundancy provision functional capabilities would unnecessary fault-free environment consist backup components automatically kick one component fails example large cargo trucks lose tire without major consequences many tires one tire critical exception front tires used steer generally carry less load total four 16 less likely fail idea incorporating redundancy order improve reliability system pioneered john von neumann 1950s two kinds redundancy possible space redundancy time redundancy space redundancy provides additional components functions data items unnecessary fault-free operation space redundancy classified hardware software information redundancy depending type redundant resources added system time redundancy computation data transmission repeated result compared stored copy previous result current terminology kind testing referred 'in service fault tolerance testing isftt short providing fault-tolerant design every component normally option associated redundancy brings number penalties increase weight size power consumption cost well time design verify test therefore number choices examined determine components fault tolerant example component passes tests car occupant restraint system normally think primary occupant restraint system gravity vehicle rolls undergoes severe g-forces primary method occupant restraint may fail restraining occupants accident absolutely critical safety pass first test accidents causing occupant ejection quite common seat belts pass second test cost redundant restraint method like seat belts quite low economically terms weight space pass third test therefore adding seat belts vehicles excellent idea supplemental restraint systems airbags expensive pass test smaller margin another excellent long-term example principle put practice braking system whilst actual brake mechanisms critical particularly prone sudden rather progressive failure case necessarily duplicated allow even balanced application brake force wheels would also prohibitively costly double-up main components would add considerable weight however similarly critical systems actuating brakes driver control inherently less robust generally using cable rust stretch jam snap hydraulic fluid leak boil develop bubbles absorb water thus lose effectiveness thus modern cars footbrake hydraulic brake circuit diagonally divided give two smaller points failure loss either reducing brake power 50 causing much dangerous brakeforce imbalance straight front-back left-right split hydraulic circuit fail completely relatively rare occurrence failsafe form cable-actuated parking brake operates otherwise relatively weak rear brakes still bring vehicle safe halt conjunction transmission/engine braking long demands line normal traffic flow cumulatively unlikely combination total foot brake failure need harsh braking emergency likely result collision still one lower speed would otherwise case comparison foot pedal activated service brake parking brake less critical item unless used one-time backup footbrake cause immediate danger found nonfunctional moment application therefore redundancy built per se typically uses cheaper lighter less hardwearing cable actuation system suffice happens hill use footbrake momentarily hold vehicle still driving find flat piece road stop alternatively shallow gradients transmission shifted park reverse first gear transmission lock engine compression used hold stationary need include sophistication first bring halt motorcycles similar level fail-safety provided simpler methods firstly front rear brake systems entirely separate regardless method activation cable rod hydraulic allowing one fail entirely whilst leaving unaffected secondly rear brake relatively strong compared automotive cousin even powerful disc sports models even though usual intent front system provide vast majority braking force overall vehicle weight central rear tyre generally larger grippier rider lean back put weight therefore allowing brake force applied wheel locks cheaper slower utility-class machines even front wheel use hydraulic disc extra brake force easier packaging rear usually primitive somewhat inefficient exceptionally robust rod-actuated drum thanks ease connecting footpedal wheel way importantly near impossibility catastrophic failure even rest machine like lot low-priced bikes first years use point collapse neglected maintenance basic characteristics fault tolerance require addition fault-tolerant systems characterized terms planned service outages unplanned service outages usually measured application level hardware level figure merit called availability expressed percentage example five nines system would statistically provide 99.999 availability fault-tolerant systems typically based concept redundancy spare components address first fundamental characteristic fault tolerance three ways implementations raid redundant array independent disks except raid 0 examples fault-tolerant storage device uses data redundancy lockstep fault-tolerant machine uses replicated elements operating parallel time replications element state inputs provided replication outputs expected outputs replications compared using voting circuit machine two replications element termed dual modular redundant dmr voting circuit detect mismatch recovery relies methods machine three replications element termed triple modular redundant tmr voting circuit determine replication error two-to-one vote observed case voting circuit output correct result discard erroneous version internal state erroneous replication assumed different two voting circuit switch dmr mode model applied larger number replications lockstep fault-tolerant machines easily made fully synchronous gate replication making state transition edge clock clocks replications exactly phase however possible build lockstep systems without requirement bringing replications synchrony requires making internal stored states started fixed initial state reset state alternatively internal state one replica copied another replica one variant dmr pair-and-spare two replicated elements operate lockstep pair voting circuit detects mismatch operations outputs signal indicating error another pair operates exactly way final circuit selects output pair proclaim error pair-and-spare requires four replicas rather three tmr used commercially fault-tolerant design advantages obvious many disadvantages hardware fault tolerance sometimes requires broken parts taken replaced new parts system still operational computing known hot swapping system implemented single backup known single point tolerant represents vast majority fault-tolerant systems systems mean time failures long enough operators time fix broken devices mean time repair backup also fails helps time failures long possible specifically required fault-tolerant system fault tolerance notably successful computer applications tandem computers built entire business machines used single-point tolerance create nonstop systems uptimes measured years fail-safe architectures may encompass also computer software example process replication data formats may also designed degrade gracefully html example designed forward compatible allowing new html entities ignored web browsers understand without causing document unusable difference fault tolerance systems rarely problems instance western electric crossbar systems failure rates two hours per forty years therefore highly fault resistant fault occur still stopped operating completely therefore fault tolerant
|
Computer security
|
biopharm us company biopharm systems american privately owned consulting managed services provider msp headquartered san mateo california focuses life sciences industry company specializes implementation integration migration upgrade private cloud hosting oracle clinical trial management system drug safety pharmacovigilance clinical data warehousing analytics clinical data management electronic data capture systems founded 1995 president ceo alex sefanov around corner oracle ’ headquarters silicon valley biopharm headquartered california offices united states united kingdom mr. sefanov founded company personal savings working consultant several major biotechnology pharmaceutical companies inspired start firm working closely oracle first clinical trial software application oracle clinical biopharm offers various hosting options dedicated hosting shared hosting software service saas data center san jose disaster recovery data center near sacramento biopharm services include implementing integrating client applications systems well providing validation training application support services company complies relevant regulations including title 21 cfr part 11
|
Distributed computing architecture
|
sture allén sture allén born 31 december 1928 swedish retired professor computational linguistics university gothenburg permanent secretary swedish academy 1986 1999 born gothenburg elected chair 3 swedish academy 1980 also member norwegian academy science letters
|
Computational linguistics
|
defunctionalization programming languages defunctionalization refers compile-time transformation eliminates higher-order functions replacing single first-order apply function technique first described john c. reynolds 1972 paper definitional interpreters higher-order programming languages reynolds observation given program contains finitely many function abstractions assigned replaced unique identifier every function application within program replaced call apply function function identifier first argument apply function job dispatch first argument perform instructions denoted function identifier remaining arguments one complication basic idea function abstractions may reference free variables situations defunctionalization must preceded closure conversion lambda lifting free variables function abstraction passed extra arguments apply addition closures supported first-class values becomes necessary represent captured bindings creating data structures instead single apply function dispatch function abstractions program various kinds control flow analysis including simple distinctions based arity type signature employed determine function may called function application site specialized apply function may referenced instead alternately target language may support indirect calls function pointers may efficient extensible dispatch-based approach besides use compilation technique higher-order functional languages defunctionalization studied particularly olivier danvy collaborators way mechanically transforming interpreters abstract machines defunctionalization also related technique object-oriented programming representing functions function objects alternative closures example given olivier danvy translated haskell given tree datatype defunctionalize following program defunctionalize replacing higher-order functions codice_1 codice_2 codice_3 value codice_4 datatype instead calling directly introduce codice_5 function interprets datatype
|
Programming language topics
|
tdm-to-packet conversion tdm-to-packet conversion process converting digital signal tdm format typically 64 kbit/second signal encoded mu-law a-law compression packets typically rtp packets carrying packet network internet conversion process may include recoding different codec silence suppression comfort noise generation tricks decrease bandwidth requirement improve perceived voice quality result note conversion signal tunnelling unlike tdm ip aims transporting tdm signal unchanged across ip network see also voice ip
|
Internet protocols
|
virtual private cloud virtual private cloud vpc on-demand configurable pool shared computing resources allocated within public cloud environment providing certain level isolation different organizations denoted users hereafter using resources isolation one vpc user users cloud vpc users well public cloud users achieved normally allocation private ip subnet virtual communication construct vlan set encrypted communication channels per user vpc previously described mechanism providing isolation within cloud accompanied vpn function allocated per vpc user secures means authentication encryption remote access organization vpc resources introduction described isolation levels organization using service effect working 'virtually private cloud cloud infrastructure shared users hence name vpc vpc commonly used context cloud infrastructure service context infrastructure provider providing underlying public cloud infrastructure provider realizing vpc service infrastructure may different vendors amazon web services launched amazon virtual private cloud 26 august 2009 allows amazon elastic compute cloud service connected legacy infrastructure ipsec virtual private network connection aws vpc free use however users charged virtual private networks vpn use ec2 rds instances running vpc also purchased using reserved instances however limitation resources guaranteed google cloud platform resources provisioned connected isolated virtual private cloud vpc across gcp regions gcp vpcs global resources subnets within vpc zonal resources allows connect zones regions without use additional networking complexity data travels encrypted transit rest google ’ global private network identity management policies security rules allow private access google storage big data analytics managed services vpcs google cloud platform leverage security google data centers microsoft azure offers possibility setting vpc using virtual networks
|
Distributed computing architecture
|
variable data publishing variable-data publishing vdp also known database publishing term referring output variable composition system systems produce electronically viewable hard-copy print output variable-data publishing term today often distinguishes output destined electronic viewing rather destined hard-copy print e.g variable data printing essentially techniques employed perform variable-data publishing utilized variable data printing difference interpretation output variable-data printing may interpreted produce various print streams page-description files e.g afp/ipds postscript pcl variable-data publishing produces electronically viewable files commonly seen forms pdf html xml variable-data composition involves use data conditionally variable-data may simple address block salutation however document textual content—including words sentences paragraphs pages entire document words make little much document composer desires variable data may also used exhibit various images logos products membership photos variable-data used build rule-based design schemes including fonts colors page formats possibilities vast variable-data tools available today make possible perform variable-data composition nearly every stage document production however level control achieved varies based upon far document production process variable-data tool deployed example variable-data insertion occurs prior output ... likely text flow layout altered nearly much control would available time initial document composition many organizations produce multiple forms output aka multi-channel output document ensures published content available recipients via form access method might require multi-channel output utilized integrity output channels often becomes important variable-data publishing may performed everything personal computer mainframe system however speed practical output volumes achieved directly affected computer power utilized term variable-data publishing likely offshoot term variable-data printing first introduced printing industry frank romano professor emeritus school print media college imaging arts sciences rochester institute technology however concept merging static document elements variable document elements predates term seen various implementations ranging simple desktop 'mail merge complex mainframe applications financial banking industry past term vdp closely associated digital printing machines however past 3 years application technology spread web pages emails mobile messaging
|
Databases
|
firewalls internet security firewalls internet security repelling wily hacker 1994 book william r. cheswick steve bellovin helped define concept network firewall describing detail one first major firewall deployments book influenced formation perimeter security model became dominant network security architecture mid-1990s 2003 second edition came adding aviel d. rubin authors
|
Computer security
|
arm cortex-r arm cortex-r family 32-bit risc arm processor cores licensed arm holdings cores optimized hard real-time safety-critical applications cores family implement arm real-time r profile one three architecture profiles two application profile implemented cortex-a family microcontroller profile implemented cortex-m family arm cortex-r family microprocessors currently consists arm cortex-r4 f arm cortex-r5 f arm cortex-r7 f arm cortex-r8 f arm cortex-r52 f arm cortex-r family arm cores implementing r profile arm architecture profile designed high performance hard real-time safety critical applications similar profile applications processing adds features make fault tolerant suitable use hard real-time safety critical applications real time safety critical features added include arm holdings neither manufactures sells cpu devices based designs rather licenses core designs interested parties arm offers variety licensing terms varying cost deliverables licensees arm provides integratable hardware description arm core well complete software development toolset right sell manufactured silicon containing arm cpu integrated device manufacturers idm receive arm processor ip synthesizable rtl written verilog form ability perform architectural level optimizations extensions allows manufacturer achieve custom design goals higher clock speed low power consumption instruction set extensions optimizations size debug support etc determine components included particular arm cpu chip consult manufacturer datasheet related documentation cortex-r suitable use computer-controlled systems low latency and/or high level safety required example hard real-time safety critical application would modern electronic braking system automobile system needs fast responsive plethora sensor data input also responsible human safety failure system could lead severe injury loss life examples hard real-time and/or safety critical applications include
|
Computer architecture
|
nubus nubus pron 'new bus 32-bit parallel computer bus originally developed mit standardized 1987 part numachine workstation project first complete implementation nubus done western digital numachine lisp machines inc. lmi lambda nubus later incorporated lisp products texas instruments explorer used main expansion bus apple computer next longer widely used outside embedded market early microcomputer buses like s-100 often connections pins microprocessor power rails meant change computer architecture generally led new bus well looking avoid problems future nubus designed independent processor general architecture details i/o handling among many advanced features era nubus used 32-bit backplane 8- 16-bit busses common seen making bus future-proof generally believed 32-bit systems would arrive near future 64-bit buses beyond would remain impractical excessive addition nubus agnostic processor buses point conformed signalling data standards machine plugged big little endian instance nubus made assumptions meant nubus card could plugged nubus machine long appropriate device driver order select proper device driver nubus included id scheme allowed cards identify host computer startup meant user n't configure system bane bus systems point instance isa driver configured card memory required interrupts used nubus required configuration making one first examples plug-and-play architecture downside flexibility made nubus much simpler user device driver authors made things difficult designers cards whereas simple bus systems easily supported handful input/output chips designed used cpu mind nubus every card computer convert everything platform-agnostic nubus world typically meant adding nubus controller chip bus i/o chips card increasing costs trivial exercise today one newer buses require 1980s nubus considered complex expensive nubus became standard 1987 ieee 1196 version used standard 96-pin three-row connector running system 10 mhz clock maximum burst throughput 40 mb/s average speeds 10 20 mb/s later addition nubus 90 increased clock rate 20 mhz better throughput burst increasing 70 mb/s average 30 mb/s nubus first developed commercially western digital numachine first used production product licensee lisp machines inc. lmi-lambda lisp machine project development group sold western digital texas instruments 1984 technology incorporated ti explorer also lisp machine 1986 texas instruments used nubus s1500 multiprocessor unix system later texas instruments symbolics developed lisp machine nubus boards ti microexplorer symbolics macivory based lisp supporting microprocessors nubus boards co-processor lisp machines apple macintosh line mac ii mac quadras nubus also selected apple computer use macintosh ii project plug-n-play nature fit well mac philosophy ease-of-use used macintosh ii series made professional-level mac lineup late 1980s upgraded nubus 90 starting macintosh quadras used mid-1990s early quadras supported 20 mhz rate two cards talking since motherboard controller upgraded later addressed nubus implementation 660av 840av models improved nubus controller used first generation power macintosh 6100 7100 8100 models later power mac models adopted intel pci bus apple nubus implementation used pin socket connectors back card rather edge connectors phillips screws inside case cards use making much easier install cards apple computers also supplied always-on +5 v trickle power supply tasks watching phone line computer turned apparently part unapproved nubus standard nubus also selected next computer line machines used different physical pcb layout nubus appears seen little use outside roles apple switched pci mid 1990s nubus quickly disappeared
|
Operating systems
|
percona server mysql percona server mysql distribution mysql relational database management system created percona percona server mysql open source relational database management system rdbms free fully compatible drop replacement oracle mysql software includes number scalability availability security backup features available mysql commercial enterprise edition software includes xtradb enhanced distribution innodb storage engine developers aim retain close compatibility official mysql releases focusing performance increased visibility server operations
|
Databases
|
cyberwarfare cyberwarfare broad term describing use technological force within cyberspace ‘ cyberwarfare ’ imply scale protraction violence typically associated term ‘ war ’ significant debate among experts regarding definition cyberwarfare even thing exists term ‘ cyberwarfare ’ misnomer date offensive cyber actions could described ‘ war ’ offensive cyber actions estonia 2007 georgia 2008 iran 2010 north korea occurred context international relations resulting condemnation denial sides cyberwarfare may meet typical definition term war however many states including united states united kingdom russia india china israel iran north korea vietnam active cyber operations offensive defensive operations states explore use cyber operations combine capabilities likelihood physical confrontation violence playing result part cyber operation increased however meeting scale protracted nature war unlikely thus ambiguity remains first instance kinetic force used response cyber-attack resulting loss human life observed may 5 2019 israel defense forces targeted destroyed building associated on-going cyber-attack 'cyberwarfare used board context denote interstate use technological force within computer networks information stored shared communicated online term warfare significant differences term 'war invokes ideas scale protraction cyberwarfare also distinct closely related 'cyber espionage 'cyber terrorism 'cyber crime term definition remain subject debate absolute definition widely agreed paulo shakarian colleagues put forward following definition drawing various works including clausewitz definition war war continuation politics means cyberwarfare extension policy actions taken cyberspace state actors non-state actors significant state direction support constitute serious threat another state security action nature taken response serious threat state security actual perceived definitions focus act penetrating states computer network infrastructure businesses organisations within target nation former us national coordinator security infrastructure protection counter-terrorism richard a. clarke defines cyberwarfare actions nation-state penetrate another nation computers networks purposes causing damage disruption majority scholars military governments use definition refer state state-sponsored actors actors provided significant direction support state definitions may include non-state actors terrorist groups companies political ideological extremist groups terrorist hacktivists transnational criminal organizations depending context work debate whether term 'cyberwarfare accurate eugene kaspersky founder kaspersky lab concludes cyberterrorism accurate term cyberwar states today attacks clueless strike cyber-war cyberterrorism howard schmidt former cyber security coordinator obama administration said cyberwar ... think terrible metaphor think terrible concept winners environment experts take issue possible consequences linked warfare analogy ron deibert canada citizen lab warned militarization cyberspace militaristic responses may appropriate although date even serious cyber attacks disrupted large parts nations electrical grids 230,000 customers ukraine 2015 affected access medical care thus endangering life nhs wannacry 2017 lead military action oxford academic lucas kello proposed new term – unpeace – denote highly damaging cyber actions whose non-violent effects rise level traditional war actions neither warlike peacelike although non-violent thus acts war damaging effects economy society may greater even armed attacks term closely related concept grey zone come prominence recent years describing actions fall traditional threshold war term 'cyberwarfare distinct term 'cyber war cyber warfare includes techniques tactics procedures may involved cyber war discussed term war inherently refers large scale action typically protracted period time may include objectives seeking utilize violence aim kill cyber war could accurately describe protracted period back-and-forth cyber attacks including combination traditional military action nations date action known occurred although tit-for-tat military-cyber actions occurred june 2019 united states launched cyber attack iranian weapons systems retaliation shooting us drone strait hormuz cyber warfare present multitude threats towards nation basic level cyber attacks used support traditional warfare example tampering operation air defences via cyber means order facilitate air attack aside hard threats cyber warfare also contribute towards soft threats espionage propaganda eugene kaspersky founder kaspersky lab equates large-scale cyber weapons flame nettraveler company discovered biological weapons claiming interconnected world potential equally destructive traditional espionage act war cyber-espionage generally assumed ongoing major powers despite assumption incidents cause serious tensions nations often described attacks example cyber attacks 25 espionage based computers satellites coordinate activities vulnerable components system could lead disruption equipment compromise military systems c4istar components responsible orders communications could lead interception malicious replacement power water fuel communications transportation infrastructure may vulnerable disruption according clarke civilian realm also risk noting security breaches already gone beyond stolen credit card numbers potential targets also include electric power grid trains stock market mid-july 2010 security experts discovered malicious software program called stuxnet infiltrated factory computers spread plants around world considered first attack critical industrial infrastructure sits foundation modern economies notes new york times stuxnet extremely effective delaying iran nuclear program development nuclear weaponry came high cost first time became clear could cyber weapons defensive could offensive large decentralization scale cyberspace makes extremely difficult direct policy perspective non-state actors play large part cyberwar space state actors leads dangerous sometimes disastrous consequences small groups highly skilled malware developers able effectively impact global politics cyber warfare large governmental agencies major aspect ability lies willingness groups share exploits developments web form arms proliferation allows lesser hackers become proficient creating large scale attacks small handful skillful enough manage addition thriving black markets kinds cyber weapons buying selling cyber capabilities highest bidder without regard consequences computing denial-of-service attack dos attack distributed denial-of-service attack ddos attack attempt make machine network resource unavailable intended users perpetrators dos attacks typically target sites services hosted high-profile web servers banks credit card payment gateways even root nameservers dos attacks may limited computer-based methods strategic physical attacks infrastructure devastating example cutting undersea communication cables may severely cripple regions countries regards information warfare ability federal government united states admits electric power grid susceptible cyberwarfare united states department homeland security works industries identify vulnerabilities help industries enhance security control system networks federal government also working ensure security built next generation smart grid networks developed april 2009 reports surfaced china russia infiltrated u.s. electrical grid left behind software programs could used disrupt system according current former national security officials north american electric reliability corporation nerc issued public notice warns electrical grid adequately protected cyber attack china denies intruding u.s. electrical grid one countermeasure would disconnect power grid internet run net droop speed control massive power outages caused cyber attack could disrupt economy distract simultaneous military attack create national trauma iranian hackers possibly iranian cyber army pushed massive power outage 12 hours 44 81 provinces turkey holding 40 million people istanbul ankara among places suffering blackout howard schmidt former cyber-security coordinator us commented possibilities possible hackers gotten administrative computer systems utility companies says n't linked equipment controlling grid least developed countries schmidt never heard grid hacked june 2019 russia said electrical grid cyber-attack united states new york times reported american hackers united states cyber command planted malware potentially capable disrupting russian electrical grid cyber propaganda effort control information whatever form takes influence public opinion form psychological warfare except uses social media fake news websites digital means 2018 sir nicholas carter chief general staff british army stated kind attack actors russia form system warfare seeks de-legitimise political social system military strength based jowell o'donnell 2006 state propaganda deliberate systematic attempt shape perceptions manipulate cognitions direct behavior achieve response furthers desired intent propagandist p. 7 internet phenomenal means communication people get message across huge audience opens window evil terrorist organizations use medium brainwash people suggested restricted media coverage terrorist attacks would turn decrease number terrorist attacks occur afterwards cowen 2006 2017 wannacry petya notpetya cyber attacks masquerading ransomware caused large-scale disruptions ukraine well u.k. ’ national health service pharmaceutical giant merck maersk shipping company organizations around world attacks also categorized cybercrimes specifically financial crime negatively affects company group idea cyber pearl harbor debated scholars drawing analogy historical act war others used cyber 9/11 draw attention nontraditional asymmetric irregular aspect cyber action state number reasons nations undertake offensive cyber operations cyber security expert adviser nato advocates states take cyber warfare seriously viewed attractive activity many nations times war peace offensive cyber operations offer large variety cheap risk-free options weaken countries strengthen positions considered long-term geostrategic perspective cyber offensive operations cripple whole economies change political views agitate conflicts within among states reduce military efficiency equalize capacities high-tech nations low-tech nations use access critical infrastructures blackmail u.s. general keith b. alexander first head uscybercom told senate armed services committee computer network warfare evolving rapidly mismatch technical capabilities conduct operations governing laws policies cyber command newest global combatant sole mission cyberspace outside traditional battlefields land sea air space attempt find necessary neutralize cyberattacks defend military computer networks alexander sketched broad battlefield envisioned computer warfare command listing kind targets new headquarters could ordered attack including traditional battlefield prizes – command-and-control systems military headquarters air defense networks weapons systems require computers operate one cyber warfare scenario cyber shockwave wargamed cabinet level former administration officials raised issues ranging national guard power grid limits statutory authority distributed nature internet based attacks means difficult determine motivation attacking party meaning unclear specific act considered act war examples cyberwarfare driven political motivations found worldwide 2008 russia began cyber attack georgian government website carried along georgian military operations south ossetia 2008 chinese 'nationalist hackers attacked cnn reported chinese repression tibet jobs cyberwarfare become increasingly popular military four branches united states military actively recruit cyber warfare positions potential targets internet sabotage include aspects internet backbones web internet service providers varying types data communication mediums network equipment would include web servers enterprise information systems client server systems communication links network equipment desktops laptops businesses homes electrical grids financial networks telecommunication systems also deemed vulnerable especially due current trends computerization automation politically motivated hacktivism involves subversive use computers computer networks promote agenda potentially extend attacks theft virtual sabotage could seen cyberwarfare – mistaken hacktivists use knowledge software tools gain unauthorized access computer systems seek manipulate damage material gain cause widespread destruction draw attention cause well-publicized disruptions select targets anonymous hacktivist groups often portrayed media cyber-terrorists wreaking havoc hacking websites posting sensitive information victims threatening attacks demands met however hacktivism politically motivated change world use fundamentalism groups like anonymous divided opinion methods cyber attacks including ransomeware used generate income states use techniques generate significant sources income evade sanctions perhaps simultaneously harming adversaries depending targets tactic observed august 2019 revealed north korea generated 2 billion fund weapons program avoiding blanket sanctions levied united states united nations european union computer hacking represents modern threat ongoing global conflicts industrial espionage presumed widely occur typical type crime underreported extent known according mcafee george kurtz corporations around world face millions cyberattacks day attacks n't gain media attention lead strong political statements victims type crime usually financially motivated examinations issue cyberwarfare achieving profit personal gain still institutes companies like university cincinnati kaspersky security lab trying increase sensibility topic researching publishing new security threats number countries conduct exercise increase preparedness explore strategy tactics operations involved conducting defending cyber attacks nations typically done form war games cooperative cyber defence centre excellence ccdce part north atlantic treaty organisation nato conducted yearly war game called locked shields since 2010 designed test readiness improve skills strategy tactics operational decision making participating national organisations locked shields 2019 saw 1200 participants 30 nations compete red team vs. blue team exercise war game involved fictional country berylia experiencing deteriorating security situation number hostile events coincide coordinated cyber attacks major civilian internet service provider maritime surveillance system attacks caused severe disruptions power generation distribution 4g communication systems maritime surveillance water purification plant critical infrastructure components ccdce describe aim exercise maintain operation various systems intense pressure strategic part addresses capability understand impact decisions made strategic policy level ultimately france winner locked shields 2019 european union conduct cyber war game scenarios member states partner nations improve readiness skills observe strategic tactical decisions may affect scenario well war games serve broader purpose explore options improve skills cyber war games targeted preparing specific threats 2018 sunday times reported uk government conducting cyber war games could blackout moscow types war games move beyond defensive preparedness previously described onto preparing offensive capabilities used deterrence 'war approximately 120 countries developing ways use internet weapon target financial markets government computer systems utilities foreign policy magazine puts size china hacker army anywhere 50,000 100,000 individuals diplomatic cables highlight us concerns china using access microsoft source code 'harvesting talents private sector boost offensive defensive capabilities 2018 cyberattack marriott hotel chain collected personal details roughly 500 million guests known part chinese intelligence-gathering effort also hacked health insurers security clearance files millions americans hackers suspected working behalf ministry state security country communist-controlled civilian spy agency information exactly chinese use root spies recruit intelligence agents build rich repository americans ’ personal data future targeting 2008 article culture mandala bulletin centre east-west cultural economic studies jason fritz alleges chinese government 1995 2008 involved number high-profile cases espionage primarily use decentralized network students business people scientists diplomats engineers within chinese diaspora defector belgium purportedly agent claimed hundreds spies industries throughout europe defection australia chinese diplomat chen yonglin said 1,000 country 2007 russian executive sentenced 11 years passing information rocket space technology organization china targets united states included 'aerospace engineering programs space shuttle design c4isr data high-performance computers nuclear weapon design cruise missile data semiconductors integrated circuit design details us arms sales taiwan china continues held responsible string cyber-attacks number public private institutions united states india russia canada france chinese government denies involvement cyber-spying campaigns administration maintains position china threat rather victim increasing number cyber-attacks reports china cyber warfare capabilities yet confirmed chinese government according fritz china expanded cyber capabilities military technology acquiring foreign military technology fritz states chinese government uses new space-based surveillance intelligence gathering systems anti-satellite weapon anti-radar infrared decoys false target generators assist quest support informationization military increased education soldiers cyber warfare improving information network military training built virtual laboratories digital libraries digital campuses informationization hope prepare forces engage different kind warfare technically capable adversaries many recent news reports link china technological capabilities beginning new 'cyber cold war response reports cyberattacks china united states amitai etzioni institute communitarian policy studies suggested china united states agree policy mutually assured restraint respect cyberspace would involve allowing states take measures deem necessary self-defense simultaneously agreeing refrain taking offensive steps would also entail vetting commitments operation shady rat ongoing series cyber attacks starting mid-2006 reported internet security company mcafee august 2011 china widely believed state actor behind attacks hit least 72 organizations including governments defense contractors department information technology created indian computer emergency response team cert-in 2004 thwart cyber attacks india year 23 reported cyber security breaches 2011 13,301 year government created new subdivision national critical information infrastructure protection centre nciipc thwart attacks energy transport banking telecom defence space sensitive areas executive director nuclear power corporation india npcil stated february 2013 company alone forced block ten targeted attacks day cert-in left protect less critical sectors high-profile cyber attack 12 july 2012 breached email accounts 12,000 people including officials ministry external affairs ministry home affairs defence research development organisation drdo indo-tibetan border police itbp government-private sector plan overseen national security advisor nsa shivshankar menon began october 2012 intends beef india cyber security capabilities light group experts findings india faces 470,000 shortfall experts despite country reputation software powerhouse february 2013 information technology secretary j. satyanarayana stated nciipc finalizing policies related national cyber security would focus domestic security solutions reducing exposure foreign technology steps include isolation various security agencies ensure synchronised attack could succeed fronts planned appointment national cyber security coordinator month significant economic physical damage india related cyber attacks 26 november 2010 group calling indian cyber army hacked websites belonging pakistan army others belong different ministries including ministry foreign affairs ministry education ministry finance pakistan computer bureau council islamic ideology etc attack done revenge mumbai terrorist attacks 4 december 2010 group calling pakistan cyber army hacked website india top investigating agency central bureau investigation cbi national informatics center nic begun inquiry july 2016 cymmetria researchers discovered revealed cyber attack dubbed 'patchwork compromised estimated 2500 corporate government agencies using code stolen github dark web examples weapons used exploit sandworm vulnerability cve-2014-4114 compiled autoit script uac bypass code dubbed uacme targets believed mainly military political assignments around southeast asia south china sea attackers believed indian origin gathering intelligence influential parties defence cyber agency indian military agency responsible cyberwarfare expected become operational november 2019 chinese blamed cybersecurity company f-secure labs found malware nanhaishu targeted philippines department justice sent information infected machine server chinese ip address malware considered particularly sophisticated nature introduced phishing emails designed look like coming authentic sources information sent believed relating south china sea legal case russia still part soviet union 1982 portion trans-siberia pipeline within territory exploded allegedly due computer malware implanted pirated canadian software central intelligence agency malware caused scada system running pipeline malfunction farewell dossier provided information attack wrote compromised computer chips would become part soviet military equipment flawed turbines would placed gas pipeline defective plans would disrupt output chemical plants tractor factor caused monumental nonnuclear explosion fire ever seen space however soviet union blame united states attack russian south ossetian georgian azerbaijani sites attacked hackers 2008 south ossetia war russian-led cyberattacks br claimed russian security services organized number denial service attacks part cyber-warfare countries notably 2007 cyberattacks estonia 2008 cyberattacks russia south ossetia georgia azerbaijan one identified young russian hacker said paid russian state security services lead hacking attacks nato computers studying computer sciences department defense information tuition paid fsb july 2009 series coordinated denial service attacks major government news media financial websites south korea united states many thought attack directed north korea one researcher traced attacks united kingdom security researcher chris kubecka presented evidence multiple european union united kingdom companies unwittingly helped attack south korea due w32.dozer infections malware used part attack companies used attack partially owned several governments complicating attribution july 2011 south korean company sk communications hacked resulting theft personal details including names phone numbers home email addresses resident registration numbers 35 million people trojaned software update used gain access sk communications network links exist hack malicious activity believed part broader concerted hacking effort ongoing tensions korean peninsula south korea defense ministry stated south korea going improve cyber-defense strategies hopes preparing possible cyber attacks march 2013 south korea major banks – shinhan bank woori bank nonghyup bank – well many broadcasting stations – kbs ytn mbc – hacked 30,000 computers affected one biggest attacks south korea faced years although remains uncertain involved incident immediate assertions north korea connected threatened attack south korea government institutions major national banks traditional newspapers numerous times – reaction sanctions received nuclear testing continuation foal eagle south korea annual joint military exercise united states north korea cyber warfare capabilities raise alarm south korea north korea increasing manpower military academies specializing hacking current figures state south korea 400 units specialized personnel north korea 3,000 highly trained hackers portrays huge gap cyber warfare capabilities sends message south korea step strengthen cyber warfare command forces therefore order prepared future attacks south korea united states discuss deterrence plans security consultative meeting scm scm plan developing strategies focuses accelerating deployment ballistic missiles well fostering defense shield program known korean air missile defense april 2007 estonia came cyber attack wake relocation bronze soldier tallinn largest part attacks coming russia official servers authorities russia attack ministries banks media targeted attack estonia seemingly small baltic nation effective nation run online estonia implemented e-government bank services political elections taxes done online attack really hurt estonia economy people estonia least 150 people injured first day due riots streets 2013 french minister defense mr jean-yves le drian ordered creation cyberarmy representing 4th national army corp along ground naval air forces french ministry defense protect french european interests soil abroad contract made french firm eads airbus identify secure main elements susceptible cyber threats 2016 france thus built largest cyberarmy europe planned 2600 cyber-soldiers 440 million euros investment cybersecurity products new army corp. additional 4400 reservists constitute heart army 2019 2013 germany revealed existence 60-person computer network operation unit german intelligence agency bnd announced seeking hire 130 hackers new cyber defence station unit march 2013 bnd president gerhard schindler announced agency observed five attacks day government authorities thought mainly originate china confirmed attackers far accessed data expressed concern stolen information could used basis future sabotage attacks arms manufacturers telecommunications companies government military agencies shortly edward snowden leaked details u.s. national security agency cyber surveillance system german interior minister hans-peter friedrich announced bnd would given additional budget 100 million euros increase cyber surveillance capability 5 total internet traffic germany 20 total traffic maximum amount allowed german law netherlands cyber defense nationally coordinated ncsc dutch ministry defense laid cyber strategy 2011 first focus improve cyber defense handled joint branch jivc improve intel operations intel community netherlands including military intel organization mivd set joint sigint cyber unit jscu ministry defense furthermore setting offensive cyber force called defensie cyber command dcc operational end 2014 january 2017 sweden armed forces subjected cyber-attack caused shutdown so-called caxcis system used military exercises according crowdstrike 2014 2016 russian apt fancy bear used android malware target ukrainian army rocket forces artillery distributed infected version android app whose original purpose control targeting data d-30 howitzer artillery app used ukrainian officers loaded x-agent spyware posted online military forums attack claimed crowdstrike successful 80 ukrainian d-30 howitzers destroyed highest percentage loss artillery pieces army percentage never previously reported would mean loss nearly entire arsenal biggest artillery piece ukrainian armed forces according ukrainian army number incorrect losses artillery weapons way reported losses nothing stated cause 2014 russians suspected use cyber weapon called snake ouroboros conduct cyber attack ukraine period political turmoil snake tool kit began spreading ukrainian computer systems 2010 performed computer network exploitation cne well highly sophisticated computer network attacks cna december 23 2015 blackenergy malware used cyberattack ukraine powergrid left 200,000 people temporarily without power mining company large railway operator also victims attack mi6 reportedly infiltrated al qaeda website replaced instructions making pipe bomb recipe making cupcakes october 2010 iain lobban director government communications headquarters gchq said uk faces real credible threat cyber attacks hostile states criminals government systems targeted 1,000 times month attacks threatened uk economic future countries already using cyber assaults put pressure nations 12 november 2013 financial organisations london conducted cyber war games dubbed 'waking shark 2 simulate massive internet-based attacks bank financial organisations waking shark 2 cyber war games followed similar exercise wall street iran victim predator several cyberwarfare operations iran considered emerging military power field september 2010 iran attacked stuxnet worm thought specifically target natanz nuclear enrichment facility 500-kilobyte computer worm infected least 14 industrial sites iran including natanz uranium-enrichment plant although official authors stuxnet ’ officially identified stuxnet believed developed deployed united states israel worm said advanced piece malware ever discovered significantly increases profile cyberwarfare 2006 war hezbollah israel alleges cyber-warfare part conflict israel defense forces idf intelligence estimates several countries middle east used russian hackers scientists operate behalf result israel attached growing importance cyber-tactics became along u.s. france couple nations involved cyber-war planning many international high-tech companies locating research development operations israel local hires often veterans idf elite computer units richard a. clarke adds israeli friends learned thing two programs working two decades september 2007 israel carried airstrike syria dubbed operation orchard u.s. industry military sources speculated israelis may used cyberwarfare allow planes pass undetected radar syria following us president donald trump decision pull iran nuclear deal may 2018 cyber warfare units united states israel monitoring internet traffic iran noted surge retaliatory cyber attacks iran security firms warned iranian hackers sending emails containing malware diplomats work foreign affairs offices us allies employees telecommunications companies trying infiltrate computer systems august 15 2012 11:08 local time shamoon virus began destroying 35,000 computer systems rendering inoperable virus used target saudi government causing destruction state owned national oil company saudi aramco attackers posted pastie pastebin.com hours prior wiper logic bomb occurring citing oppression al-saud regime reason behind attack attack well staged according christina kubecka former security advisor saudi aramco attack group leader security aramco overseas unnamed saudi aramco employee information technology team opened malicious phishing email allowing initial entry computer network around mid-2012 kubecka also detailed black hat usa talk saudi aramco placed majority security budget ics control network leaving business network risk major incident realize security budget spent ics gets pwnd virus noted behavior differing malware attacks due destructive nature cost attack recovery us defense secretary leon panetta called attack cyber pearl harbor known years later biggest hack history intended cyber warfare shamoon spread infected machine computers network system infected virus continues compile list files specific locations system upload attacker erase finally virus overwrites master boot record infected computer making unusable saudi aramco announced attack facebook page went offline company statement issued 25 august 2012 statement falsely reported normal business resumed 25 august 2012 however middle eastern journalist leaked photographs taken 1 september 2012 showing kilometers petrol trucks unable loaded due backed business systems still inoperable august 29 2012 attackers behind shamoon posted another pastie pastebin.com taunting saudi aramco proof still retained access company network post contained username password security network equipment new password ceo khalid al- falih attackers also referenced portion shamoon malware proof pastie according kubecka order restore operations saudi aramco used large private fleet aircraft available funds purchase much world hard drives driving price new hard drives required quickly possible oil prices affected speculation september 1 2012 gasoline resources dwindling public saudi arabia 17 days august 15th attack rasgas also affected different variant crippling similar manner march 2018 american republican fundraiser elliott broidy filed lawsuit qatar alleging qatar government stole leaked emails order discredit viewed impediment plan improve country standing washington may 2018 lawsuit named mohammed bin hamad bin khalifa al thani brother emir qatar associate ahmed al-rumaihi allegedly orchestrating qatar cyber warfare campaign broidy litigation revealed cybercriminals targeted broidy targeted many 1,200 individuals also well-known enemies qatar senior officials u.a.e. egypt saudi arabia bahrain hackers almost always obscured location activity traced telecommunication network qatar united arab emirates launched several cyber-attacks past targeting dissidents ahmed mansoor emirati citizen jailed sharing thoughts facebook twitter given code name egret state-led covert project called raven spied top political opponents dissidents journalists project raven deployed secret hacking tool called karma spy without requiring target engage web links cyberwarfare united states part american military strategy proactive cyber defence use cyberwarfare platform attack new united states military strategy makes explicit cyberattack casus belli traditional act war 2013 cyberwarfare first time considered larger threat al qaeda terrorism many u.s. intelligence officials 2017 representative mike rogers chairman u.s. house permanent select committee intelligence instance said cyber war country americans n't know necessarily winning got huge challenges comes cybersecurity u.s. government security expert richard a. clarke book cyber war may 2010 defines cyberwarfare actions nation-state penetrate another nation computers networks purposes causing damage disruption economist describes cyberspace fifth domain warfare william j. lynn u.s. deputy secretary defense states doctrinal matter pentagon formally recognized cyberspace new domain warfare become critical military operations land sea air space 2009 president barack obama declared america digital infrastructure strategic national asset may 2010 pentagon set new u.s. cyber command uscybercom headed general keith b. alexander director national security agency nsa defend american military networks attack countries systems eu set enisa european union agency network information security headed prof. udo helmbrecht plans significantly expand enisa capabilities united kingdom also set cyber-security operations centre based government communications headquarters gchq british equivalent nsa u.s. however cyber command set protect military whereas government corporate infrastructures primarily responsibility respectively department homeland security private companies february 2010 top american lawmakers warned threat crippling attack telecommunications computer networks sharply rise according lipman report numerous key sectors u.s. economy along nations currently risk including cyber threats public private facilities banking finance transportation manufacturing medical education government dependent computers daily operations 2009 president obama stated cyber intruders probed electrical grids economist writes china plans winning informationised wars mid-21st century note countries likewise organizing cyberwar among russia israel north korea iran boasts world second-largest cyber-army james gosler government cybersecurity specialist worries u.s. severe shortage computer security specialists estimating 1,000 qualified people country today needs force 20,000 30,000 skilled experts july 2010 black hat computer security conference michael hayden former deputy director national intelligence challenged thousands attendees help devise ways reshape internet security architecture explaining guys made cyberworld look like north german plain january 2012 mike mcconnell former director national intelligence national security agency president george w. bush told reuters news agency u.s. already launched attacks computer networks countries mcconnell name country u.s. attacked according sources may iran june 2012 new york times reported president obama ordered cyber attack iranian nuclear enrichment facilities august 2010 u.s. first time warned publicly chinese military use civilian computer experts clandestine cyber attacks aimed american companies government agencies pentagon also pointed alleged china-based computer spying network dubbed ghostnet revealed research report last year pentagon stated people liberation army using information warfare units develop viruses attack enemy computer systems networks units include civilian computer professionals commander bob mehal monitor pla buildup cyberwarfare capabilities continue develop capabilities counter potential threat united states department defense sees use computers internet conduct warfare cyberspace threat national security united states joint forces command describes attributes cyberspace technology emerging instrument power societies becoming available country opponents may use attack degrade disrupt communications flow information low barriers entry coupled anonymous nature activities cyberspace list potential adversaries broad furthermore globe-spanning range cyberspace disregard national borders challenge legal systems complicate nation ability deter threats respond contingencies february 2010 united states joint forces command released study included summary threats posed internet little investment cloaked veil anonymity adversaries inevitably attempt harm national interests cyberspace become main front irregular traditional conflicts enemies cyberspace include states non-states range unsophisticated amateur highly trained professional hackers cyberspace enemies target industry academia government well military air land maritime space domains much way airpower transformed battlefield world war ii cyberspace fractured physical barriers shield nation attacks commerce communication indeed adversaries already taken advantage computer networks power information technology plan execute savage acts terrorism also influence directly perceptions u.s. government american population 6 october 2011 announced creech afb drone predator fleet command control data stream keylogged resisting attempts reverse exploit past two weeks air force issued statement virus posed threat operational mission 21 november 2011 widely reported u.s. media hacker destroyed water pump curran-gardner township public water district illinois however later turned information false inappropriately leaked illinois statewide terrorism intelligence center according foreign policy magazine nsa tailored access operations tao unit successfully penetrated chinese computer telecommunications systems almost 15 years generating best reliable intelligence information going inside people republic china 24 november 2014 sony pictures entertainment hack release confidential data belonging sony pictures entertainment spe june 2015 united states office personnel management opm announced target data breach targeting records many four million people later fbi director james comey put number 18 million washington post reported attack originated china citing unnamed government officials 2016 jeh johnson united states secretary homeland security james clapper u.s. director national intelligence issued joint statement accusing russia interfering 2016 united states presidential election new york times reported obama administration formally accused russia stealing disclosing democratic national committee emails u.s. law 50 u.s.c.title 50 – war national defense chapter 15 – national security subchapter iii accountability intelligence activities must formal presidential finding prior authorizing covert attack u.s. vice president joe biden said american news interview program meet press united states respond new york times noted biden comment seems suggest mr. obama prepared order — already ordered — kind covert action december 29 united states imposed extensive sanctions russia since cold war expelling 35 russian diplomats united states united states used cyberattacks tactical advantage afghanistan 2014 barack obama ordered intensification cyberwarfare north korea missile program sabotaging test launches opening seconds 2016 president barack obama authorized planting cyber weapons russian infrastructure final weeks presidency response moscow alleged interference 2016 presidential election march 2017 wikileaks published 8,000 documents cia confidential documents codenamed vault 7 dated 2013–2016 include details cia software capabilities ability compromise cars smart tvs web browsers including google chrome microsoft edge mozilla firefox opera software asa operating systems smartphones including apple ios google android well operating systems microsoft windows macos linux global perspective countries actors engaged cyber warfare see george washington university-based national security archive cyberwar map kill switch bill br 19 june 2010 united states senator joe lieberman i-ct introduced bill called protecting cyberspace national asset act 2010 co-wrote senator susan collins r-me senator thomas carper d-de signed law controversial bill american media dubbed kill switch bill would grant president emergency powers parts internet however three co-authors bill issued statement instead bill narrowed existing broad presidential authority take telecommunications networks rise cyber warfighting domain led efforts determine cyberspace used foster peace example german civil rights panel runs campaign cyberpeace − control cyberweapons surveillance technology militarization cyberspace development stockpiling offensive exploits malware measures cyberpeace include policymakers developing new rules norms warfare individuals organizations building new tools secure infrastructures promoting open source establishment cyber security centers auditing critical infrastructure cybersecurity obligations disclose vulnerabilities disarmament defensive security strategies decentralization education widely applying relevant tools infrastructures encryption cyberdefenses topics cyber peacekeeping cyber peacemaking also studied researchers way restore strengthen peace aftermath cyber traditional warfare cyber counter-intelligence measures identify penetrate neutralize foreign operations use cyber means primary tradecraft methodology well foreign intelligence service collection efforts use traditional methods gauge cyber capabilities intentions one hardest issues cyber counterintelligence problem attribution unlike conventional warfare figuring behind attack difficult however defense secretary leon panetta claimed united states capability trace attacks back sources hold attackers accountable october 2011 journal strategic studies leading journal field published article thomas rid cyber war take place argued politically motivated cyber attacks merely sophisticated versions sabotage espionage subversion – unlikely cyber war occur future various parties attempted come international legal frameworks clarify acceptable none yet widely accepted tallinn manual published 2013 academic non-binding study international law particular jus ad bellum international humanitarian law apply cyber conflicts cyber warfare written invitation tallinn-based nato cooperative cyber defence centre excellence international group approximately twenty experts 2009 2012 shanghai cooperation organisation members include china russia defines cyberwar include dissemination information harmful spiritual moral cultural spheres states september 2011 countries proposed un secretary general document called international code conduct information security contrast united states approach focuses physical economic damage injury putting political concerns freedom speech difference opinion led reluctance west pursue global cyber arms control agreements however american general keith b. alexander endorse talks russia proposal limit military attacks cyberspace june 2013 barack obama vladimir putin agreed install secure cyberwar-hotline providing direct secure voice communications line us cybersecurity coordinator russian deputy secretary security council need directly manage crisis situation arising ict security incident white house quote ukrainian professor international law alexander merezhko developed project called international convention prohibition cyberwar internet according project cyberwar defined use internet related technological means one state political economic technological information sovereignty independence another state professor merezhko project suggests internet ought remain free warfare tactics treated international landmark states internet cyberspace common heritage mankind february 2017 rsa conference microsoft president brad smith suggested global rules – digital geneva convention – cyber attacks ban nation-state hacking civilian aspects economic political infrastructures also stated independent organization could investigate publicly disclose evidence attributes nation-state attacks specific countries furthermore said technology sector collectively neutrally work together protect internet users pledge remain neutral conflict aid governments offensive activity adopt coordinated disclosure process software hardware vulnerabilities documentaries br videos articles
|
Computer security
|
nanolinux nanolinux open source free lightweight linux distribution requires 14 mb disk space including tiny versions common desktop applications several games based core version tiny core linux distribution uses busybox nano-x instead x.org fltk 1.3.x default gui toolkit slwm super-lightweight window manager included applications mainly based fltk nanolinux includes several lightweight applications including distribution also includes several games tuxchess checkers nxeyes mastermind sudoku blocks support truetype fonts utf-8 also provided nanolinux distributed live cd iso images installation flash disk hard disk documented wiki pages minimal configuration live cd version without swapfile requires 64 mb ram 14 mb disk space
|
Operating systems
|
trust first use trust first use tofu trust upon first use tufu security model used client software needs establish trust relationship unknown not-yet-trusted endpoint tofu model client try look endpoint identifier usually kind public key local trust database identifier exists yet endpoint client software either prompt user determine client trust identifier simply trust identifier given record trust relationship trust database different identifier received subsequent connections endpoint client software consider untrusted tofu approach used connecting arbitrary unknown endpoints trusted third party certificate authority example ssh protocol designed issue prompt first time client connects unknown not-yet-trusted endpoint implementations tofu found http public key pinning browsers always accept first public key returned server http strict transport security browsers obey redirection rule duration 'age directive single largest strength tofu-style model human must initially validate every interaction common application model use ssh-rpc 'bot users computers whereby public keys distributed set computers automated access centralized hosts tofu aspect application forces sysadmin trusted user validate remote server identity upon first connection largest weakness tofu-style model human must initially validate every interaction scale infinitely quickly scale beyond capabilities group people using managing computers need trusted secure protocols people tend approve without verification mention increased surface area human error compromise security scalability use proposed daniel gultsch developer xmpp client conversations call blind trust verification consists checking key first contact check user made manual check key changed first known formal use term tofu tufu cmu researchers dan wendlandt david andersen adrian perrig research paper perspectives improving ssh-style host authentication multi-path probing published 2008 usenix annual technical conference moxie marlinspike mentioned perspectives term tofu def con 18 proceedings reference comments made dan kaminsky panel discussion open letter call action audience suggestion raised implying superiority ssh public key infrastructure pki model ssl/tls pki model whereby moxie replied topics trust validation non-repudiation fundamental work field cryptography digital security
|
Computer security
|
autodesk gameware autodesk gameware discontinued middleware software suite developed autodesk suite contained tools enable designers create game lighting character animation low level path finding high-level ai advanced user interfaces july 12 2017 autodesk removed scaleform beast humanik navigation online store announced ending support products gameware suite consisted following modules beast content pipeline tool used advanced global illumination dynamic character relighting beast developed sold swedish games lighting technology company illuminate labs acquired autodesk 2010 beast used make light maps shadow maps point clouds advanced global illumination beast precalculate lighting light maps shadow maps point clouds bake occlusion normal maps generate light fields dynamic relighting characters objects beast built-in integration gamebryo lightspeed epic unreal engine evolution several in-house game engines march 2010 unity technologies announced next version unity would feature built-in beast lightmapping global illumination shelf api available projects working beast ready integration beast api programming interface designed make easy possible create beast integration game engine beast used games mirror edge crimecraft mortal kombat vs. dc universe alpha protocol new beast presented gdc 2010 san francisco new version beast features two entirely new modules called distribeast ernst distribeast extremely fast easy use distribution engine managing render farms ernst real-time visualizer allows artists explore control lighting set-up without run complete bake
|
Distributed computing architecture
|
tsunami udp protocol tsunami udp protocol udp-based protocol developed high-speed file transfer network paths high bandwidth-delay product protocols needed standard tcp perform well paths high bandwidth-delay products tsunami effects file transfer chunking file numbered blocks 32 kb communication client server applications flows low bandwidth tcp connection bulk data transferred udp
|
Internet protocols
|
knoppix knoppix operating system based debian designed run directly cd dvd live cd usb flash drive live usb one first kind operating system knoppix developed named linux consultant klaus knopper starting program loaded removable medium decompressed ram drive decompression transparent on-the-fly although knoppix primarily designed used live cd also installed hard disk like typical operating system computers support booting usb devices load knoppix live usb flash drive memory card two main editions traditional compact-disc 700 megabytes edition dvd 4.7 gigabytes maxi edition main edition two language-specific editions english german knoppix mostly consists free open source software also includes proprietary software long fulfils certain conditions knoppix used copy files easily hard drives inaccessible operating systems quickly safely use linux software live cd used instead installing another os 1000 software packages included cd edition 2600 packages included dvd edition nine gigabytes stored dvd compressed form packages include minimum hardware requirements knoppix prior knoppix 3.8.2 documents settings user created would disappear upon reboot lack persistence made necessary save documents directly hard drive partition network removable media usb flash drive also possible set persistent home directory documents settings written user home directory would automatically redirected hard drive removable media could automatically mounted bootup single file knoppix.img cached rewritable media used simulate file system files written later use allowed user transparently write home directory union mount support added version 3.8.1 unionfs later replaced aufs 5.1.0 improve stability union mount allowed virtual updates data read-only cd/dvd media storing changes separate writable media representing combination two single storage device writable media could memory ramdisk hard disk usb flash drive etc means user could modify software installed knoppix system using apt install update software storage device containing changes needed present whenever knoppix started else original data disc would used knoppix would scan available storage devices persistent home directory default user could dictate specific location boot option see codice_1 carrying knoppix cd usb flash drive user could environment programs settings data available computer could run knoppix functionality available knoppix 5.1.1 cd release 5.3.1 dvd release subsequently live cd paradigm transformed portable operating systems run external storage using knoppix live cd one use boot options also known 'cheatcodes override default setting automatic hardware detection fails example user may wish boot plain console proceed without scsi support knoppix allows user enter one cheat codes prompt booting user enter cheat code press key timeout knoppix boot default options example set language french rather default one would type codice_2 knoppix 32-bit debian linux based distro recent releases including latest version 7.6 also equipped 64-bit kernel dvd edition automatically boot 64-bit computers using boot option codice_3 manually command-line prompt codice_4 boot 32-bit kernel neither pae 64-bit applications supported knoppix system memory 4 gb used 64-bit kernel dvd edition knoppix also loaded onto usb flash drive flash-knoppix knoppix system knoppix live system starts runs factor 5 faster usb flash disk cd dvd besides experimental uefi support provided usb flash drive rather dvd media 32-bit uefi firmware boot 32-bit kernel 64-bit uefi firmware boot 64-bit kernel text interface uefi similar bios one also press key f2 f3 access information boot options knoppix one first live cd linux distributions gain popularity several factors contribute popularity knoppix knoppix works fairly large number pcs laptops automatic hardware detection cope hardware sometimes drivers used optimal knoppix difficulty recognizing cards made 1998 motherboards bios made 2002 cases manual configuration codes entered boot time overcome problems automatic detection pc enough ram run kde included programs legacy knoppix earlier 6.0 boots limited twm session instead window running twm session default xterm table right shows version history major releases april 2008 version 4 5.1.1 knoppix split dvd maxi edition 9 gb software cd light edition developed parallel knoppix 5.1.1 cd editions contained selection graphical environments including twm window manager kde 3 — feature-complete desktop environment default knoppix 5.3.1 earlier development done traditional 5.x versions knoppix 6.0.1 adriane 1.1 cd-edition complete rebuild scratch lxde made default desktop environment edition contains substantially reduced software collection order easily fit cd knoppix 6.2.1 release cd dvd editions adriane 1.2 cd-edition knoppix 6.7.1 last cd version stable touchpad drivers june 2013 march 2019 knoppix 7.2 recent release cd edition 2018 software become outdated libc6 2.17 library longer suffices installation several modern packages 7.x version range known instabilities touchpads version 7.2 still remains recent cd version knoppix wide distribution knoppix 8.0.0 edition released cebit 2017 knoppix 8.1.0 released september 2017 first public release 8.x series version 8.0.0 dual boot choice three different desktops lxde default option kde gnome versions 8.2.0 newer 8.2.x 8.5.x available knoppix mirrors knoppix 8.5 dvd version available download exclusive bundled physical edition linux-magazin linux-user version 8.5 longer includes systemd replaced elogind spectre meltdown kernel vulnerabilities mitigated adriane knoppix variation intended blind visually impaired people used entirely without vision oriented output devices released third quarter 2007 live cd adriane knoppix named adriane knopper wife klaus knopper developer knoppix adriane visual impairment assisting klaus development software name adriane also backronym audio desktop reference implementation networking environment adriane knoppix intended blind also beginners ’ know much computers uses suse blinux screen reader phoneme generator speech engine normal output
|
Operating systems
|
documents documents commonly recognized name special folder microsoft windows even though starting windows vista called documents actual name folder might different language installed copy windows english folder supposed personal area users store personal non-shared documents however many software developers ignored convention result folder become dumping ground application data files containing settings saved games users delete move organize files without causing unwanted behavior software windows xp contained subfolders pictures music videos starting windows vista subfolders moved documents made siblings microsoft first introduced documents folder windows 95 oem service release 2 standard location storing user-created files folder located root directory boot volume shortcut displayed directly user desktop windows nt family operating systems set documents folder user profile folder windows xp earlier path codice_1 alias codice_2 boot volume user later change physical location documents however documents windows explorer file dialog boxes n't appear absolute path addition translation display name folder might change depending owner folder example user logged windows xp later user account look personal folders user account b via windows explorer instead documents b documents seen customization achieved using codice_3 file windows vista made many changes folder dropping name stored codice_4 regardless windows language windows explorer however shows different display name depending chosen language instance english copy windows shows documents french copy shows mes documents german copy shows eigene dokumente changed eigene dateien windows xp additionally pictures music videos longer stored within called pictures music video siblings folder supposed personal area users store personal non-shared documents users supposed sole authority stored folder creating renaming moving deleting contents folder supposed impact proper execution installed software however many software developers ignored convention result folder become dumping ground application data files containing settings saved games example users delete move organize files without causing unwanted behavior software option either live chaos simply store files elsewhere windows 98 introduced two additional folders prefix music pictures present windows server 2003 default unless enabled using start menu customization installing windows media player 10 11 windows xp adds videos folder windows media player uses store video files shown media library windows vista prefix removed three folders expelled called documents addition user folders added contacts downloads favorites links saved games searches windows 10 adds onedrive windows 7 public user folder recorded tv library added libraries list installing visio 2003 adds nowiki shapes /nowiki folder windows machines operate part windows server domain administrators configure location documents special folders group policy corporate desktop deployments commonly redirect documents folder file server
|
Computer file systems
|
malicious software removal tool microsoft windows malicious software removal tool freely distributed virus removal tool developed microsoft microsoft windows operating system first released january 13 2005 on-demand anti-virus tool on-demand means lacks real-time protection scans computer specific widespread malware tries eliminate infection automatically distributed microsoft windows computers via windows update service also separately downloaded program usually updated second tuesday every month commonly called patch tuesday distributed via windows update point runs automatically background reports malicious software found alternatively users manually download tool microsoft download center records results log file located windir \debug\mrt.log run manually times users start mrt.exe using windows command prompt run command start menu released tool configured report anonymized data infections microsoft detected reporting behavior disclosed tool eula disabled desired june 2006 microsoft report company claimed tool removed 16 million instances malicious software 5.7 million 270 million total unique windows computers since release january 2005 report also stated average tool removes malicious software 1 every 311 computers runs microsoft claims software removed password stealer threats 859,842 machines august 2013 malicious software removal tool deleted old vulnerable versions tor client order end spread sefnit botnet mined bitcoins without host owner approval later engaged click fraud approximately two million hosts cleaned october although slightly less half estimated infections rest suspected machines presumably automatic windows updates enabled manually run since support windows 2000 ended july 13 2010 microsoft stopped distributing tool windows 2000 users via windows update last version tool could run windows 2000 4.20 released may 14 2013 starting version 5.1 released june 11 2013 support windows 2000 dropped altogether although windows xp support ended april 8 2014 microsoft announced updates windows xp version malicious software removal tool would provided july 14 2015
|
Computer security
|
mark galassi mark galassi physicist computer scientist contributor free software movement born manhattan grew france italy currently lives santa fe new mexico works space science applications group los alamos national laboratory research scientist los alamos worked mark galassi involved gnu project since 1984 designed gnu scientific library together james theiler contributed free software projects gnome dominion also currently board chair vice president software freedom conservancy studied liceo classico giuseppe parini graduating 1983 completed ba physics reed college 1986 completed ph.d. physics 1992 institute theoretical physics stony brook martin roček also worked tektronix cygnus solutions part red hat working guile ecos
|
Operating systems
|
piling-up lemma cryptanalysis piling-up lemma principle used linear cryptanalysis construct linear approximation action block ciphers introduced mitsuru matsui 1993 analytical tool linear cryptanalysis piling-up lemma allows cryptanalyst determine probability equality holds x binary variables bits either 0 1 let p denote probability true equals one certain happen equals zero happen first consider piling-up lemma two binary variables formula_2 formula_3 consider due properties xor operation equivalent x x 0 x x 1 mutually exclusive events say must make central assumption piling-up lemma binary variables dealing independent state one effect state others thus expand probability function follows express probabilities p p ½ ε ½ ε ε probability biases — amount probability deviates ½ thus probability bias ε xor sum 2εε formula extended x follows note ε zero one binary variables unbiased entire probability function unbiased — equal ½ related slightly different definition bias formula_8 fact minus two times previous value advantage formula_9 adding random variables amounts multiplying 2nd definition biases practice x approximations s-boxes substitution components block ciphers typically x values inputs s-box values corresponding outputs simply looking s-boxes cryptanalyst tell probability biases trick find combinations input output values probabilities zero one closer approximation zero one helpful approximation linear cryptanalysis however practice binary variables independent assumed derivation piling-up lemma consideration kept mind applying lemma automatic cryptanalysis formula
|
Computer security
|
lost cluster lost clusters occur file deleted directory listing file allocation table fat still shows clusters allocated file
|
Computer file systems
|
utmp utmp wtmp btmp variants utmpx wtmpx btmpx files unix-like systems keep track logins logouts system files regular text files rather binary format needs edited specially crafted programs implementation fields present file differ depending system libc version defined utmp.h header file wtmp btmp format exactly like utmp except null value username indicates logout associated terminal actual user name located finding preceding login terminal furthermore value terminal name username shutdown reboot indicates system shutdown reboot respectively files set given pam module pam_unix.so pam_sss.so set application performing operation e.g mingetty /bin/login sshd obligation program record utmp information utmpx wtmpx extensions original utmp wtmp originating sun microsystems utmpx specified posix utmp wtmp btmp files never part official unix standard single unix specification utmpx corresponding apis part systems create different newer files utmpx variants deprecated/obsoleted former formats always case linux example uses utmpx structure place older file structure depending system files may commonly found different places non-exhaustive list linux solaris hp-ux freebsd 9.0 introduced new files adding support utmpx different commands allow users consult information stored files including show current system users last show last logged users lastb show last failed login attempts linux-specific
|
Operating systems
|
quickdraw quickdraw 2d graphics library associated application programming interface api core part classic mac os operating system initially written bill atkinson andy hertzfeld quickdraw still existed part libraries mac os x largely superseded modern quartz graphics system mac os x v10.4 quickdraw officially deprecated mac os x v10.5 applications using quickdraw make use added 64-bit support mac os x v10.8 quickdraw header support removed operating system applications using quickdraw still run os x 10.8 macos 10.12 however current versions xcode macos sdk contain header files compile programs quickdraw grounded apple lisa lisagraf early 1980s designed fit well pascal-based interfaces development environments early apple systems addition quickdraw raster graphics system defines pixel basic unit graphical information contrast vector graphics systems graphics primitives defined mathematical terms rasterized required display resolution raster system requires much less processing power however prevailing paradigm time quickdraw developed quickdraw defined key data structure graphics port grafport logical drawing area graphics could drawn obvious on-screen object corresponding grafport window entire desktop view could grafport off-screen ports could also exist grafport defined coordinate system quickdraw resolution 16 bits giving 65,536 unique vertical horizontal locations numbered -32,767 extreme left top +32,767 extreme right bottom window usually set top left corner content area located 0,0 associated grafport window content area include window frame drop shadow title bar quickdraw coordinates referred infinitely thin lines pixel locations actual pixel drawn space immediate right coordinate made easier programmers avoid graphical glitches caused off-by-one errors macintosh pixels square grafport default resolution 72 pixels per inch chosen match conventions established printing industry 72 points per inch quickdraw also contained number scaling mapping functions quickdraw maintained number global variables per process chief among current port originally simplified api since operations pertained current port os developed use global state also made quickdraw much harder integrate modern design approaches multi-threading pre-emptive multitasking address problems carbon api bridge mac os 9 mac os x added additional parameters routines allowing opaque storage thread information new non-polled event structure everything seen classic mac os screen drawn quickdraw library quite low level primitive objects draw objects except text may drawn using pen rectangular dimensions pattern color note pen rectangular axis-aligned diagonal lines end thicker horizontal vertical ones shapes may drawn filled framed using pattern color filled arc forms wedge text may drawn installed font variety stylistic variations size color depending selected font stored text scaled variety ways truetype fonts scale smoothly size whereas bitmap fonts usually scale well important feature quickdraw support transfer modes governed destination pixel value related previous value color object drawn set attributes pen text drawing associated grafport regions key data structure quickdraw define arbitrary set pixels rather like bitmap compressed form rapidly manipulated complex ways regions combined union subtracted difference xored form regions used within grafport clipping drawn filled framed like shape series framed shapes connected lines may combined region region need consist contiguous set pixels disconnected regions possible common although regions could allow powerful graphic manipulations limited current implementation restricts maximum region data storage size sixteen bit value practical general-purpose drawing composition tool practical use high resolution also restricted regions underpin rest quickdraw permitting clipping arbitrary shapes essential implementation multiple overlapping windows invented bill atkinson regions patented separate invention apple region specified initial creation opening region drawing various quickdraw shapes closing region hidden routines construct region quickdraw commands executed bitmaps may also converted regions bitmaps may made regions painting filling region graphics port internal structure region storage length bounding rectangle opaque apple-published documents available though mechanism outlined patent regions implemented using vertical horizontal compression region stored series horizontal scan lines rasters contains vertical coordinate followed list horizontal inversion coordinates inversion point thought toggling inclusion region points first point turns region second turns compression achieved storing line differentially line contains differences previous line rather full set inversion points finally identical adjacent scan lines efficiently encoded simply skipping way commonly used region rounded corner rectangle efficiently encoded complex operations region composition image clipping may done without requiring either extensive processor cycles large amounts memory original systems executing quickdraw code used processors operating 8 megahertz clock rates systems 128 kilobytes writable memory regions bound specific orientation ninety degree rotation region would require detailed reverse engineering structure extensive coding general rotation impractical compared rotating original source boundary description simply creating new region however api includes conversion routines bitmaps bitmaps may also rotated using well known methods various degrees image degradation depending upon angle chosen storage processor cycles available operation complexity algorithm apple recently carbon api defined regions opaque structure program compilation options series graphics calls quickdraw recorded structure called picture saved memory played back time reproducing graphics sequence playback time picture may placed new coordinates scaled picture saved disk form defines apple pict format entire bitmap pixmap referring color images may copied one grafport another scaling clipping known blitting copybits name function operation basis animation sprite-like effects mac quickdraw provides similar blitting function designed implement scrolling within grafport image port shifted new location without scaling clipping desired graphics primitive operation vectored stdprocs series function pointers stored grafport limited polymorphism permits individual operations overridden replaced custom functions allowing printer drivers intercept graphics commands translate suitable printer operations way quickdraw rendered using postscript fact enabled macintosh practically invent desktop publishing similar subclass window data structure began associated grafport thus basically making windows exchangeable grafport convenient could source programming errors quickdraw started life lisagraf part apple lisa development macintosh initially simplified later extended originally quickdraw grafports supported bit depth 1 one bit per pixel black white suited built-in screen early macintosh fixed size 512×342 pixels limited color supported using crude planar model allowing quickdraw drive types dot-matrix printer used multi-colored ribbons applications supported feature 1987 macintosh ii developed launched designed conventional three-box design computer monitor keyboard separate monitor separate larger original mac video architecture necessarily change addition mac ii took macintosh black-and-white full color apple also decided time support seamless desktop spanning multiple monitors industry first thus color quickdraw significant extension original quickdraw created original architecture lacked much provision expandability using series hacks apple developers managed make addition color new video architecture virtually seamless developers end users color quickdraw introduced new data structures including gdevices represent attached video card/monitor new color grafport cgrafport structure handle color well pixmaps instead bitmaps multiple bits-per-pixel images one hacks compatibility used new structure exactly size old one data members place additional handles pointers color structures place bitmap fields upper two bits rowbytes field pressed use flags distinguish grafport cgrafport always zero old-style grafports bitmap could never feasibly wide ever set bits use two high bits would come back haunt quickdraw later forced maximum row width 4,095 32-bit pixmaps became problematic high-resolution graphics work later development carbon eliminated limitation fully backward compatible palette manager also added color quickdraw managed arbitration colors indexed video devices graphics primitives operations remained either unchanged would operate color else new color versions black white apis added initially color quickdraw capable operating 1 2 4 8-bit video cards available time soon however 24-bit video cards appeared so-called true color quickdraw updated support 32 bits per pixel reality 24 bits 8 unused color data 32-bit quickdraw architecture always allowed however new apis necessary color data structures allowed color depth 1 2 4 8 15 24 bits yielding 2 4 16 256 32,768 16,777,216 colors respectively 4 16 256 scales grey quickdraw took care managing resampling colors available color depths actual video hardware transfer offscreen image buffers including optionally dithering images lower depth improve image quality set color sampling utilities also added programmers could generate optimal color palettes use indexed video devices architecture quickdraw always allowed creation grafports associated bitmaps pixmaps offscreen graphics could composed memory without visible immediately screen pixels could transferred offscreen ports screen using quickdraw blitting function copybits offscreen compositing workhorse games graphics-intensive applications however advent 32-bit quickdraw offscreen worlds created set hand programmer within application involving three separate fairly complex data structures cgrafport pixmap gdevice indexed devices color look-up table inverse could error prone 32-bit quickdraw os support handling added offscreen graphics world gworld video buffer pixmap gworld could stored main memory available unused parts video ram copying screen could optimized speed avoiding need transfer large amount pixel data across main memory bus advent quicktime quickdraw gained ability deal compressed raster data jpeg quicktime image compression manager integrated closely quickdraw particular image decompression calls full-fledged quickdraw drawing calls picture recorded compressed data would saved part picture display picture later drawn image compression manager also added integration colorsync color matching apart back-end changes optimize new processor architectures powerpc quickdraw remained largely unchanged throughout rest life classic mac os quickdraw gx quickdraw 3d shared quickdraw name able interoperate quickdraw pixmap picture data structures otherwise completely separate functionality mac os x quickdraw became part carbon api 2005 release mac os x 10.4 quickdraw officially deprecated 2010 macpaint 1.3 source code release computer history museum historical version quickdraw source code became available
|
Operating systems
|
trait computer programming computer programming trait concept used object-oriented programming represents set methods used extend functionality class traits provide set methods implement behaviour class require class implement set methods parameterize provided behaviour inter-object communication traits somewhat object-oriented protocol interface mixin interface may define one behaviors via method signatures trait defines behaviors via full method definitions i.e. includes body methods contrast mixins include full method definitions may also carry state member variable traits usually n't hence object defined trait created composition methods used classes without requiring multiple inheritance case naming collision one trait used class method name programmer must explicitly disambiguate one methods used class thus manually solving diamond problem multiple inheritance different composition methods object-oriented programming conflicting names automatically resolved scoping rules whereas mixins composed using inheritance operation traits offer much wider selection operations including traits composed following ways traits come originally programming language self supported following programming languages example uses trait enhance classes allows simulating aspects multiple inheritance trait rust declares set methods type must implement rust compilers require traits explicated ensures safety generics rust also helps avoid major problems templates c++ // type must ord trait // operations done fn get_max ord option simplify tedious repeated implementation traits like codice_3 codice_4 codice_5 used request compilers generate certain implementations automatically derivable traits include codice_6 codice_7 codice_3 codice_9 codice_10 codice_11 codice_12 codice_4 codice_14
|
Programming language topics
|
automatic acquisition sense-tagged corpora knowledge acquisition bottleneck perhaps major impediment solving word sense disambiguation wsd problem unsupervised learning methods rely knowledge word senses barely formulated dictionaries lexical databases supervised learning methods depend heavily existence manually annotated examples every word sense requisite met handful words testing purposes done senseval exercises therefore one promising trends wsd research using largest corpus ever accessible world wide web acquire lexical information automatically wsd traditionally understood intermediate language engineering technology could improve applications information retrieval ir case however reverse also true web search engines implement simple robust ir techniques successfully used mining web information employed wsd direct way using web corpora enhance wsd performance automatic acquisition sense-tagged corpora fundamental resource feed supervised wsd algorithms although far commonplace wsd literature number different effective strategies achieve goal already proposed strategies automatic extraction examples train supervised learning algorithms reviewed far best explored approach mine web word sense disambiguation results certainly encouraging however several open research issues related use web examples wsd besides automatic acquisition examples web wsd experiments profited web clear however research opportunities remain largely unexplored instance little known use lexical information extracted web knowledge-based wsd systems also hard find systems use web-mined parallel corpora wsd even though already efficient algorithms use parallel corpora wsd
|
Computational linguistics
|
thexder thexder player controls fighter robot able transform jet originally released 1985 nec pc-8801 platform japan game arts licensed thexder square order develop conversion nintendo entertainment system nes game console 1987 game arts also developed thexder conversion msx platform game licensed sierra entertainment release united states 1987 sierra ported game multiple platforms including ibm pc tandy color computer 3 apple ii apple iigs apple macintosh tandy 1000 computer became company best-selling title 1987 1988 activision released game europe commodore amiga 1990 game sold one million copies worldwide thexder quickly became best-selling hit selling 500,000 copies pc8801 platform popular japan despite home market success thexder garnered little attention abroad initially conversion msx best selling platform brazil many east european countries became international hit compute praised apple iigs version thexder computer first true arcade game excellent play value dollar 1988 games machine gave amiga version 74 score 1991 dragon gave macintosh pc/ms-dos versions game 4 5 stars game went sell one million copies worldwide becoming game arts biggest selling title 1987 thexder considered important breakthrough title run-and-gun shooter game genre paving way titles contra metal slug
|
Computer architecture
|
weprotect weprotect styled weprotect global alliance led uk government founded baroness joanna shields supported 84 countries 24 technology companies 20 civil society organisations weprotect mission stop global crime online child sexual abuse exploitation 22 july 2013 then-prime minister david cameron made speech regarding proliferation accessibility child abuse images internet cracking online pornography prime minister announced new uk-us taskforce would created lead global alliance biggest internet companies tackle indecent images children online joanna shields prime minister advisor digital industries would head initiative working uk us governments law enforcement agencies technology industry maximise international efforts october 2013 announced damian green hmg minister policing criminal justice victims would travelling us joanna shields formalise arrangements task force meet us attorney general leading internet companies 18 november 2013 prime minister hosted internet safety summit 10 downing street joanna shields discuss done block child abuse content protect children harmful material online participants including leading search engines internet service providers national crime agency internet watch foundation nspcc discussed rid internet child sexual abuse exploitation summit internet safety communiqué issued setting agreed-upon action 13 december 2013 policing minister damian green us acting assistant attorney general mythili raman joanna shields launched first meeting us-uk taskforce counter online child exploitation ’ next year chair taskforce joanna shields responsible bringing together experts government industry law enforcement academia sides atlantic combat child sexual exploitation crimes internet reduce volume indecent images children online april 2014 home office minister damian green addressed nspcc child safety conference government work stamp online sexual exploitation revealed government working major industry players google microsoft pilot make even tougher pedophiles share child abuse images also told conference google launched programme embed engineers internet watch foundation speech encouraged internet companies innovate order fight online child sexual exploitation announced joanna shields would leading industry solutions event part us-uk taskforce event would bring together experts across technology sector come innovative solutions end sharing indecent images interacting adults children sexual purposes online may 2014 industry solutions event weprotect 2014 took place grey inn london attendance 67 technology specialists innovators 48 world leading technology companies event led national crime agency ceop home office delivered brandfuel facilitated pa consulting solutions event started hackathon leading internet technology cyber intelligence companies working develop breakthrough technology concepts could assist prevention investigation online child abuse protection victims event successfully laid foundation new model collaboration across industry harnessing diverse range technical skills knowledge experience tackle sharing indecent images grooming children sexual purposes uk prime minister hosted weprotect global summit london december 2014 summit gathered government leaders leading technology companies civil society organisations galvanise action end online child sexual exploitation home secretary opened summit speaking scale abuse uk combat prime minister keynote speaker second day alongside raft measures technical innovations tackle use internet view share indecent images prime minister announced uk would work unicef develop new global child protection fund uk would making £50 million contribution fund five-year period keith bristow director general national crime agency also spoke summit addressed need law enforcement civil society technology industry work together minimise risk children maximise risk offenders joanna shields prime minister digital adviser spoke importance technology industry using talents skills capacity innovation tackle online child exploitation also delivered report milestones industry partners course 2014 attendees also heard executives microsoft google ey visa presented contributions weprotect pledged continue developing concepts emerged may workshop including blocking viewing illegal material browser level internet interaction risk scoring victim identification tool system children report self-generated indecent images also announced united arab emirates would hosting another conference 2015 ensure global response comes fruition end summit four ambitious statements action published date signed 50 countries 20 companies 10 civil society organisations follow-up weprotect industry event took place september 2015 speaking event uk minister internet safety security baroness joanna shields delivered message continued support initiative vital importance broad global coalition willing coming together share information collaborate best protect children online industry delegates also heard representatives weprotect initiative including google facebook microsoft milestones achieved companies preventing sexual abuse images appearing search results identifying online grooming detecting removing videos children abused 16–17 november 2015 united arab emirates hosted second weprotect global summit abu dhabi may 2016 weprotect founder baroness joanna shields announced weprotect merged global alliance child sexual abuse online “ create first time single organisation influence expertise resources transform online child sexual exploitation dealt worldwide ” july 2016 weprotect global alliance launched new fund end violence children united nations deliver global program capacity capability initial donation £40 million uk government fund hosted unicef weprotect global alliance board responsible advising prioritize activities maximum impact may 2017 press conference rome pontifical gregorian university collaboration centre child protection institute psychology partnership weprotect global alliance telefono azzurro announced 3–6 october 2017 would host world congress entitled 'child dignity digital world announced invitation-only congress brings together distinguished academic experts business leaders leaders civil society high-level politicians religious representatives across globe provides historic opportunity set global agenda fight online sexual child abuse child protection digital world leadership advisory board
|
Computer security
|
xceedium xceedium inc. network security software company providing privileged identity access management solutions subsequently acquired ca technologies software used control manage risks privileged users privileged accounts admin root etc privileged credentials passwords certificates digital keys etc pose systems data xceedium inc. founded 2000 david van david cheung company split lucid technologies group company created 1995 company developed software internal use provided consultants secure remote access sensitive customer systems software became core technology xceedium gatekeeper product xceedium products aimed mid-large sized enterprises vertical market segments including banking financial services retail telecom healthcare energy government agencies marketed product global partner network xceedium headquarters originally located jersey city new jersey relocated northern virginia march 2011 initial funding venture-backed company came arrowpath venture partners nationwide mutual capital xceedium private venture capital backed company funding arrowpath venture partners nationwide mutual capital june 2012 xceedium closed 12 million financing led arrowpath venture partners bringing total capital raised 25m xceedium acquired ca technologies august 2015 xceedium gatekeeper first product designed company initially built out-of-band in-band kvm remote control gatekeeper software updated provide network-based access control session recording/playback later gatekeeper cloakware password authority product acquired irdeto integrated form xceedium xsuite main capabilities xceedium xsuite role-based access control command filtering white/black list user containment prevents ssh based leapfrogging rdp hopping unauthorized nodes session monitoring/policy violation alerting session recording playback privileged password vaulting management xceedium xsuite platform enabled organizations apply principle least privilege holds systems individuals granted access resources commands absolutely necessary required task according company xsuite limited access privileged users systems commands explicitly authorized role-based access control also monitored activities privileged users sent alerts individuals attempted violate policy system recorded privileged user sessions telnet rdp ssh vnc provided mechanism replay recorded session investigations forensics xsuite cloud amazon web services aws introduced extension xsuite platform provided privileged identity access management standalone aws implementations hybrid architectures include infrastructure nodes e.g. servers network devices storage devices security systems running aws amazon elastic compute cloud ec2 private clouds virtual machines traditional single os/hardware scenarios following acquisition xceedium ca xceedium xsuite integrated ca product range ca privileged access manager
|
Computer security
|
hp serviceguard hp serviceguard formerly known mc/serviceguard high-availability cluster software produced hp runs hp-ux linux serviceguard existed since 1990 hp claims first high availability solution unix linux port called sg/lx existed since 1999 briefly suspended reintroduced june 2012
|
Computer architecture
|
micro-operation computer central processing units micro-operations also known micro-ops μops detailed low-level instructions used designs implement complex machine instructions sometimes termed macro-instructions context usually micro-operations perform basic operations data stored one registers including transferring data registers registers external buses central processing unit cpu performing arithmetic logical operations registers typical fetch-decode-execute cycle step macro-instruction decomposed execution cpu determines steps series micro-operations execution micro-operations performed control cpu control unit decides execution performing various optimizations reordering fusion caching various forms μops long basis traditional microcode routines used simplify implementation particular cpu design perhaps sequencing certain multi-step operations addressing modes recently μops also employed different way order let modern cisc processors easily handle asynchronous parallel speculative execution traditional microcode one table lookups equivalent done locate appropriate μop-sequence based encoding semantics machine instruction decoding translation step however instead rigid μop-sequences controlling cpu directly microcode-rom μops dynamically buffered rescheduling executed buffering means fetch decode stages detached execution units feasible traditional microcoded hard-wired design allows degree freedom regarding execution order makes extraction instruction level parallelism normal single-threaded program possible provided dependencies checked etc. opens analysis therefore also reordering code sequences order dynamically optimize mapping scheduling μops onto machine resources alus load/store units etc. happens μop-level sub-operations different machine macro instructions may often intermix particular μop-sequence forming partially reordered machine instructions direct consequence out-of-order dispatching microinstructions several macro instructions however micro-op fusion aims fact complex microinstruction may replace simpler microinstructions certain cases typically order minimize state changes usage queue reorder buffer space therefore reducing power consumption micro-op fusion used modern cpu designs execution optimization gone even processors translate many machine instructions series μops also opposite appropriate combine certain machine instruction sequences compare followed conditional jump complex μop fits execution model better thus executed faster less machine resources involved also known macro-op fusion another way try improve performance cache decoded micro-operations macroinstruction executed processor directly access decoded micro-operations special cache instead decoding execution trace cache found intel netburst microarchitecture pentium 4 widespread example technique size cache may stated terms many thousands micro-operations store kμops
|
Computer architecture
|
webtrends webtrends private company headquartered portland oregon united states provides digital analytics optimization software related digital marketing e-commerce provides services approximately 2,000 companies w. glen boyd eli shapira founded company 1993 e.g software netiq bought 2001 2001-2005 interval netiq released new version webtrends reporting center version 5.0 october 31 2007 three corporate vice presidents ceo asked resign although initial speculation company quickly sold largest competitor later reports indicated change signaled long-term move february 2014 company hired joe davis new ceo may 2014 company moved headquarters pacific first center u.s. bancorp tower downtown portland 2009 webtrends launched transit ad campaign revolving around whether cyclists pay road tax ad asked cyclists pay road tax drivers cycling community reacted strongly ad strident opinion sides debate aim campaign demonstrate ability company web analytics track resulting online commentary around issue webtrends acquired clickshift automated optimization product online advertising december 2006 webtrends acquired seattle based widemile provider multivariate testing targeting july 30 2009 product rebranded relaunched webtrends optimize day acquisition made public webtrends acquired san francisco based transpond maker social microsites applications distributed web facebook august 10 2010 product rebranded webtrends apps time announcement later rebranded webtrends social webtrends acquired reinvigorate culver city ca based media temple ventures reinvigorate developed real time analytics web product visit heat mapping technologies product rebranded webtrends reinvigorate later discontinued webtrends offers variety web analytics products services focus collection presentation user behavior data websites mobile device applications new york times described company offerings products analyze spending web site visitors core product webtrends analytics available software software service saas models years webtrends released number saas products including webtrends segments webtrends optimize action center webtrends streams webtrends ads 2012 integration deal linked webtrends hootsuite 2013-released email remarketing tool helps online marketers deal in-the-moment data abandonment virtual shopping carts potential customers february 2015 webtrends completed worldwide rollout webtrends explore ad-hoc analytics application 2016 webtrends announced would release new analytics product webtrends infinity analytics year later sold oracle software utilizes log file analysis page tagging log analysis reads files web server records transactions via page tagging parameter name-value pairs appended either automatically javascript tag manual hand-coding query string gif image resides data collection server visitor loads page browser browser sends request data collection server may load gif image data collection server receives request logs parameters included query string gif image software analyzes organizes captured data reports configured 'profile reports viewable various means commonly web-based graphic user interface scheduled emailed export report pdf csv format collected data also viewed via raw log file delivery rest odbc queries products utilize webtrends data extraction api web-based report presentation interface highly configurable allowing webtrends administrator specify information analyzed presented available viewing 2008 new york times already owned international herald tribune used webtrends analyze visitors iht site arrived data collection process facilitated finding importance search engines
|
Web technology
|
recovery console recovery console feature windows 2000 windows xp windows server 2003 operating systems provides means administrators perform limited range tasks using command line interface primary function enable administrators recover situations windows boot far presenting graphical user interface recovery console used provide way access hard drive emergency command prompt recovery console accessed either original installation media used install windows also installed hard drive added ntldr menu however relying latter risky requires computer boot point ntldr loads recovery console simple command-line interpreter cli many available commands closely resemble commands normally available codice_1 namely codice_2 codice_3 codice_4 forth recovery console administrator filesystem access recovery console default severely limited administrator using recovery console read-only access volumes except boot volume even boot volume access root directory windows system directory e.g \winnt changed changing security policies enable read/write access complete file system including copying files removable media i.e floppy drives although appears list commands available using codice_9 command many articles recovery console including authored microsoft codice_10 command available protocol stacks loaded way connect shared folder remote computer implied
|
Operating systems
|
requirements modeling framework requirements modeling framework rmf open-source software framework working requirements based reqif standard rmf consists core allowing reading writing manipulating reqif data user interface allowing inspect edit request data rmf first currently open-source reference implementation reqif standards noteworthy fact rmf already deployed prostep reqif implementor forum order ensure interoperability commercial implementation since 2011 reports german international press rmf rmf development name pror since 2009 scope deploy research project collaborative efforts quickly developed research project verde resulting significant acceleration development point data model based rif predecessor reqif june 2011 proposal created transform code eclipse foundation project proposal adopted november 2011 part migration eclipse foundation conversion rif current version reqif 1.0.1 spring 2012 deploy verde opted research projects nevertheless rmf keeps evolving within framework research project advance formal mind free extensions pror name pror essentials developed currently neither version 0.14 0.13 integrated latest version eclipse neither pror rmf version 0.10.0 remains reasons unknown version 0.13 release folder version 0.14 latest folder integrated eclipse version mars.2 release 4.5.2 rmf core allows storing writing validating manipulating reqif files manipulation data implemented programmatically using emf pror additionally enables interactive creation inspecting editing reqif models requirements presented configurable tables links requirements created via drag drop context menus pror designed integration eclipse-based tools extension point available makes possible integrate available renderers editors react drag drop events outside part deploy advance integration event-b models developed topcased -project suggested integrated rmf integrations proposed implemented prototype
|
Computational linguistics
|
network-based call signaling network-based call signaling ncs profile media gateway control protocol mgcp use packetcable applications voice-over-ip network implementing ncs designed according media gateway control protocol architecture interconnecting packet network traditional public switched telephone network pstn architecture physically decomposes functionality providing complete end-to-end multimedia telecommunication sessions several discrete components notably media gateway mg located customer premises performs physical translation analog voice video streams packetized digital data media gateway controller mgc centralized server controls typically many media gateways manages complexity call setup resource negotiation call routing tear-down addition architecture also uses signaling gateways traditional telecommunication channels ss7-based networks like mgcp ncp device control protocol defining interaction mgc also called call agent media gateways one layer packetcable suite specifications relies upon companion protocol specifications provide complete end-to-end telecommunication functionality network-based call signaling modification media gateway control protocol mgcp ncs provides packetcable profile application programming interface mgci corresponding protocol mgcp controlling voice-over-ip voip embedded clients external call control elements embedded client network element provides mgci functions provide connection control endpoint control auditing status reporting use system model naming conventions modification mgcp ncs profile include following ncs aims supporting packetcable-embedded clients functionality present mgcp 1.0 protocol superfluous ncs removed contains extensions modifications mgcp however mgcp architecture mgcp constructs relevant embedded clients preserved ncs ncs protocol contains minor simplifications mgcp 1.0
|
Internet protocols
|
google safe browsing google safe browsing blacklist service provided google provides lists urls web resources contain malware phishing content google chrome safari firefox vivaldi gnome web browsers use lists google safe browsing service checking pages potential threats google also provides public api service google also provides information internet service providers sending e-mail alerts autonomous system operators regarding threats hosted networks according google september 2017 3 billion internet devices protected service google maintains safe browsing lookup api privacy drawback urls looked hashed server knows urls api users looked safe browsing update api hand compares 32-bit hash prefixes url preserve privacy chrome firefox safari browsers use latter safe browsing also stores mandatory preferences cookie computer google safe browsing conducts client-side checks website looks suspicious sends subset likely phishing social engineering terms found page google obtain additional information available google servers whether website considered malicious logs including ip address one cookies kept two weeks tied safe browsing requests made device websites carrying ads infected might blacklisted google safe browsing even website malware request removal blacklist requires webmaster create google webmaster tool account take several days removed
|
Computer security
|
webroot webroot inc. private american company provides internet security consumers businesses company founded boulder colorado us headquartered broomfield colorado us operations san mateo san diego globally australia austria ireland japan united kingdom international headquarter located dublin ireland webroot founded 1997 steven thomas launched webroot first commercial product trace removal agent called webroot window washer investors include venture capital firms technology crossover ventures accel partners mayfield 2002 webroot launched spyware blocking removal product called webroot spy sweeper company introduced antivirus protection launch spy sweeper antivirus 2006 october 2007 webroot antivirus antispyware desktop firewall released added firewall protection feature webroot entered enterprise market 2004 launch webroot spy sweeper enterprise combined spy sweeper technology enables administrators deploy antispyware protection across entire network october 2008 webroot launched first consumer security suite webroot internet security essentials united states international release security suite followed early 2009 august 2009 webroot appointed new president ceo former ceo wily technology may 2010 webroot announced plans open international headquarters dublin ireland july 2010 webroot internet security complete 2011 released including antivirus antispyware protection firewall capabilities online back-up password management licensed lastpass protection identity theft credit card monitoring us customers september 2010 webroot opened regional office leidschendam netherlands primarily aimed distributing webroot enterprise security-as-a-service saas products businesses webroot mobile security android launched april 5 2011 smartphones tablets free basic version paid premium version app designed protect viruses apps threats delivered via web browsing threats created mobile devices lost secureanywhere products launched october 4 2011 mobile security offerings expanded include ios mobile operating system october 2011 webroot launched new generation products using prevx cloud technology included three basic products windows secureanywhere antivirus essentials complete 2012 security android ios mobile devices february 2012 products businesses added july 2014 webroot announced brightcloud security services new portfolio services enterprise-class businesses including integration next-generation firewalls siems september 2017 webroot appointed new president ceo former ceo lancope mike potts february 7 2019 carbonite inc. announced entered definitive agreement acquire webroot march 26 2019 carbonite closed acquisition webroot purchase price 618.5 million cash november 2007 webroot acquired uk-based email systems ems announced provider security software-as-a-service saas market december 2009 webroot announced partnership virtual private network software provider anchorfree version without advertisements anchorfree vpn software protection via webroot antivirus antispyware software produced march 2010 webroot announced acquisition swedish corporate internet security company email systems scandinavia ess july 2010 webroot acquired san diego california-based web content classification security services provider brightcloud adding web reputation content classification technology existing products november 2010 webroot acquired uk cloud-based anti-malware company prevx july 2011 partnership struck global distribution firm tech data making webroot products available tech data network 125,000 channel partners 100 countries around world july 2013 webroot rsa security formed partnership enhance firms real-time phishing detection september 2016 webroot acquired assets cyberflow analytics company applying data science network anomaly detection february 2019 webroot announced acquired carbonite march 2019 carbonite confirmed purchase av-comparatives gave nine vendors including webroot highest award july 2012 anti-phishing test webroot took 9th place among 18 products tested efficacy blocking phishing websites av-comparatives performance test october 2012 webroot best pcmark score lightest impact 20 products tested windows 7 64-bit machine webroot worst results 20 products tested av-comparatives september 2012 file detection test malicious software terms malware detection rates false alarms webroot detected less 80 percent viral samples much worse 94.4 percent rate second-lowest detecting product webroot inappropriately flagged 210 clean files raising many false positives 19 products tested combined according av-comparatives results misses confirmed several tests also vendor pc magazine awarded webroot secureanywhere 19 times editor choice security product year highest award given security software programs pc magazine test 2013 webroot found pc magazine staff best score malware blocking tests malware removal tests speed scans installation speed 2014 test pcmag found webroot detection rate 89 percent overall malware cleanup score 6.6 points tops among products tested using malware collection gartner listed webroot visionary quadrant 2014 assessment endpoint protection platforms 2014 passmark software software hardware performance benchmarking company benchmarked webroot secureanywhere business endpoint protection webroot secureanywhere antivirus using 13 performance metrics tests webroot products found outperform competitors variety metrics including scan times cpu usage others earning highest overall score tests november 2016 evaluation mobile security products android av-test given webroot secureanywhere mobile product protection score 3.5 6 placing near bottom 26 products evaluated test terms protection malware detection latest android malware real-time detection latest android malware discovered last 4 weeks scores industry average score october 2017 av-comparatives performed head-to-head comparison products vipre webroot webroot secureanywhere product able achieve 86.4 protection rate compared vipre cloud 100 rate test performed using test set 316 live malicious urls found field january 2018 test 84 various android antimalware apps av-comparatives webroot security premier detected 99.7 antimalware samples placing 30 tested apps showed better detection rates
|
Computer security
|
interpreter computing computer science interpreter computer program directly executes instructions written programming scripting language without requiring previously compiled machine language program interpreter generally uses one following strategies program execution early versions lisp programming language dartmouth basic would examples first type perl python matlab ruby examples second ucsd pascal example third type source programs compiled ahead time stored machine independent code linked run-time executed interpreter and/or compiler jit systems systems smalltalk contemporary versions basic java may also combine two three interpreters various types also constructed many languages traditionally associated compilation algol fortran cobol c/c++ interpretation compilation two main means programming languages implemented mutually exclusive interpreting systems also perform translation work like compilers terms interpreted language compiled language signify canonical implementation language interpreter compiler respectively high level language ideally abstraction independent particular implementations interpreters used early 1952 ease programming within limitations computers time e.g shortage program storage space native support floating point numbers interpreters also used translate low-level machine languages allowing code written machines still construction tested computers already existed first interpreted high-level language lisp lisp first implemented 1958 steve russell ibm 704 computer russell read john mccarthy paper realized mccarthy surprise lisp eval function could implemented machine code result working lisp interpreter could used run lisp programs properly evaluate lisp expressions programs written high level language either directly executed kind interpreter converted machine code compiler assembler linker cpu execute compilers assemblers generally produce machine code directly executable computer hardware often optionally produce intermediate form called object code basically machine specific code augmented symbol table names tags make executable blocks modules identifiable relocatable compiled programs typically use building blocks functions kept library object code modules linker used combine pre-made library files object file application form single executable file object files used generate executable file thus often produced different times sometimes even different languages capable generating object format simple interpreter written low level language e.g assembly may similar machine code blocks implementing functions high level language stored executed function entry look table points code however interpreter written high level language typically uses another approach generating walking parse tree generating executing intermediate software-defined instructions thus compilers interpreters generally turn source code text files tokens may may generate parse tree may generate immediate instructions stack machine quadruple code means basic difference compiler system including built separate linker generates stand-alone machine code program interpreter system instead performs actions described high level program compiler thus make almost conversions source code semantics machine level i.e program changed interpreter conversion work every time statement function executed however efficient interpreter much translation work including analysis types similar factored done first time program module function even statement run thus quite akin compiler works however compiled program still runs much faster circumstances part compilers designed optimize code may given ample time especially true simpler high level languages without many dynamic data structures checks type-checks traditional compilation executable output linkers .exe files .dll files library see picture typically relocatable run general operating system much like object code modules difference relocation done dynamically run time i.e program loaded execution hand compiled linked programs small embedded systems typically statically allocated often hard coded flash memory often secondary storage operating system sense historically interpreter-systems self-contained editor built becoming common also compilers often called ide although programmers prefer use editor choice run compiler linker tools manually historically compilers predate interpreters hardware time could support interpreter interpreted code typical batch environment time limited advantages interpretation software development cycle programmers make frequent changes source code using compiler time change made source code must wait compiler translate altered source files link binary code files together program executed larger program longer wait contrast programmer using interpreter lot less waiting interpreter usually needs translate code worked intermediate representation translate thus requiring much less time changes tested effects evident upon saving source code reloading program compiled code generally less readily debugged editing compiling linking sequential processes conducted proper sequence proper set commands reason many compilers also executive aid known make file program make file lists compiler linker command lines program source code files might take simple command line menu input e.g make 3 selects third group set instructions issues commands compiler linker feeding specified source code files compiler converts source code binary instruction specific processor architecture thus making less portable conversion made developer environment binary distributed user machines executed without translation cross compiler generate binary code user machine even different processor machine code compiled interpreted program distributed source code needs translated final machine takes time makes program distribution independent machine architecture however portability interpreted source code dependent target machine actually suitable interpreter interpreter needs supplied along source overall installation process complex delivery monolithic executable since interpreter part need installed fact interpreted code easily read copied humans concern point view copyright however various systems encryption obfuscation exist delivery intermediate code bytecode similar effect obfuscation bytecode could decoded decompiler disassembler main disadvantage interpreters interpreted program typically runs slower compiled difference speeds could tiny great often order magnitude sometimes generally takes longer run program interpreter run compiled code take less time interpret total time required compile run especially important prototyping testing code edit-interpret-debug cycle often much shorter edit-compile-run-debug cycle interpreting code slower running compiled code interpreter must analyze statement program time executed perform desired action whereas compiled code performs action within fixed context determined compilation run-time analysis known interpretive overhead access variables also slower interpreter mapping identifiers storage locations must done repeatedly run-time rather compile time various compromises development speed using interpreter execution speed using compiler systems lisps allow interpreted compiled code call share variables means routine tested debugged interpreter compiled thus benefit faster execution routines developed many interpreters execute source code stands convert compact internal form many basic interpreters replace keywords single byte tokens used find instruction jump table interpreters pbasic interpreter achieve even higher levels program compaction using bit-oriented rather byte-oriented program memory structure commands tokens occupy perhaps 5 bits nominally 16-bit constants stored variable-length code requiring 3 6 10 18 bits address operands include bit offset many basic interpreters store read back tokenized internal representation interpreter might well use lexical analyzer parser compiler interpret resulting abstract syntax tree example data type definitions latter toy interpreter syntax trees obtained c expressions shown box interpretation used sole method execution even though interpreter interpreted directly executed program needed somewhere bottom stack code interpreted definition machine code cpu execute spectrum possibilities interpreting compiling depending amount analysis performed program executed example emacs lisp compiled bytecode highly compressed optimized representation lisp source machine code therefore tied particular hardware compiled code interpreted bytecode interpreter written c compiled code case machine code virtual machine implemented hardware bytecode interpreter compiling interpreters sometimes also called compreters bytecode interpreter instruction starts byte therefore bytecode interpreters 256 instructions although may used bytecodes may take multiple bytes may arbitrarily complicated control tables necessarily ever need pass compiling phase dictate appropriate algorithmic control flow via customized interpreters similar fashion bytecode interpreters threaded code interpreters similar bytecode interpreters instead bytes use pointers instruction word points function instruction sequence possibly followed parameter threaded code interpreter either loops fetching instructions calling functions point fetches first instruction jumps every instruction sequence ends fetch jump next instruction unlike bytecode effective limit number different instructions available memory address space classic example threaded code forth code used open firmware systems source language compiled f code bytecode interpreted virtual machine spectrum interpreting compiling another approach transform source code optimized abstract syntax tree ast execute program following tree structure use generate native code just-in-time approach sentence needs parsed advantage bytecode ast keeps global program structure relations statements lost bytecode representation compressed provides compact representation thus using ast proposed better intermediate format just-in-time compilers bytecode also allows system perform better analysis runtime however interpreters ast causes overhead bytecode interpreter nodes related syntax performing useful work less sequential representation requiring traversal pointers overhead visiting tree blurring distinction interpreters bytecode interpreters compilation just-in-time compilation jit technique intermediate representation compiled native machine code runtime confers efficiency running native code cost startup time increased memory use bytecode ast first compiled adaptive optimization complementary technique interpreter profiles running program compiles frequently executed parts native code techniques decades old appearing languages smalltalk 1980s just-in-time compilation gained mainstream attention amongst language implementers recent years java .net framework modern javascript implementations matlab including jits self-interpreter programming language interpreter written programming language interpret example basic interpreter written basic self-interpreters related self-hosting compilers compiler exists language interpreted creating self-interpreter requires implementation language host language may another programming language assembler first interpreter system bootstrapped new versions interpreter developed language way donald knuth developed tangle interpreter language web industrial standard tex typesetting system defining computer language usually done relation abstract machine so-called operational semantics mathematical function denotational semantics language may also defined interpreter semantics host language given definition language self-interpreter well-founded define language self-interpreter tells reader expressiveness elegance language also enables interpreter interpret source code first step towards reflective interpreting important design dimension implementation self-interpreter whether feature interpreted language implemented feature interpreter host language example whether closure lisp-like language implemented using closures interpreter language implemented manually data structure explicitly storing environment features implemented feature host language less control programmer interpreter different behavior dealing number overflows realized arithmetic operations delegated corresponding operations host language languages elegant self-interpreter lisp prolog much research self-interpreters particularly reflective interpreters conducted scheme programming language dialect lisp general however turing-complete language allows writing interpreter lisp language lisp programs lists symbols lists xslt language xslt programs written xml sub-domain meta-programming writing domain-specific languages dsls clive gifford introduced measure quality self-interpreter eigenratio limit ratio computer time spent running stack n self-interpreters time spent run stack self-interpreters n goes infinity value depend program run book structure interpretation computer programs presents examples meta-circular interpretation scheme dialects examples languages self-interpreter forth pascal microcode commonly used technique imposes interpreter hardware architectural level computer microcode layer hardware-level instructions implement higher-level machine code instructions internal state machine sequencing many digital processing elements microcode used general-purpose central processing units well specialized processors microcontrollers digital signal processors channel controllers disk controllers network interface controllers network processors graphics processing units hardware microcode typically resides special high-speed memory translates machine instructions state machine data input sequences detailed circuit-level operations separates machine instructions underlying electronics instructions designed altered freely also facilitates building complex multi-step instructions reducing complexity computer circuits writing microcode often called microprogramming microcode particular processor implementation sometimes called microprogram extensive microcoding allows small simple microarchitectures emulate powerful architectures wider word length execution units relatively simple way achieve software compatibility different products processor family
|
Programming language topics
|
messaging security messaging security program provides protection companies messaging infrastructure programs includes ip reputation-based anti-spam pattern-based anti-spam administrator defined block/allow lists mail antivirus zero-hour malware detection email intrusion prevention
|
Computer security
|
h.e.r.o h.e.r.o standing helicopter emergency rescue operation video game written john van ryzin published activision atari 2600 march 1984 ported apple ii atari 5200 atari 8-bit family colecovision commodore 64 msx zx spectrum sega released version game sg-1000 console japan 1985 gameplay identical sega changed backpack helicopter jetpack player uses helicopter backpack tools rescue victims trapped deep mine mine made multiple screens using flip screen style player assumes control roderick hero sometimes styled r. hero one-man rescue team miners working mount leone trapped roderick reach player equipped backpack-mounted helicopter unit allows hover fly along helmet-mounted laser limited supply dynamite level consists maze mine shafts roderick must safely navigate order reach miner trapped bottom backpack limited amount power player must reach miner power supply exhausted mine shafts may blocked cave-ins magma require dynamite clear helmet laser also destroy cave-ins slowly dynamite unlike cave-in magma lethal touched later levels include walls magma openings alternate open closed requiring skillful navigation mine shafts populated spiders bats unknown creatures deadly touch creatures destroyed using laser dynamite deep mines flooded forcing players hover safely water later levels monsters strike water mine sections illuminated lanterns lantern somehow destroyed layout section becomes invisible exploding dynamite lights mine brief time points scored cave-in cleared creature destroyed player reaches miner points awarded rescue along amount power remaining backpack remaining stick dynamite extra lives awarded every 20,000 points scored review colecovision port electronic games wrote activision wisely used superior graphics cv units provide breathtaking underground panorama concluded congrats activision h.e.r.o real champion june 1987 issue zzap 64 julian rignall wrote—of c64 version— hero looks awful sounds terrible plays absolutely beautifully h.e.r.o included retrogaming compilation activision anthology 1985 analog computing published clone called r.o.t.o atari 8-bit family
|
Computer architecture
|
x.21 x.21 sometimes referred x21 interface specification differential communications introduced mid-1970s itu-t. x.21 first introduced means provide digital signaling interface telecommunications carriers customers equipment includes specifications dte/dce physical interface elements alignment call control characters error checking elements call control phase circuit switching services test loops x.21 used v.11 provides synchronous data transmission rates 600 bit/s 10 mbit/s also variant x.21 used select legacy applications “ circuit switched x.21 ” x.21 normally found 15-pin d-sub connector capable running full-duplex data transmissions signal element timing clock provided carrier telephone company responsible correct clocking data x.21 primarily used europe japan example scandinavian datex german datex-l circuit switched networks 1980s article based x.21 foldoc x.21 pinouts used
|
Internet protocols
|
dan roth dan roth eduardo d. glandt distinguished professor computer information science university pennsylvania roth got b.a summa cum laude mathematics technion israel ph.d computer science harvard university 1995 taught university illinois urbana-champaign 1998 2017 moving university pennsylvania roth fellow american association advancement science aaas association computing machinery acm association advancement artificial intelligence aaai association computational linguistics acl roth ’ research focuses computational foundations intelligent behavior develops theories systems pertaining intelligent behavior using unified methodology heart idea learning central role intelligence work centers around study machine learning inference methods facilitate natural language understanding pursued several interrelated lines work span multiple aspects problem fundamental questions learning inference interact study range natural language processing nlp problems developing advanced machine learning based tools natural language applications roth made seminal contribution fusion learning reasoning machine learning weak incidental supervision machine learning inference approaches natural language understanding roth worked probabilistic reasoning including complexity probabilistic lifted inference constrained conditional models ilp formulations nlp problems constraints-driven learning part-based constellation methods object recognition response based learning developed nlp information extraction tools used broadly researchers commercially including ner coreference resolution wikification srl esl text correction roth editor-in-chief journal artificial intelligence research jair
|
Computational linguistics
|
business cloud business cloud api enabled self-service platform developed domo provides array services like data connection data visualization domo inc. founded 2010 josh james also co-founded web analytics software company omniture 1996 took public 2006 domo launched domo appstore 1000 apps social mobile capabilities 2016 appstore creates network business apps ecosystem companies single integrated business cloud decision came domo announced 131 million round funding blackrock according company concept behind business cloud connect smaller clouds relating apps functional areas business single business cloud allows self-service social features customers business cloud offered free service claimed world first business cloud domo appstore one core services free package includes domo features functionality including domo platform domo apps visualizations alerts company directories org charts profiles tasks domo mobile business cloud allows customers leverage preferred cloud well on-premises software monitor aspects business routine company supported 500 million fund investors world
|
Distributed computing architecture
|
tcpware tcpware third party layered product published process software llc add tcp/ip capabilities openvms need product may seem obvious today back early 1990s digital equipment corporation published vms known time internal policy favoring product called decnet meanwhile many vms users governments large corporations universities discovering tcp/ip based internet required third party software enable connectivity today hp tcpip services openvms putting pressure products like tcpware one reason tcpware faded use two tcpware apis called telnet library ftp library modules allow relatively inexperienced programmer use high level language write software connect across internet useful work also quite bit legacy software relies modules good reason rewite lower packet library level
|
Internet protocols
|
emco software emco software development company founded 2001 headquartered reykjavik iceland develops network management software used automation remote administration network audit remote software deployment network monitoring permissions audit power management tasks corporate networks addition commercial products company also offers set freeware utilities system management network administration emco provides commercial solutions freeware tools automation network administration tasks remote management windows computers company products implemented windows desktop applications graphical user interface designed installed servers administrator desktops used centralized network management staff working applications must administrative access network computers order manage remotely emco products rely microsoft network infrastructure perform remote management operations thus allowing management computers within local network remote management access computers via internet provided company offers multiple freeware tools utilities used automation several typical network management tasks system problems troubleshooting free network applications designed network administrators need collect information perform certain operations remote computers free system utilities used administration staff individual users resolve number problems personal computers company offers freeware commercial tools used monitor state network hosts devices company offers two types remote deployment solutions types allow installing uninstalling applications windows computers across local network use different deployment approaches functional differences
|
Computer security
|
cisco systems vpn client cisco systems vpn client software application connecting virtual private networks based internet key exchange version 1 july 29 2011 cisco announced end life product product updates released july 30 2012 support ceased july 29 2014 support page documentation links taken july 30 2016 replaced obsolete status notification software free often installed university business computers accordance site-license corporate licenses administrators allowed freely distribute software users within network open-source vpnc client connect vpns supported official client vpn client 4.9.01.0230 beta added support mac os x 10.6 stable version 4.9.01.0180 appears lack support 4.9.00.0050 explicitly support versions mac os x later 10.5 vpn client 5.0.07.0290 added support 64-bit versions windows vista windows 7 client uses profile configuration files .pcf store vpn passwords either hashed type 7 stored plaintext vulnerability identified passwords easily decoded using software online services work around issues network administrators advised use mutual group authentication feature use unique passwords n't related important network passwords
|
Computer security
|
alphastation alphastation name given series computer workstations produced 1994 onwards digital equipment corporation later compaq hp name suggests alphastations based dec alpha 64-bit microprocessor supported operating systems alphastations comprise tru64 unix formerly digital unix openvms windows nt alphabios arc firmware workstations also run various versions linux bsd operating systems alpha workstations produced dec include dec 2000 axp decpc axp 150 dec 3000 axp digital personal workstation -series au -series codename miata multia vx40/41/42 alpha xl/alpha xlt line member alcor family swappable daughterboard pentium processor transform dec celebris xl line xp900 onwards alphastation models simply workstation configurations corresponding alphaserver model
|
Computer architecture
|
ibm software configuration library manager ibm software configuration library manager sclm ibm software product component ispf first introduced version 3 ispf upgrade previous component called lmf library management facility introduced version 2 ispf component mvs os/390 z/os operating systems/platforms sclm consists two products library manager configuration manager provides following functions
|
Operating systems
|
simple military communications protocol standard interface multiple platform link evaluation simple military communications protocol defined nato standardization agreement stanag 5602 simple defines communications protocol provide means geographically national international separated tactical data link tdl equipment c4isr c2 non-c2 test facilities exchange environment data tdl messages order conduct detailed tdl interoperability io testing intended provide specifications common standard interconnect ground rigs types simulation integration facilities simple allows transmission m-series j-series messages ip-based protocols previously j-series messages could sent using link 16 protocol however link 16 radio protocol frequency range limits exchange information within line-of-sight use flexible bearer protocols ip makes easier exchange j-series data particularly simulations integration however simple limited use simulation integration finding applications beyond original purpose wherever transmission j-series data amenable radio protocols link 16 simple standard specifies distributed transfer simulated scenario/synthetic environment using ieee distributed interactive simulation dis protocols dis government/industry initiative define infrastructure linking simulations various types multiple locations create realistic complex virtual worlds simulation highly interactive activities new protocol data unit pdu definition dis pdu added baseline protocol support exchange dis pdus simulated entities content simple dis pdu packet related dis pdus defined ieee 1278.1 standard transmitter signal pdu fields require translation simple standard consists several elements simple application layer protocol designed independent transport layer run using following transport layer protocols simple method exchanging tdl messages take host generated message traffic mids/jtids terminal interface repackage transmission across simple network receiving simple node extracts tdl message traffic received packet presents host interface received mids/jtids terminal development simple resulted requirement february 1996 ad hoc working group ahwg nato common interoperability standards ncis testing single interface standard support interconnection nato resources
|
Internet protocols
|
xaml browser applications xaml browser applications xbap pronounced ex-bap windows presentation foundation .xbap applications hosted run inside web browser firefox internet explorer hosted applications run partial trust sandbox environment given full access computer resources like opening new network connection saving file computer disk wpf functionality available hosted environment intended protect computer malicious applications however also run full trust mode client changing permission starting xbap html page seamless security installation prompt although one perceives application running browser actually runs out-of-process executable presentationhost.exe managed virtual machine initial release .net framework 3.0 xbaps ran internet explorer release .net framework 3.5 sp1 includes xbap extension also run mozilla firefox xbap applications certain restrictions .net features use since run partial trust restricted set permission granted internetzone application nearly standard wpf functionality however around 99 available xbap application therefore wpf ui features available starting february 2009 xbap applications longer function run internet attempting run xbap cause browser present generic error message option exists internet explorer 9 used allow applications run must done care increases potential attack surface security vulnerabilities xbap
|
Operating systems
|
low orbit ion cannon low orbit ion cannon loic open-source network stress testing denial-of-service attack application written c loic initially developed praetox technologies later released public domain hosted several open source platforms loic performs dos attack used multiple individuals ddos attack target site flooding server tcp udp packets intention disrupting service particular host people used loic join voluntary botnets software inspired creation independent javascript version called js loic well loic-derived web version called low orbit web cannon enable dos web browser security experts quoted bbc indicated well-written firewall rules filter traffic ddos attacks loic thus preventing attacks fully effective least one instance filtering udp icmp traffic blocked loic attack internet service providers provide less bandwidth customers order provide guaranteed service levels customers firewall rules sort likely effective implemented point upstream application server internet uplink words easy cause isp drop traffic destined customer sending greater amount traffic allowed customer link filtration occurs customer side traffic traverses link stop service provider dropping excess traffic destined customer loic attacks easily identified system logs attack tracked ip addresses used loic used anonymous group spawned /b/ board 4chan project chanology attack websites church scientology successfully attack recording industry association america website october 2010 used anonymous operation payback december 2010 attack websites companies organizations opposed wikileaks retaliation shutdown file sharing service megaupload arrest four workers members anonymous launched ddos attack upon websites universal music group company responsible lawsuit megaupload united states department justice united states copyright office federal bureau investigation mpaa warner music group riaa well hadopi afternoon january 19 2012 loic general attack hoped retaliate anonymous members believed harmed digital freedoms loic application named ion cannon fictional weapon many sci-fi works video games particular namesake command conquer series downloading using loic personal servers means stress-testing perfectly legal least united states using program perform ddos attack someone else could considered felony computer fraud abuse act 1986 cfaa charge could land someone 20 years imprisonment fine
|
Computer security
|
kixtart kixtart closed source free-format scripting language windows described logon script processor enhanced batch scripting language official website name portmanteau kick start kixtart developed ruud van velsen microsoft netherlands provided careware development started 1991 provide login scripting microsoft lan manager environment rich built-in functionality easy scripting provides access adsi ado wmi etc language used display information set environment variables start programs connect network drives read edit registry change current drive directory much kixforms user create gui kixtart read windows product id development kixtart logon scripting language started 1991 later versions released dates kixtart 2001 kixtart 2010
|
Programming language topics
|
sqlobject sqlobject python object-relational mapper sql database python objects experiencing community popularity forms part many applications e.g. turbogears similar ruby rails activerecord operation uses class definitions form table schemas utilizes language reflection dynamism useful sqlobject supports number common database backends included distribution mysql postgresql sqlite sybase sql server maxdb microsoft sql server firebird first version sqlobject publicly released october 2002
|
Databases
|
sisc sisc r5rs scheme implementation includes full number tower hygienic macros proper tail recursion first class continuations sisc short second interpreter scheme code reference predecessor lisc lightweight interpreter scheme code sisc free software dual-licensed mozilla public license gnu general public license version 2 developed scott g. miller matthias radestock sisc depends sun microsystems java programming language platform runtime environment allows sisc provide many extensions libraries networking exception handling module system java foreign function interface sisc website claims performs faster scheme interpreter based java virtual machine jvm like gnu guile scheme suitable embedding larger programs guile designed inclusion c programs sisc designed jvm
|
Programming language topics
|
sun ultra series sun ultra series discontinued line workstation server computers developed sold sun microsystems comprising two distinct generations original line introduced 1995 discontinued 2001 generation partially replaced sun blade 2000 line replaced sun java workstation—an amd opteron system—in 2004 sync transition x86-64-architecture processors 2005 ultra brand later revived launch ultra 20 ultra 40 albeit confusion since longer based ultrasparc processors original ultra workstations ultra enterprise later sun enterprise servers ultrasparc-based systems produced 1995 2001 replacing earlier sparcstation sparccenter/sparcserver series respectively introduced 64-bit ultrasparc processor later versions lower-cost pc-derived technology pci ata buses initial ultra 1 2 models retained sbus predecessors original ultra range sold dot com boom became one biggest selling series computers ever developed sun microsystems many companies organisations—including sun itself—relying sun ultra products years successor products released ultra brand revived 2005 launch ultra 20 ultra 40 x86-64-architecture x64-based ultra systems remained sun portfolio five years last one intel xeon-based ultra 27 retired june 2010 thereby concluding history sun workstation vendor sparc-based ultra 3 mobile workstation laptop released 2005 well would prove short-lived design retired next year release coincide rest line brand already moved x86 additionally new ultra 25 ultra 45 desktop ultrasparc iiii-based systems introduced 2006 october 2008 sun discontinued effectively ending production sparc architecture workstations original ultra/enterprise series later replaced sun blade workstation sun fire server ranges note enterprise 220r ultra 60 motherboard rack-mountable server chassis hot-swappable power supplies similarly enterprise 420r ultra 80 motherboard server chassis intervening time gap sun workstations named sun blade sun java workstation a60 ultra-3 rebadged tadpole sparcle 550 650 mhz viper 1.2 ghz laptops a61 ultra-3 physically different based naturetech 888p 550/650 mhz mesostation 999 1.28 ghz two lines unrelated systems otherwise
|
Computer architecture
|
iphone iphone line smartphones designed marketed apple inc. generations iphone use apple ios mobile operating system software first-generation iphone released june 29 2007 multiple new hardware iterations new ios releases released since user interface built around device multi-touch screen including virtual keyboard iphone wi-fi connect cellular networks iphone take photos play music send receive email browse web send receive text messages record notes perform mathematical calculations receive visual voicemail shooting video also became standard feature iphone 3gs functionality video games reference works social networking enabled downloading mobile apps apple app store contained 2.2 million applications available iphone apple released twelve generations iphone models accompanied one twelve major releases ios operating system first-generation iphone gsm phone established design precedents button placement persisted throughout releases screen size maintained next four iterations iphone 3g added 3g network support followed iphone 3gs improved hardware iphone 4 metal chassis higher display resolution front-facing camera iphone 4s improved hardware voice assistant siri iphone 5 featured taller 4-inch display apple newly introduced lightning connector 2013 apple released iphone 5s improved hardware fingerprint reader lower-cost iphone 5c version 5 colored plastic casings instead metal followed larger iphone 6 iphone 6 plus models featuring displays iphone 6s introduced following year featured hardware upgrades support pressure-sensitive touch inputs well iphone se—which featured hardware 6s smaller form factor 5s 2016 apple unveiled iphone 7 iphone 7 plus add water resistance improved system graphics performance new rear dual-camera setup plus model new color options removing 3.5 mm headphone jack found previous models iphone 8 iphone 8 plus released 2017 adding glass back improved screen camera iphone x released alongside iphone 8 iphone 8 plus highlights near bezel-less design improved camera new facial recognition system named face id home button therefore touch id september 2018 apple released 3 new iphones iphone xs upgraded version since discontinued iphone x iphone xs max larger variant series biggest display iphone xr lower end version iphone x first-generation iphone described revolutionary game-changer mobile phone industry subsequent iterations iphone also garnered praise iphone one widely used smartphones world success credited helping apple become one world valuable publicly traded companies november 1 2018 total 2.2 billion iphones sold development become iphone began 2004 apple started gather team 1,000 employees including jonathan ive designer behind imac ipod work highly confidential project purple apple ceo steve jobs steered original focus away tablet apple eventually revisited form ipad towards phone apple created device secretive collaboration cingular wireless became mobility time—at estimated development cost us 150 million thirty months according steve jobs word imac therefore ipod iphone ipad stands internet individual instruct inform inspire apple rejected design committee approach yielded motorola rokr e1 largely unsuccessful collaboration motorola among deficiencies rokr e1 firmware limited storage 100 itunes songs avoid competing apple ipod nano cingular gave apple liberty develop iphone hardware software in-house even paid apple fraction monthly service revenue iphone 3g exchange four years exclusive us sales 2011 jobs unveiled iphone public january 9 2007 macworld 2007 convention moscone center san francisco two initial models 4 gb model priced us 499 8 gb model us 599 requiring two-year contract went sale united states june 29 2007 6:00 pm local time hundreds customers lined outside stores nationwide passionate reaction launch iphone resulted sections media dubbing 'jesus phone following successful release us first generation iphone made available uk france germany november 2007 ireland austria spring 2008 july 11 2008 apple released iphone 3g twenty-two countries including original six apple released iphone 3g upwards eighty countries territories apple announced iphone 3gs june 8 2009 along plans release later june july august starting us canada major european countries june 19 many would-be users objected iphone cost 40 users household incomes us 100,000 back original first generation iphone made aluminum black plastic accent iphone 3g 3gs feature full plastic back increase strength gsm signal iphone 3g available 8 gb black model black white option 16 gb model iphone 3gs available colors regardless storage capacity iphone 4 aluminosilicate glass front back stainless steel edge serves antennas first available black white version announced released april 2011 10 months later users iphone 4 reported dropped/disconnected telephone calls holding phones certain way became known antennagate january 11 2011 verizon announced media event reached agreement apple would begin selling cdma iphone 4 verizon said would available pre-order february 3 release set february 10 february 2011 verizon iphone accounted 4.5 iphone ad impressions us millennial media mobile ad network 2007 2011 apple spent 647 million advertising iphone us tuesday september 27 apple sent invitations press event held october 4 2011 10:00 cupertino headquarters announce details next generation iphone turned iphone 4s 1 million 4s models sold first 24 hours release october 2011 due large volumes iphone manufactured high selling price apple became largest mobile handset vendor world revenue 2011 surpassing long-time leader nokia american carrier c spire wireless announced would carrying iphone 4s october 19 2011 january 2012 apple reported best quarterly earnings ever 53 revenue coming sale 37 million iphones average selling price nearly 660 average selling price remained fairly constant phone lifespan hovering 622 660 production price iphone 4s estimated ihs isuppli october 2011 188 207 245 16 gb 32 gb 64 gb models respectively labor costs estimated 12.50 30 per unit workers iphone assembly line making 1.78 hour february 2012 comscore reported 12.4 us mobile subscribers used iphone approximately 6.4 million iphones active us alone september 12 2012 apple announced iphone 5 4-inch display predecessors 3.5-inch screen device comes 326 pixels per inch found iphone 4 4s iphone 5 soc a6 processor chip 22 smaller iphone 4s a5 twice fast doubling graphics performance predecessor device 18 thinner iphone 4s measuring 20 lighter july 6 2013 reported apple talks korean mobile carrier sk telecom release next generation iphone lte advanced technology july 22 2013 company suppliers said apple testing larger screens iphone ipad apple asked prototype smartphone screens larger four inches also asked screen designs new tablet device measuring slightly less 13 inches diagonally said september 10 2013 apple unveiled two new iphone models highly anticipated press event cupertino iphone 5c mid-range-priced version handset designed increase accessibility due price available five colors green blue yellow pink white made plastic iphone 5s comes three colors black white gold home button replaced fingerprint scanner touch id phones shipped september 20 2013 september 9 2014 apple revealed iphone 6 iphone 6 plus event cupertino devices larger screen predecessor 4.7 5.5 inches respectively 2016 apple unveiled iphone 7 7 plus added water dust resistance improved system graphics performance new dual-camera setup plus model new color options featured removal 3.5 mm headphone jack iphone september 12 2017 apple officially unveiled iphone 8 8 plus features new glass design camera improvements true tone display wireless charging improved system performance also unveiled iphone x features near bezel-less design facial recognition feature dubbed face id facial tracking used animojis oled screen highest pixel density iphone new telephoto lens works better low light conditions improved cameras ar september 12 2018 apple officially unveiled iphone xs xs max xr steve jobs theater apple park xs xs max feature improved super retina display dolby vision hdr10 support xs max featuring larger 6.5 display improved cameras smart hdr a12 bionic chip iphone xs xs max ip68 water liquid dust resistant allow devices submerged 2 meters duration 30 minutes iphone xr retained ip67 certification found first-generation iphone x also features ips lcd display instead oled displays found higher end models iphone xs/xs max ip68 certifications tested using various liquids chlorinated-water salt water tea wine beer juices apple also announced fourth generation apple watch apple watch series 4 apple sold 6.1 million first generation iphone units five quarters sales fourth quarter 2008 temporarily surpassed research motion rim blackberry sales 5.2 million units briefly made apple third largest mobile phone manufacturer revenue nokia samsung however income deferred recorded sales grew steadily thereafter end fiscal year 2010 total 73.5 million iphones sold 2010 iphone market share barely 4 cell phones however apple pulled 50 total profit global cellphone sales generated apple sold 14.1 million iphones third quarter 2010 representing 91 unit growth year-ago quarter well ahead idc latest published estimate 64 growth global smartphone market september quarter apple sales surpassed research motion 12.1 million blackberry units sold recent quarter ended august 2010 united states market alone third quarter 2010 9.1 million android-powered smartphones shipped 43.6 market apple ios number two phone operating system 26.2 5.5 million iphones sold made popular single device march 2 2011 ipad 2 launch event apple announced sold 100 million iphones worldwide result success iphone sales volume high selling price headlined iphone 4s apple became largest mobile handset vendor world revenue 2011 surpassing long-time leader nokia samsung galaxy ii proved popular iphone 4s parts europe iphone 4s dominant united states january 2012 apple reported best quarterly earnings ever 53 revenue coming sale 37 million iphones average selling price nearly 660 average selling price remained fairly constant phone lifespan hovering 622 660 eight largest phone manufacturers q1 2012 according horace dediu asymco apple samsung combined take 99 industry profits htc took remaining 1 rim lg sony ericsson motorola nokia suffered losses apple earning 73 cents every dollar earned phone makers industry profits grew 5.3 billion first quarter 2010 14.4 billion first quarter 2012 quadruple profits 2007 apple managed increase share profits due increasing carrier subsidies high selling prices iphone negative effect wireless carriers mobility verizon sprint seen ebitda service margins drop sold increasing number iphones quarter ended march 31 2012 apple sales iphone alone 22.7 billion exceeded total microsoft businesses 17.4 billion fourth quarter 2012 iphone 5 iphone 4s best-selling handsets sales 27.4 million 13 smartphones worldwide 17.4 million units respectively samsung galaxy iii third 15.4 million according strategy analytics data impressive performance given iphone portfolio premium pricing adding galaxy iii global popularity appears peaked galaxy iii touted iphone-killer press released samsung led worldwide sales smartphones apple iphone line still managed top samsung smartphone offerings united states 21.4 share 37.8 market respectively ios grew 3.5 37.8 android slid 1.3 fall 52.3 share continued top popularity iphone despite growing android competition also attributed apple able deliver ios updates air android updates frequently impeded carrier testing requirements hardware tailoring forcing consumers purchase new android smartphone get latest version os however 2013 apple market share fallen 13.1 due surging popularity android offerings apple announced september 1 2013 iphone trade-in program would implemented 250 specialty stores us program become available customers must valid contract must purchase new phone rather simply receive credit used later date significant part program goal increase number customers purchase iphones apple stores rather carrier stores september 20 2013 sales date iphone 5s 5c models longest ever queue observed new york city flagship apple store addition prominent queues san francisco us canada however locations throughout world identified anticipation corresponding consumers apple also increased production gold-colored iphone 5s additional one-third due particularly strong demand emerged apple decided introduce gold model finding gold seen popular sign luxury product among chinese customers apple released opening weekend sales results 5c 5s models showing all-time high product sales figures ninemillion handsets sold—the previous record set 2012 fivemillion handsets sold opening weekend 5 model first time apple simultaneously launched two models inclusion china list markets contributed record sales result apple also announced 200 million devices running ios 7 update making fastest software upgrade history apple store located christiana mall newark delaware us claimed highest iphones sales figures november 2013 store high sales results due absence sales tax state delaware finalization deal apple china mobile world largest mobile network announced late december 2013 multi-year agreement provides iphone access 760 million china mobile subscribers first quarter 2014 apple reported sold 51million iphones all-time quarterly record compared 47.8million year-ago quarter iphone upgrade program 24-month program designed consumers able get latest iphone every year without paying whole price up-front program consists low monthly payments consumers gradually pay iphone 24-month period opportunity switch upgrade new iphone 12 months payment passed 12 months passed consumers trade current iphone new one payments transferred old device new device program restarts new 24-month period additional features program include unlocked handsets means consumers free pick network carrier want two-year applecare+ protection includes hardware repairs software support coverage two incidents accidental damage criticism program includes potential endless cycle payments huffington post damon beres writing complete full 24-month payment cycle 're stuck outdated phone upgrade every 12 months 'll never stop owing apple money iphones additionally program limited iphone hardware cell phone service network operator included release iphone handset manufacturers nokia motorola enjoying record sales cell phones based fashion brand rather technological innovation smartphone market dominated time blackberry os windows mobile devices staid corporate-led smartphone paradigm focused enterprise needs phones time designed around carrier business limits conservative regards bandwidth usage battery life phones sold large number models often segmented marketing strategy confusing customers sapping engineering resources example phones marketed business often deliberately stripped cameras ability play music games apple approach deliberately simplify product line offering one model year customers making expensive high-end product apple marketing developing success ipod campaigns allowed phone become mass-market product many buyers launch day market research found unusually technology product iphone users disproportionately female ars technica noted 2012 apple avoided 'patronizing marketing female customers practice used often sell low-quality high-priced products many competitors then-ceo research motion mike lazaridis pried open iphone impression mac stuffed cellphone used much memory processing power smartphones market time capacitive touchscreen consumer-friendly design iphone fundamentally changed mobile industry steve jobs proclaiming 2007 phone communication tool way life dominant mobile operating systems time symbian blackberry os windows mobile designed handle additional tasks beyond communication basic functions operating systems never focused applications developers due infighting among manufacturers well complexity developing low-memory hardware never developed thriving ecosystem like apple app store android google play iphone os renamed ios 2010 designed robust os capabilities multitasking graphics order meet future consumer demands many services provided mobile carriers often extensively customized devices meanwhile apple decision base os os x unexpected benefit allowing os x developers rapidly expand ios development rival manufacturers forced spend software development costs catch iphone iphone success led decline sales high-end fashion phones business-oriented smartphones vertu blackberry well nokia nokia realised limitations operating system symbian attempted develop advanced system maemo without success ultimately agreed technology-sharing deal takeover microsoft prior iphone handsets viewed largely cheap disposable lures massively subsidized snare subscribers lock using carriers proprietary services however according wired apple retained complete control design manufacturing marketing iphone meaning carrier would control software updates extension security patches contrast google allowed carriers oems dictate pace upgrades pre-load phones software top android result many android oems often lag months behind google release next iteration android although nexus pixel devices guaranteed two years operating system updates third addition year security however apple supported older iterations iphones four years december 2017 reports apple using policy slowing speed older iphones issuing operating system upgrades spurred allegations firm using tactic prompt users older iphones buy newer models iphone 4 iphone models well ios devices manufactured exclusively foxconn based taiwan 2011 tim cook became ceo company apple changed outsourcing strategy first time increasing supply partners iphone 4s 2012 first model manufactured simultaneously two stand-alone companies foxconn well pegatron also based taiwan although foxconn still responsible larger share production pegatron orders slowly increased company tasked producing part iphone 5c line 2013 30 iphone 6 devices 2014 6 plus model produced solely foxconn touchscreen first five generations 9 cm 3.5 liquid crystal display scratch-resistant glass one iphone 5 four inches capacitive touchscreen designed bare finger multiple fingers multi-touch sensing screens first three generations resolution 320×480 hvga 163 ppi iphone 4 iphone 4s resolution 640×960 326 ppi 4-inch models 640×1136 326 ppi 4.7-inch models 750×1334 326 ppi 5.5-inch models 1080×1920 401 ppi 5.8-inch model x 1125×2436 458 ppi initial models using twisted-nematic tn lcds starting iphone 4 technology changed in-plane switching ips lcds iphone 5 model screen results aspect ratio approximately 16:9 iphone x first iphone use oled display near bezel-less screen ≈19.5:9 aspect ratio touch gesture features iphone based technology originally developed fingerworks gloves styli prevent necessary electrical conductivity although capacitive styli used iphone finger-touch screen iphone 3gs later also feature fingerprint-resistant oleophobic coating iphone minimal hardware user interface models featuring five buttons physical menu button situated directly display called home button primary function close active app navigates home screen interface earlier models included rounded square reminiscent shape icons home screen however new models include apple fingerprint recognition feature touch id use home button fingerprint sensor symbol iphone x later n't home button instead face id facial recognition authentication method multi-function sleep/wake button located top device serves unit power button also controls phone calls call received pressing sleep/wake button silences ringtone pressed twice transfers call voicemail situated left spine volume adjustment controls iphone 4 two separate circular buttons increase decrease volume earlier models house two switches single plastic panel known rocker switch could reasonably counted either one two buttons directly volume controls ring/silent switch engaged mutes telephone ringing alert sounds new sent emails text messages push notifications camera shutter sounds voice memo sound effects phone lock/unlock sounds keyboard clicks spoken auto-corrections switch mute alarm sounds clock application countries regions mute camera shutter voice memo sound effects buttons except home made plastic original first generation iphone metal later models touchscreen furnishes remainder user interface software update january 2008 allowed first-generation iphone use cell tower wi-fi network locations trilateration despite lacking gps hardware since iphone 3g generation iphone employs a-gps operated united states since iphone 4s generation device also supports glonass global positioning system operated russia since iphone 8 supports galileo iphone 6s 6s plus introduced 2015 feature 3d touch displays allows screen recognize hard pressed using pressure sensitive multi-touch technology subsequent iphones exception iphone se iphone xr feature example technology used lightly pressing screen preview photograph pressing take iphones feature number sensors used adjust screen based operating conditions enable motion-controlled games location-based services unlock phone authenticate purchases apple pay among many things proximity sensor deactivates display touchscreen device brought near face call done save battery power prevent inadvertent inputs user face ears ambient light sensor adjusts display brightness saves battery power prevents screen bright dark 3-axis accelerometer senses orientation phone changes screen accordingly allowing user easily switch portrait landscape mode photo browsing web browsing music playing support upright left right widescreen orientations unlike ipad iphone rotate screen turned upside-down home button screen unless running program specifically designed 3.0 update added landscape support still applications email introduced shaking unit form input generally undo functionality accelerometer also used control third-party apps notably games also used fitness tracking purposes primarily pedometer starting iphone 5s functionality included m7 motion coprocessor subsequent revisions embedded chip magnetometer built-in since iphone 3gs used measure strength direction magnetic field vicinity device sometimes certain devices radio signals interfere magnetometer requiring users either move away interference re-calibrate moving device figure-eight motion since iphone 3gs iphone also features compass app unique time release showing compass points direction magnetic field beginning iphone 4 apple smartphones also include gyroscopic sensor enhancing perception moved previous iphone models contained chip capable receiving radio signals however apple fm radio feature switched antenna connected chip later iterations iphone starting iphone 7 however contain radio chips campaign called free radio phone started encourage cellphone manufacturers apple enable radio phones manufacture reasons cited radio drains less power useful emergency 2016 fort mcmurray wildfire 2017 iphone models starting iphone 5s excluding iphone 5c featured apple fingerprint recognition sensor used unlocking device authenticating apple pay purchases since iphone 6 using touch id located home button touch id replaced face id starting iphone x included iphone 6 later excluding iphone se barometer used determine air pressure elevation device starting iphone x facial recognition sensor named truedepth camera system featured used unlocking device authenticating purchases using face id also used animojis ar bottom iphone speaker left dock connector microphone right additional loudspeaker screen serves earpiece phone calls iphone 4 includes additional microphone top unit noise cancellation switches placement microphone speaker base unit—the speaker right volume controls located left side iphone models slider ipod application 3.5 mm trrs connector headphones located top left corner device first five generations original 4s time moved bottom left corner headphone socket first-generation iphone recessed casing making incompatible headsets without use adapter subsequent generations eliminated problem using flush-mounted headphone socket cars equipped auxiliary jack allow handsfree use iphone driving substitute bluetooth iphone 7 later 3.5 mm headphone jack instead headsets must connect iphone bluetooth use apple lightning port replaced 3.5 mm headphone jack traditional headsets use lightning 3.5 mm headphone jack adapter included iphone 7 iphone x plugs lightning port apple headset multipurpose button near microphone play pause music skip tracks answer end phone calls without touching iphone third-party headsets designed iphone also include microphone control button current headsets also provide volume controls compatible recent models fourth ring audio jack carries extra information built-in bluetooth 2.x+edr supports wireless earpieces headphones requires hsp profile stereo audio added 3.0 update hardware supports a2dp non-sanctioned third-party solutions exist iphone officially support obex file transfer protocol lack profiles prevents iphone users exchanging multimedia files pictures music videos bluetooth-enabled cell phones composite component video 576i stereo audio output dock connector using adapter sold apple iphone 4 also supports 1024×768 vga output without audio hdmi output stereo audio via dock adapters iphone support voice recording 3.0 software update iphone features internal rechargeable lithium-ion battery like ipod unlike mobile phones time launch battery user-replaceable iphone charged connected computer syncing across included usb dock connector cable similar charging ipod alternatively usb ac adapter wall charger also included connected cable charge directly ac outlet models iphone support wireless charging apple runs tests preproduction units determine battery life apple website says battery life designed retain 80 original capacity 400 full charge discharge cycles comparable ipod batteries battery life early models iphone criticized several technology journalists insufficient less apple claims also reflected j. d. power associates customer satisfaction survey gave battery aspects iphone 3g lowest rating two five stars battery malfunctions dies prematurely phone returned apple replaced free still warranty warranty lasts one year purchase extended two years applecare battery replacement service pricing made known buyers day product launched similar apple third parties replace batteries ipods foundation taxpayer consumer rights consumer advocate group sent complaint apple fee consumers pay battery replaced apple reduced price out-of-warranty iphone battery replacement 29 since july 2007 third-party battery replacement kits available much lower price apple battery replacement program kits often include small screwdriver instruction leaflet many newer ipod models battery first generation iphone soldered therefore soldering iron required install new battery iphone 3g uses different battery fitted connector easier replace iphone x features different battery two battery cells adhesive pull tabs adhered sides instead folded top therefore making repairs little difficult patent filed corporation published late july 2013 revealed development new iphone battery system uses location data combination data user habits moderate handsets power settings accordingly apple working towards power management system provide features ability estimate length time user away power source modify energy usage detection function adjusts charging rate best suit type power source used december 28 2017 amidst many complaints older iphone models slowing new ones released apple released communication customers website acknowledging effect old batteries iphone performance company offered 29 battery replacements solution first-generation iphone iphone 3g fixed-focus 2.0-megapixel camera back digital photos optical zoom flash autofocus natively support video recording video recording possible first-generation iphone iphone 3g via third-party app available app store jailbreaking iphone os 2.0 introduced geotagging photos iphone 3gs 3.2-megapixel camera autofocus auto white balance auto macro 10 cm manufactured omnivision camera also capture 640×480 vga resolution video 30 frames per second video cropped iphone directly uploaded youtube services iphone 4 introduced 5.0-megapixel camera 2592×1936 pixels record video 720p resolution considered high-definition also backside-illuminated sensor capture pictures low light led flash stay lit recording video first iphone natively high dynamic range photography iphone 4 also second camera front take vga photos record sd video saved recordings may synced host computer attached email supported sent mms iphone 4s camera shoot 8-mp stills 1080p video accessed directly lock screen triggered using volume-up button shutter trigger built-in gyroscope stabilize image recording video iphone 5 iphone 4s running ios 6 later take panoramas using built-in camera app iphone 5 also take still photos recording video camera iphone 5 reportedly shows purple haze light source frame although consumer reports said prone purple hazing photos shot bright light source predecessor several android phones fine cameras ... five model generations phone configured bring camera app quickly pressing home key twice iphones running also accessed lock screen directly iphone 5s features true tone flash two led lights white amber improve white balance adjusted 1,000 combinations image sensor 15 percent larger previous model iphone 6 6 plus include phase detection autofocus 6 plus optical image stabilization models shoot 1080p videos 60 frames per second release ios 8 iphone 4s later models shoot time-lapse videos capability switch frame rates automatically recording increases time iphone 6s 6s plus outfitted 12 megapixel camera 4k hd video capability front-facing camera upgraded 5 megapixels user may change resolution 4k 1080p settings iphone se features 12 mp camera found iphone 6s iphone 6s plus models 4k video capability front camera 1.2 mp iphone 7 features optical image stabilization rear camera feature previously exclusive plus models 7 plus first iphone feature dual-lens cameras 12 mp models 7 mp front-facing camera second camera iphone 7 plus telephoto lens enables 2× optical zoom 10× digital zoom rear cameras 7 7 plus f/1.8 aperture also new quad-led true tone flash brighter compared predecessors iphone 8 camera remains largely predecessor features larger sensor newer color filter camera also record 4k 60 24 frames per second slow-mo 1080p 240 frames per second new camera system also enables portrait lighting defines light scene also features quad-led true tone flash 2× better light uniformity slow sync iphone x camera almost iphone 8 camera telephoto lens aperture f/2.4 optical image stabilization front camera also portrait mode portrait lighting due new truedepth camera system iphone xs xs max xr updated 12mp 1/2.55 sensor size 1.4 μm pixel size xs series telephoto lens lower end xr one lens iphone initially released two options internal storage size 4 8gb september 5 2007 apple discontinued 4gb models february 5 2008 apple added 16gb model iphone 3g available 8 16gb released 2008 iphone 3gs came 16 32gb variants remained available 8gb september 2012 three years launch iphone 4 available 16 32gb variants well 8gb variant sold alongside iphone 4s reduced price point iphone 4s available three sizes 16 32 64gb iphone 5 5s available three sizes iphone 4s 16 32 64gb.. lower-cost iphone 5c model initially available 16 32gb models 8gb model added later iphone 6 6s available three sizes launch 16 64 128gb iphone se available 16 64gb variants launch iphone 7 7 plus released apple changed base model storage capacity 16 32gb iphone 7 7 plus configurations 32 128 256gb storage apple doubled storage iphone 6s 6s plus two configurations 32 128gb well iphone se six months later iphone 8 8 plus x changed base model capacity 64gb retaining 256gb storage option iphone xs xs max introduced 512gb storage option addition existing 64 256 gb options iphone xr comes three storage options 64 128 256gb gsm models iphone use sim card identify gsm network sim sits tray inserted slot top device sim tray ejected paper clip sim ejector tool simple piece die-cut sheet metal included iphone 3g 3gs united states models elsewhere world iphone models shipped sim ejector tool fabricated alloy dubbed liquidmetal countries iphone usually sold sim lock prevents iphone used different mobile network gsm iphone 4 features microsim card located slot right side device cdma model iphone 4 cdma-only cell phone use sim card sim card slot iphone 4s activated cdma carrier however sim card slot rely sim card activation cdma network cdma-activated iphone 4s usually carrier-approved roaming sim preloaded sim slot time purchase used roaming certain carrier-approved international gsm networks sim slot locked use roaming sim card provided cdma carrier case verizon example one request sim slot unlocked international use calling support number requesting international unlock account good standing past 60 days method unlocks iphone 4s use international carriers iphone 4s unlocked way reject non international sim cards mobility t-mobile usa example iphone 5 later iphones use nano-sim order save space internally iphone xs xs max xr added esim support addition nano-sim therefore support dual sim functionality iphones well many devices apple small disc bottom headphone jack changes white red contact water iphone 3g later models also similar indicator bottom dock connector apple warranties cover water damage employees examine indicators approving warranty repair replacement however adoption water resistance feature iphone practice longer use apple iphone indicators exposed mobile phones manufacturers carry protected location beneath battery behind battery cover indicators triggered routine use owner sweat steam bathroom light environmental moisture criticism led apple change water damage policy iphones similar products allowing customers request internal inspection phone verify internal liquid damage sensors triggered iphone models include written documentation dock connector usb cable first generation 3g iphones also came cleaning cloth first generation iphone includes stereo headset earbuds microphone plastic dock hold unit upright charging syncing iphone 3g includes similar headset plus sim eject tool first generation model requires paperclip iphone 3gs includes sim eject tool revised headset adds volume buttons functional previous iphone versions iphone 3g 3gs compatible dock sold separately first generation model dock versions include usb power adapter wall charger allows iphone charge ac outlet iphone 3g iphone 3gs sold north america japan colombia ecuador peru include ultracompact usb power adapter september 2014 launch iphone 6 apple announced apple pay mobile payment system feature aimed revolutionize way users pay uses nfc chip touch id fingerprint scanner face id iphone x later apple wallet app dedicated secure element chip encrypted payment information make purchases participating stores physical online iphone models haptic engine vibrate notification alert incoming call etc iphone models iphone 4s use eccentric rotating mass motor iphone 4s uses linear resonant actuator vibrator usually uses less power creates quieter vibration however iphone 5 5c 5s uses eccentric rotating mass motor unsure apple decided switch back however iphone 6 6 plus uses linear resonant actuator vibrator iphone 6s uses taptic engine vibration haptic feedback works similar eccentric rotating mass motor iphone runs operating system known ios formerly iphone os variant darwin operating system core found macos also included core animation software component mac os x v10.5 leopard together graphics hardware iphone 3gs opengl es 2.0 responsible interface motion graphics iphone comes set bundled applications developed apple supports downloading third-party applications app store apple provides free updates operating system iphone either wirelessly itunes major new updates historically accompanied new models size operating system depends version ios 8 required 4.5 gb successor required 1.3 gb interface based around home screen graphical list available applications iphone applications normally run one time starting iphone 4 primitive version multitasking came play users could double click home button select recently opened applications however apps never ran background starting ios 7 though apps truly multitask open application runs background use although functionality still available making call listening music home screen accessed hardware button screen iphone 8 earlier iphone x later models require swipe original iphone contained following apps messages sms mms messaging calendar photos camera youtube stocks maps google maps weather voice memos notes clock calculator settings itunes store app store introduced iphone 3gs iphone 4 compass facetime gamecenter added ios 4 4.1 respectively ios 5 reminders newsstand added ipod application split separate music videos applications ios 6 added passbook well updated version maps relies data provided tomtom well sources youtube longer came pre-installed application ios 8 added health app ios 9 replaced newsstand passbook news wallet ios 10 introduces home ios 11 added files ios 12 introduces measure app uses ar technology measure objects things available devices a9 chip newer docked base screen four icons phone mail safari internet music delineate iphone main purposes january 15 2008 apple released software update 1.1.3 allowing users create web clips home screen icons resemble apps open user-defined page safari update iphone users rearrange place icons holding icon moving desired location start shaking nine adjacent home screens accessed horizontal swipe users also add delete icons dock every home screen home screen holds twenty icons first-generation iphone 3g 4 4s home screen iphone 5 holds twenty-four icons due larger screen display dock holds four icons users delete web clips third-party applications time may select certain applications transfer itunes apple default programs could removed since ios 10 update 3.0 update adds system-wide search known spotlight left first home screen almost input given touch screen understands complex gestures using multi-touch iphone interaction techniques enable user move content touch-drag motion finger example zooming web pages photos done placing two fingers screen spreading farther apart bringing closer together gesture known pinching scrolling long list menu achieved sliding finger display bottom top vice versa go back either case list moves pasted outer surface wheel slowly decelerating affected friction way interface simulates physics real object unlike previous scrollable views user pressed control move view downwards ios user pushes upwards moving plank wood floating water creating impression user directly manipulating content displayed screen user-centered interactive effects include horizontally sliding sub-selection vertically sliding keyboard bookmarks menu widgets turn around allow settings configured side menu bars found top bottom screen necessary options vary program always follow consistent style motif menu hierarchies back button top-left corner screen displays name parent folder iphone allows audio conferencing call holding call merging caller id integration cellular network features iphone functions example music playing call received music fades fades back call ended proximity sensor shuts screen touch-sensitive circuitry iphone brought close face save battery prevent unintentional touches iphone support video calling videoconferencing versions prior fourth generation one camera opposite side screen iphone 4 supports video calling using either front back camera wi-fi feature apple calls facetime voice control introduced iphone 3gs allows users say contact name number iphone dial first two models support voice dialing third-party applications iphone includes visual voicemail countries feature allowing users view list current voicemail messages on-screen without call voicemail unlike systems messages listened deleted non-chronological order choosing message on-screen list music ringtone feature introduced united states september 5 2007 users create custom ringtones songs purchased itunes store small additional fee ringtones three 30 seconds long part song fade pause half second five seconds looped loop continuously customizing done itunes apple garageband software 4.1.1 later available mac os x third-party tools release ios 6 released september 19 2012 apple added features enable user options decline phone call person calling user reply message set reminder call back later time layout music library similar ipod iphone sort media library songs artists albums videos playlists genres composers podcasts audiobooks compilations options presented alphabetically except playlists retain order itunes iphone uses large font allows users plenty room touch selection users rotate device horizontally landscape mode access cover flow like itunes feature shows different album covers scroll-through photo library scrolling achieved swiping finger across screen alternatively headset controls used pause play skip repeat tracks iphone 3gs volume changed included apple earphones voice control feature used identify track play songs playlist specific artist create genius playlist iphone supports gapless playback like fifth-generation ipods introduced 2005 iphone play digital video allowing users watch tv shows movies widescreen double-tapping switches widescreen video playback iphone allows users purchase download songs itunes store directly iphone feature originally required wi-fi network since 2012 used cellular data network iphone includes software allows user upload view email photos taken camera user zooms photos sliding two fingers apart closer together much like safari camera application also lets users view camera roll pictures taken iphone camera pictures also available photos application along transferred iphoto aperture mac photoshop windows pc internet access available iphone connected local area wi-fi wide area gsm edge network second-generation 2g wireless data standards iphone 3g introduced support third-generation umts hsdpa 3.6 iphone 4s introduced support hsupa networks 14.4 mbit/s support hsdpa 7.2 introduced iphone 3gs networks accessible iphone models include 1xrtt represented 1× status bar gprs shown gprs status bar edge shown capital e status bar umts ev-do shown 3g faster version umts 4g shown 4g symbol status bar lte shown lte status bar 5g evolution supported areas implemented stylized larger 5g reduced size capital e. 5ge uses 4x4 mimo doubling number antennas 256-qam three-way carrier aggregation true 5g expected iphone 2020 release introduced 3g july 2004 late 2007 steve jobs stated still widespread enough us chipsets energy efficient enough included iphone support 802.1x authentication system commonly used university corporate wi-fi networks added 2.0 version update default iphone ask join newly discovered wi-fi networks prompt password required alternatively join closed wi-fi networks manually iphone automatically choose strongest network connecting wi-fi instead edge available similarly iphone 3g onwards prefer 3g 2g wi-fi either wi-fi bluetooth 3g iphone 3g onwards deactivated individually airplane mode disables wireless connections overriding preferences however airplane mode one explicitly enable wi-fi and/or bluetooth modes join continue operate one networks cellular network transceivers remain safari iphone native web browser displays pages similar mac windows counterparts web pages may viewed portrait landscape mode device supports automatic zooming pinching together spreading apart fingertips screen double-tapping text images safari allow file downloads except predefined extensions iphone support flash still popular iphone introduced consequently uk advertising standards authority adjudicated advertisement claiming iphone could access parts internet withdrawn current form grounds false advertising rare public letter april 2010 apple ceo steve jobs outlined reasoning behind absence flash iphone ipad iphone supports svg css html canvas bonjour google chrome introduced ios june 26 2012 opera mini also available maps application access google maps map satellite hybrid form also generate directions two locations providing optional real-time traffic information iphone announcement jobs demonstrated feature searching nearby starbucks locations placing prank call one single tap support walking directions public transit street view added version 2.2 software update voice-guided navigation iphone 3gs iphone 4 orient map digital compass apple also developed separate application view youtube videos iphone streams videos encoding using h.264 codec simple weather stock quotes applications also tap internet iphone users access internet frequently variety places according google 2008 iphone generated 50 times search requests mobile handset according deutsche telekom ceo rené obermann average internet usage iphone customer 100 megabytes 30 times use average contract-based consumer customers nielsen found 98 iphone users use data services 88 use internet china iphone 3g iphone 3gs built distributed without wi-fi introduction verizon iphone january 2011 issue using internet phone brought public attention two us carriers internet phone could used simultaneously networks whereas verizon networks support use separately however 2014 verizon announced iphone 6 6 plus would allow simultaneous voice data lte network t-mobile sprint enabled calls wi-fi verizon soon text input iphone implements virtual keyboard touchscreen automatic spell checking correction predictive word capabilities dynamic dictionary learns new words keyboard predict word user typing complete correct accidental pressing keys near presumed desired key keys somewhat larger spaced farther apart landscape mode supported limited number applications touching section text brief time brings magnifying glass allowing users place cursor middle existing text virtual keyboard accommodate 21 languages including character recognition chinese alternative characters accents example letters alphabets languages emoji typed keyboard pressing letter two seconds selecting alternative character popup 3.0 update brought support cut copy pasting text well landscape keyboards applications iphone 4s siri allows dictation since ios 8 third party keyboards distributed app store allowed previously available jailbroken iphones iphone also features email program supports html email enables user embed photos email message pdf word excel powerpoint attachments mail messages viewed phone yahoo offers free push-email service iphone imap although push-imap pop3 mail standards also supported including microsoft exchange kerio connect first versions iphone firmware accomplished opening imap exchange server apple also licensed microsoft activesync supports platform including push email release iphone 2.0 firmware iphone sync email account settings apple mail application microsoft outlook microsoft entourage manually configured device email program access almost imap pop3 account text messages presented chronologically mailbox format similar mail places text recipients together replies text messages displayed speech bubbles similar ichat recipient name iphone built-in support email message forwarding drafts direct internal camera-to-email picture sending support multi-recipient sms added 1.1.3 software update support mms added 3.0 update original first generation iphone us september 25 2009 wwdc 2007 june 11 2007 apple announced iphone would support third-party web applications using ajax share look feel iphone interface october 17 2007 steve jobs open letter posted apple hot news weblog announced software development kit sdk would made available third-party developers february 2008 iphone sdk officially announced released march 6 2008 apple town hall facility free download apple registration allows developers develop native applications iphone ipod touch test iphone simulator however loading application onto real device possible paying apple developer connection membership fee developers free set price applications distributed app store receive 70 share developers also opt release application free pay costs release distribute application beyond membership fee app store launched release ios 2.0 july 11 2008 update free iphone users owners older ipod touches required pay us 10 developer submitted application app store apple holds firm control distribution apple halt distribution applications deems inappropriate example rich us 1000 program simply demonstrated wealth user apple criticized banning third-party applications enable functionality apple want iphone 2008 apple rejected podcaster allowed iphone users download podcasts directly iphone claiming duplicated functionality itunes apple since released software update grants capability netshare another rejected app would enabled users tether iphone laptop desktop using cellular network load data computer many carriers iphone later globally allowed tethering apple officially supported upgrade ios 3.0 mobility relative latecomer united states cases carrier charges extra tethering iphone sdk released third parties permitted design web apps would run safari unsigned native applications also available jailbroken phones ability install native applications onto iphone outside app store supported apple stated reason native applications could broken software update apple stated design software updates specifically break native applications perform sim unlocking apple passed 60 billion app downloads 140 billion app downloads app store app store 2.2million apps iphone original iphone described revolutionary game-changer mobile phone industry credited helping make apple one world valuable publicly traded companies 2011 newer iterations also received praise called best phone iphone attracts users ages besides consumer use iphone also adopted business purposes starting iphone 4s apple added accessibility feature optimize function iphone hearing aids apple released program made iphone hearing aids hearing aids deliver power-efficient high-quality digital audio experience allow user manage hearing aid right iphone made iphone hearing aids also feature live listen live listen iphone acts remote microphone sends sound made iphone hearing aid live listen help user hear conversation noisy room hear someone speaking across room braille displays ios program announced apple coinciding release iphone 3gs ipad ipod touch 3rd generation program added support 50 bluetooth wireless braille displays work ios box user needs pair keyboard device start using navigate ios device voiceover without additional software ios supports braille tables 25 languages iphone lets user know alert sent variety notice methods delivers visual vibrating alerts incoming phone facetime calls new text messages new sent mail calendar events users set led light flash incoming calls alerts incoming calls display photo caller users choose different vibration patterns even create iphone enlarge text make accessible vision-impaired users accommodate hearing-impaired users closed captioning external tty devices iphone 3gs also features white black mode voiceover screen reader zooming impaired vision mono audio limited hearing one ear apple regularly publishes voluntary product accessibility templates explicitly state compliance us regulation section 508 release ios 9 iphones users ability choose two different screen view options user choose standard view zoomed view iphone placed standard view setting icons normal size text remains zoomed view option icons screen text become slightly larger enables user customized appearance potentially help users read screen easier assistivetouch helps adapt multi-touch screen ios device user unique physical needs great assistance difficulty gestures like pinch one make accessible tap finger user create gestures customize layout assistivetouch menu user trouble pressing home button set activated onscreen tap gestures like rotate shake available even ios device mounted wheelchair guided access helps people autism attention sensory challenges stay focused task app hand guided access parent teacher therapist limit ios device stay one app disabling home button limit amount time spent app user restrict access keyboard touch input certain areas screen 21 different iphone models produced models bold current flagship devices apple filed 200 patent applications related technology behind iphone lg electronics claimed design iphone copied lg prada woo-young kwak head lg mobile handset r center said press conference consider apple copied prada phone design unveiled presented design award prize september 2006 conversely iphone also inspired share high-tech clones september 3 1993 infogear filed us trademark phone march 20 1996 applied trademark iphone phone registered march 1998 iphone registered 1999 since phone mark abandoned infogear trademarks cover communications terminals comprising computer hardware software providing integrated telephone data communications personal computer functions 1993 filing computer hardware software providing integrated telephone communication computerized global information networks 1996 filing 2000 infogear filed infringement claim owners iphones.com domain name owners iphones.com domain name challenged infringement claim northern district court california june 2000 cisco systems acquired infogear including iphone trademark september 2000 cisco systems settled owners iphones.com allowed owners keep iphones.com domain name along intellectual property rights use designation iphones.com domain name sale cellular phones cellular phones internet access wap phones handheld pdas storage devices computer equipment hardware/software digital cameras hardware/software intellectual property rights granted owners iphones.com domain name cisco systems september 2000 october 2002 apple applied iphone trademark united kingdom australia singapore european union canadian application followed october 2004 new zealand application september 2006 october 2006 singapore australian applications granted september 2006 company called ocean telecom services applied iphone trademark united states united kingdom hong kong following filing trinidad tobago ocean telecom trademark applications use exactly wording new zealand application apple assumed ocean telecom applying behalf apple canadian application opposed august 2005 canadian company called comwave applied trademark three months later comwave selling voip devices called iphone since 2004 shortly steve jobs january 9 2007 announcement apple would selling product called iphone june 2007 cisco issued statement negotiating trademark licensing apple expected apple agree final documents submitted night january 10 2007 cisco announced filed lawsuit apple infringement trademark iphone seeking injunction federal court prohibit apple using name february 2007 cisco claimed trademark lawsuit minor skirmish money interoperability february 2 2007 apple cisco announced agreed temporarily suspend litigation held settlement talks subsequently announced february 20 2007 reached agreement companies allowed use iphone name exchange exploring interoperability security consumer business communications products october 22 2009 nokia filed lawsuit apple infringement gsm umts wlan patents nokia alleges apple violating ten nokia patents since iphone initial release december 2010 reuters reported iphone ipad users suing apple inc. applications passing user information third-party advertisers without permission makers applications textplus4 paper toss weather channel dictionary.com talking tom cat pumpkin maker also named co-defendants lawsuit august 2012 apple smartphone patent lawsuit u.s. samsung world largest maker smartphones however december 6 2016 scotus reversed decision awarded nearly 400 million apple returned case federal circuit court define appropriate legal standard define article manufacture smartphone could case screen design patents relate march 2013 apple patent wraparound display revealed around april 20 2011 hidden unencrypted file iphone ios devices widely discussed media alleged file labeled consolidated.db constantly stores iphone user movement approximating geographic locations calculated triangulating nearby cell phone towers technology proven inaccurate times file released june 2010 update apple ios4 may contain almost year worth data previous versions ios stored similar information file called h-cells.plist f-secure discovered data transmitted apple twice day postulate apple using information construct global location database similar ones constructed google skyhook wardriving nevertheless unlike google latitude application performs similar task android phones file dependent upon signing specific eula even user knowledge stated 15,200 word-long terms conditions iphone apple partners licensees may collect use share precise location data including real-time geographic location user apple computer device file also automatically copied onto user computer synchronized iphone open-source application named iphonetracker turns data stored file visual map made available public april 2011 file erased without jailbreaking phone encrypted apple gave official response web site april 27 2011 questions submitted users associated press others apple clarified data small portion crowd-sourced location database cache wi-fi hotspots cell towers downloaded apple iphone making location services faster gps therefore data represent locations iphone volume data retained error apple issued update ios version 4.3.3 4.2.8 cdma iphone 4 reduced size cache stopped backed itunes erased entirely whenever location services turned upload apple also selectively disabled system services cell network search regardless july 2014 report state-owned china central television labeled iphone national security concern frequent locations feature found settings location services stores commonly visited locations locally device feature said help accuracy gps apple maps since log information locations user frequently visited however feature also keeps track number times user location dates exact times media outlets publicized instructions disabled concerned users revealed part 2013 mass surveillance disclosures american british intelligence agencies national security agency nsa government communications headquarters gchq access user data iphones blackberrys android phones respectively read almost smartphone information including sms location emails notes according article new york times titled signaling post-snowden era new iphone locks n.s.a apple developed new encryption method ios 8 described deep apple could longer comply government warrants asking customer information extracted devices throughout 2015 prosecutors united states argued u.s. government able compel decryption iphone contents 2015 san bernardino attack fbi recovered iphone 5c issued one shooters employer icloud backups phone month half shooting shooters destroyed personal phones u.s. government attempted obtain court order writs act compelling apple produce ipsw file would allow investigators brute force device passcode tim cook responded company website outlining need encryption arguing produce backdoor one device would inevitably used compromise privacy iphone users february 19 apple communicated journalists password apple id iphone changed within day government obtaining preventing apple producing workaround would target older devices see fbi–apple encryption dispute graykey manufactured grayshift unlock iphones even disabled countermeasure apple implemented usb restricted mode apple privacy policy addresses requests government agencies access customers data apple never worked government agency country create 'backdoor products services also never allowed government access servers never 2015 electronic frontier foundation awarded apple five five stars commend ing apple strong stance regarding user rights transparency privacy apple ios combination specific hardware uses crypto-shredding activating erase content settings obliterating keys 'effaceable storage renderes user data device cryptographically inaccessible apple tightly controls certain aspects iphone according jonathan zittrain emergence closed devices like iphone made computing proprietary early versions microsoft windows hacker community found many workarounds disallowed apple make difficult impossible obtain warranty service jailbreaking allows users install apps available app store modify basic functionality sim unlocking allows iphone used different carrier network however united states apple void iphone warranty unless show problem component failure linked installation placement after-market item unauthorized applications federal trade commission magnuson-moss warranty act 1975 users set restrictions parental controls apps downloaded used within iphone restrictions area requires password iphone normally prevents access media player web features unless also activated phone authorized carrier july 3 2007 jon lech johansen reported blog successfully bypassed requirement unlocked iphone features combination custom software modification itunes binary published software offsets others use unlike first generation iphone iphone 3g must activated store countries makes iphone 3g difficult impossible hack need in-store activation well huge number first-generation iphone ipod touch users upgrading iphone os 2.0 caused worldwide overload apple servers july 11 2008 day iphone 3g iphone os 2.0 updates well mobileme released update devices required connect apple servers authenticate causing many devices temporarily unusable users o2 network united kingdom however buy phone online activate via itunes previous model even required vendors usually offer activation buyer convenience us apple begun offer free shipping iphone 3g iphone 3gs available reversing in-store activation requirement best buy walmart also sell iphone iphone operating system designed run software apple-approved cryptographic signature restriction overcome jailbreaking phone involves replacing iphone firmware slightly modified version enforce signature check may circumvention apple technical protection measures apple statement united states copyright office response electronic frontier foundation eff lobbying dmca exception kind hacking claimed jailbreaking iphone would copyright infringement due necessary modification system software however 2010 jailbreaking declared officially legal united states dmca jailbroken iphones may susceptible computer viruses incidents reported ios android 2.3.3 'gingerbread may set dual boot jailbroken iphone help openiboot idroid 2007 2010 2011 developers released series tools called jailbreakme used security vulnerabilities mobile safari rendering jailbreak device allows users install compatible software device instead app store apps exploits quickly fixed ios updates apple theoretically flaws could also used malicious purposes july 2011 apple released ios 4.3.5 4.2.10 cdma iphone fix security vulnerability certificate validation following release iphone 5s model group german hackers called chaos computer club announced september 21 2013 bypassed apple new touch id fingerprint sensor using easy everyday means group explained security system defeated photographing fingerprint glass surface using captured image verification spokesman group stated hope finally puts rest illusions people fingerprint biometrics plain stupid use something ca n't change leave everywhere every day security token iphones still sold sim lock restricts use phone one particular carrier common practice subsidized gsm phones unlike gsm phones however phone officially unlocked entering code locked/unlocked state maintained apple servers per imei set iphone activated iphone initially sold us network sim lock place various hackers found methods unlock phone specific network although sprint t-mobile verizon authorized iphone carriers united states unlocked iphones used carriers example unlocked iphone may used t-mobile network us unlocked iphone compatible t-mobile voice network may able make use 3g functionality i.e mobile web e-mail etc. quarter original first generation iphones sold us registered apple speculates likely shipped overseas unlocked lucrative market iphone 3g worldwide release march 26 2009 united states began selling iphone without contract though still sim-locked network up-front purchase price iphone units often twice expensive bundled contracts outside united states policies differ especially us territories insular areas like guam gta teleguam exclusive carrier iphone since introduction none four us carriers sprint t-mobile verizon presence area since 2013 docomo pacific ended gta exclusivity starting iphone 5 beginning april 8 2012 began offering factory sim unlock option apple calls whitelisting allowing used carrier phone supports iphone owners reported verizon 4g lte phones come factory unlocked discovery verizon announced 4g lte phones including iphones would remain unlocked due regulations fcc placed 700 mhz c-block spectrum used verizon united kingdom o2 ee 3 vodafone tesco mobile sell device subsidised contracts use pay go locked network initially though usually unlocked either certain period contract length passed small fee exception 3 network unlock device time charge however current versions iphone available purchase sim-free apple store apple online store consequently unlocked use gsm network iphones purchased full retail price apple store online apple.com come unlocked allows customer selection carriers iphones sold canada purchased mobile carries telus rogers bell locked respective networks unlocking required visiting carrier store paying unlocking fee third party methods unlock iphones existed highly unreliable sometimes rendered phones unusable however 2017 crtc abolished sim-locking required mobile devices sold december 1 2017 come unlocked crtc also mandated carriers must offer unlocking services existing devices free consumers regardless whether purchased phone three major carriers australia optus telstra vodafone offer legitimate unlocking cost iphone devices current prior models internationally policies vary many carriers sell iphone unlocked full retail price 2003 four years iphone officially introduced trademark ifone registered mexico communications systems services company ifone apple tried gain control brandname mexican court denied request case began 2009 mexican firm sued apple supreme court mexico upheld ifone rightful owner held apple iphone trademark violation brazil brand iphone registered 2000 company called gradiente eletrônica s.a. igb eletrônica s.a according filing gradiente foresaw revolution convergence voice data internet time brazil final battle brandname concluded 2008 december 18 2012 igb launched line android smartphones tradename exclusive rights local market february 2013 brazilian patent trademark office known instituto nacional da propriedade industrial issued ruling gradiente eletrônica apple owned iphone mark brazil iphone term registered gradiente 2000 7 years apple release first iphone decision came three months gradiente eletrônica launched lower-cost smartphone using iphone brand june 2014 apple second time right use brandname brazil court ruling determined gradiente registration exclusive rights brand although gradiente intended appeal decision apple use freely brand without paying royalties brazilian company philippines solid group launched myphone brand 2007 stylized my|phone solid broadband filed trademark application brand apple later filed trademark case intellectual property office philippines ipophl solid broadband myphone confusingly similar iphone may likely deceive cause confusion among consumers apple lost trademark battle solid group 2015 decision made ipo director nathaniel arevalo also reportedly said unlikely consumers would confused iphone myphone case giant trying claim territory entitled great prejudice local 'pinoy phone merchant managed obtain significant foothold mobile phone market marketing sale innovative products distinctive trademark arevalo later added
|
Operating systems
|
env env shell command unix unix-like operating systems used either print list environment variables run another utility altered environment without modify currently existing environment using env variables may added removed existing variables may changed assigning new values practice env another common use often used shell scripts launch correct interpreter usage environment typically changed version codice_1 bundled gnu coreutils written richard mlynarik david mackenzie print list environment variables simply run env without arguments clear environment creating new environment without existing environment variables new shell launch x application xcalc appear different display note use env often unnecessary since shells support setting environment variables front command env may also used hashbang line script allow interpreter looked via path example code simple python script example /usr/bin/env full path env command environment altered note possible specify interpreter without using env giving full path python interpreter problem approach different computer systems exact path may different instead using env example interpreter searched located time script run makes script portable also increases risk wrong interpreter selected searches match every directory executable search path also suffers problem path env binary may also different per-machine basis
|
Operating systems
|
service discovery service discovery automatic detection devices services offered devices computer network service discovery protocol sdp network protocol helps accomplish service discovery service discovery aims reduce configuration efforts users service discovery requires common language allow software agents make use one another services without need continuous user intervention many service discovery protocols including
|
Internet protocols
|
sed sed stream editor unix utility parses transforms text using simple compact programming language sed developed 1973 1974 lee e. mcmahon bell labs available today operating systems sed based scripting features interactive editor ed editor 1971 earlier qed quick editor 1965–66 sed one earliest tools support regular expressions remains use text processing notably substitution command popular alternative tools plaintext string manipulation stream editing include awk perl first appearing version 7 unix sed one early unix commands built command line processing data files evolved natural successor popular grep command original motivation analogue grep g/re/p substitution hence g/re/s foreseeing special-purpose programs command would also arise g/re/d mcmahon wrote general-purpose line-oriented stream editor became sed syntax sed notably use codice_1 pattern matching codice_2 substitution originated ed precursor sed common use time regular expression syntax influenced languages notably ecmascript perl later powerful language awk developed functioned cousins allowing powerful text processing done shell scripts sed awk often cited progenitors inspiration perl influenced perl syntax semantics notably matching substitution operators gnu sed added several new features including in-place editing files super-sed extended version sed includes regular expressions compatible perl another variant sed minised originally reverse-engineered 4.1bsd sed eric s. raymond currently maintained rené rebe minised used gnu project gnu project wrote new version sed based new gnu regular expression library current minised contains extensions bsd sed feature-rich gnu sed advantage fast uses little memory used embedded systems version sed provided minix sed line-oriented text processing utility reads text line line input stream file internal buffer called pattern space line read starts cycle pattern space sed applies one operations specified via sed script sed implements programming language 25 commands specify operations text input line running script sed ordinarily outputs pattern space line modified script begins cycle next line end-of-script behaviors available sed options script commands e.g codice_3 delete pattern space codice_4 quit codice_5 add next line pattern space immediately thus sed script corresponds body loop iterates lines stream loop loop variable current line number implicit maintained sed sed script either specified command line codice_6 option read separate file codice_7 option commands sed script may take optional address terms line numbers regular expressions address determines command run example codice_8 would run codice_3 delete command second input line printing lines second codice_10 would delete lines beginning space separate special buffer hold space may used sed commands hold accumulate text cycles sed command language two variables hold space pattern space goto-like branching functionality nevertheless language turing-complete esoteric sed scripts exist games sokoban arkanoid chess tetris main loop executes line input stream evaluating sed script line input lines sed script pattern-action pair indicating pattern match action perform recast conditional statement main loop working variables pattern space hold space input output streams default actions copy line pattern space print pattern space implicit possible write terse one-liner programs example sed program given print first 10 lines input stop following example shows typical common use sed substitution usage indeed original motivation sed versions sed expression must preceded codice_6 indicate expression follows codice_12 stands substitute codice_13 stands global means matching occurrences line would replaced regular expression i.e pattern searched placed first delimiting symbol slash replacement follows second symbol slash codice_1 conventional symbol originating character search ed could used make syntax readable occur pattern replacement useful avoid leaning toothpick syndrome substitution command originates search-and-replace ed implements simple parsing templating codice_15 provides pattern matching saving text via sub-expressions codice_16 either literal text format string containing characters codice_17 entire match special escape sequences codice_18 codice_19 n th saved sub-expression example codice_20 replaces occurrences cat dog cats dogs without duplicating existing codice_21 1st saved sub-expression regexp codice_18 format string substitutes output besides substitution forms simple processing possible using 25 sed commands example following uses command delete lines either blank contain spaces example uses following regular expression metacharacters sed supports full range regular expressions complex sed constructs possible allowing serve simple highly specialised programming language flow control example managed use label colon followed string branch instruction codice_29 instruction codice_29 followed valid label name move processing block following label unix sed often used filter pipeline program generatedata generates data sed makes small change replacing x example often useful put several sed commands one command per line script file codice_31 use codice_7 option run commands codice_33 file number commands may placed script file using script file also avoids problems shell escaping substitutions script file may made directly executable command line prepending shebang line containing sed command assigning executable permission file example file codice_31 created contents file may made executable current user codice_35 command chmod u+x subst.sed file may executed directly command line codice_36 option introduced gnu sed allows in-place editing files actually temporary output file created background original file replaced temporary file example hello world script file e.g. script.txt invoked codice_37 inputfilename input text file script changes inputfilename line 1 hello world quits printing result sed exits input lines past line 1 read printed sole output hello world example emphasizes many key characteristics sed follow various sed scripts executed passing argument sed put separate file executed via codice_7 making script executable replace instance certain word file redacted irc password save result delete line containing word yourword address '/yourword/ delete instances word yourword delete two words file simultaneously express previous example one line entering command line one may join two commands via semicolon next example sed usually works one line removes newlines sentences second line starts one space consider following text sed script turn text following text note script affects input lines start space script explained expressed single line via semicolons simple limited sed sufficiently powerful large number purposes sophisticated processing powerful languages awk perl used instead particularly used transforming line way complicated regex extracting template replacement though arbitrarily complicated transforms principle possible using hold buffer conversely simpler operations specialized unix utilities grep print lines matching pattern head print first part file tail print last part file tr translate delete characters often preferable specific tasks designed carry specialized utilities usually simpler clearer faster general solution sed ed/sed commands syntax continue used descendent programs text editors vi vim analog ed/sed sam/ssam sam plan 9 editor ssam stream interface yielding functionality similar sed
|
Programming language topics
|
firefox 4 mozilla firefox 4 version firefox web browser released march 22 2011 first beta made available july 6 2010 release candidate 2 base final version released march 18 2011 codenamed tumucumaque firefox last large release cycle mozilla team planned smaller quicker releases following browser vendors primary goals version included improvements performance standards support user interface one security update april 2011 4.0.1 version 4 browser made obsolete release firefox 5 june 2011 marked transition giving much less weight major version numbers 5 major version numbers used december year 5 6 7 8 9 compared 4 nearly decade firefox development 1 2 3 4 october 13 2006 brendan eich mozilla chief technology officer wrote plans mozilla 2 referring comprehensive iteration since creation overall platform firefox mozilla products run objectives incorporated versions 3.0 3.5 3.6 largest changes however deferred firefox 4.0 early may 2010 mozilla plans firefox 4.0 officially detailed blog post mike beltzner firefox director may 25 2011 firefox release manager wrote email firefox 5 security update firefox 4 confirming firefox 4 entered end life phase mozilla longer issue updates mozilla continued issue updates firefox 3.6 4 eol declaration one update 4.0.1 issued firefox 4 lifetime many looking copy version 4 directed version 6 run powerpc macintoshes mozilla firefox 4 includes many new features since version 3.6 firefox 4 brings new user interface new look designed make faster early mockups new interface windows mac os x linux first made available july 2009 new features include improved doorhanger notifications firefox panorama feature lets user visually group tabs application tabs redesigned extension manager jetpack extensions support integration firefox sync support multitouch displays many changes made user interface default tabs top window location bar area formerly occupied window title bar stop reload go buttons combined single button placed right side address bar button changes dynamically based upon current state page windows vista windows 7 menu bar hidden default common actions moved new firefox menu upper left hand corner browser users create persistent app tabs customize tab bar well bookmark navigation bars many features similar ones introduced google chrome firefox 4 based gecko 2.0 engine adds improves support html5 css3 webm webgl also includes new javascript engine jägermonkey better xpcom apis jägermonkey new javascript engine designed work alongside tracemonkey engine introduced firefox 3.5 improves performance compiling non-traceable javascript machine language faster execution firefox 4 first version firefox drop native support gopher protocol however continued support available add-on firefox 4 introduces audio api provides way programmatically access create audio data associated html5 audio element allows example visualize raw sound data use filters show audio spectrum firefox 4 longer relies underlying os text layout/shaping instead uses harfbuzz allows smart opentype layout/shaping consistent across different operating systems firefox 4 marked major change performance comparison former versions 3.6 3.5 browser made significant progress sunspider javascript tests well improvements supporting html5 since firefox 4.0 beta 5 hardware acceleration content enabled default windows vista windows 7 machines using direct2d os x using quartz basically cpu-only linux using xrender hardware acceleration compositing enabled default windows xp windows vista windows 7 machines using direct3d os x linux using opengl using hardware acceleration allows browser tap computer graphics processing unit lifting burden cpu speeding display web pages acceleration enabled certain graphics hardware drivers one performance optimizations moving application data single file omni.jar using new file format based java archive format previous versions used multiple files java archive format later versions file renamed omni.ja firefox 4 contains support track header emerging standard web privacy header signals user request web service web visitor tracking service disabled future privacy request may become legal requirement also introduced ability delete flash cookies subjecting deletion rules ordinary http cookies nightly builds marked 4.0a1pre february june 2008 renamed 3.1a1pre afterwards 22 march 2011 24-hour launch period firefox 4 received 7.1 million downloads counted verified mozilla foundation date 3 million people downloaded second release candidate browser later became final version result new version browser received 10 million downloads first day notwithstanding fell behind previous record established launch firefox 3 2008 8 million second-day downloads browser reported 8.75 million lack official representative guinness monitor numbers made record attained firefox 3 unofficially broken official launch date usage share firefox 4 1.95 0.34 higher previous day according analytics website statcounter comparison usage share internet explorer 9 march 22 0.87 released prior week march 14 potential factor firefox 4 ’ higher usage share latter supports windows 2000 xp two operating systems internet explorer 9 support also launch mozilla prompted existing customers upgrade browsers newer version something microsoft ’ applied users older versions internet explorer instead microsoft prompted users upgrade via windows update several weeks launch march 26 2011 firefox 4 ’ usage share exceeded 10-year-old discontinued internet explorer 6 first time also date browser ’ usage share higher versions safari opera older versions firefox exception firefox 3.6 reference internet explorer 9 ’ usage share first exceeded internet explorer 6 may 1 2011 48 days release internet explorer 9 became second used version internet explorer first time may 22 2011 69 days release according statcounter firefox 4 reached usage share peak 16.7 june 19 2011 date started decline due weekly trends release firefox 5 firefox 4 represents departure user interface layout behaviour previous versions users face issues negotiating changes documented release notes firefox button groups menus firefox 4 displayed default windows 7 windows vista operating systems displayed operating systems selecting toolbars view menu unchecking menu bar menu bar restored selecting options firefox button menu checking menu bar certain menu items page info import importing bookmarks browser data available firefox button menu remain available menu bar menu bar displayed temporarily pressing releasing alt key selecting menu bar command pressing alt key dismisses menu bar prompt save session tabs windows presented default firefox 3 session restored next start user selected save quit option firefox 4 sessions saved next start session available history menu new feature called on-demand session restore overwrites previous session exit without prompting user check whether saved session time viewing history menu item restore previous session available greyed restorable session available
|
Internet protocols
|
vanity domain domain name system dns vanity domain domain name whose purpose express individuality person whose behalf registered contrasts domain names resolve organisation e.g company service organisation offers vanity domains may compared vanity car registration plates similarly identify owner individual someone relying another organisation services subdomain isp domain aliased individual user account vanity domain definitions include uses apply primarily regular domain names registered highest allowed level rather subdomains although technically speaking second-level domain actually subdomain top-level domain vanity domains operated behalf individuals typically offer full complement services organisational domain name rather host points would expected honour example dns record may contain mx record identifying mail server accepting e-mail domain may e-mail forwarding server record identifying shared web hosting service offering http may url redirection service well easily remembered vanity domains especially registered highest level allowed registrar offer advantage personal mobility continue associated person even person switches service providers top-level domain become part vanity url taking advantage countries ask proof residence register country-specific tlds top level domains allow user incorporate two three letters following dot using help spell desired name word phrase
|
Web technology
|
twig template engine twig template engine php programming language syntax originates jinja django templates open source product licensed bsd license maintained fabien potencier initial version created armin ronacher symfony php framework comes bundled support twig default template engine since version 2 twig supported following integrated development environments text editors twig defines three kinds delimiters apostrophe escape character create iterative array associative array operators precedence less priority filters provide treatments expression place separated pipes example example demonstrates basic features twig
|
Web technology
|
program counter program counter pc commonly called instruction pointer ip intel x86 itanium microprocessors sometimes called instruction address register iar instruction counter part instruction sequencer processor register indicates computer program sequence processors pc incremented fetching instruction holds memory address points next instruction would executed processor incrementation precedes fetch pc points current instruction executed processors usually fetch instructions sequentially memory control transfer instructions change sequence placing new value pc include branches sometimes called jumps subroutine calls returns transfer conditional truth assertion lets computer follow different sequence different conditions branch provides next instruction fetched elsewhere memory subroutine call branches saves preceding contents pc somewhere return retrieves saved contents pc places back pc resuming sequential execution instruction following subroutine call typical central processing unit cpu pc digital counter origin term program counter may one many registers cpu hardware instruction cycle begins fetch cpu places value pc address bus send memory memory responds sending contents memory location data bus stored-program computer model executable instructions stored alongside ordinary data memory handled identically following fetch cpu proceeds execution taking action based memory contents obtained point cycle pc modified next instruction executed different one typically incremented next instruction one starting memory address immediately following last memory location current instruction like processor registers pc may bank binary latches one representing one bit value pc number bits width pc relates processor architecture instance “ 32-bit ” cpu may use 32 bits able address 2 units memory pc binary counter may increment pulse applied count input cpu may compute value load pc pulse load input identify current instruction pc may combined registers identify segment page approach permits pc fewer bits assuming memory units interest within current vicinity use pc normally increments assumes computer execute usually linear sequence instructions pc central von neumann architecture thus programmers write sequential control flow even algorithms sequential resulting “ von neumann bottleneck ” led research parallel computing including non-von neumann dataflow models use pc example rather specifying sequential steps high-level programmer might specify desired function low-level programmer might specify using combinatory logic research also led ways making conventional pc-based cpus run faster including modern high-level programming languages still follow sequential-execution model indeed common way identifying programming errors “ procedure execution ” programmer finger identifies point execution pc would high-level language essentially machine language virtual machine complex built hardware instead emulated interpreted software however new programming models transcend sequential-execution programming
|
Computer architecture
|
bring operating system bring operating system byoos relates practice providing pc computers usually without internally installed disks users bring operating system commonly usb pen drives use supplied hardware operating system choice byoos made possible thanks ability create usb pen drives external storage devices 'live operating system images containing necessary drivers allow boot operation compatible computer bootable versions linux available 1993 2012 microsoft windows 8 enterprise edition followed introduced 'windows go functionality allow operating system boot run mass storage devices usb flash drives thus enabling byoos windows family operating system similar linux live cd/dvd allowing users bring operating system significant cost savings made organisations commonly many on-site users obliged provide computer hardware allow perform specific tasks longer need install hard drive computer upgrading maintaining many pc computers also become easier companies need supply users new pen drives containing operating system boot images rather re-image every pc latest build operating system thus eliminating upgrade costs users take usb devices containing version operating system around employees boot home computer usb stick exactly software environment use place work thus enabling employees work home exactly would office introduction cloud based storage means portable operating systems free need store data locally unbundling office application data user data drives containing operating systems key factor making byoos possible
|
Operating systems
|
intel graphics technology intel graphics technology gt collective name series integrated graphics processors igps produced intel manufactured package die central processing unit cpu first introduced 2010 intel hd graphics intel iris graphics intel iris pro graphics igp series introduced 2013 models haswell processors high-performance versions hd graphics iris pro graphics first series incorporate embedded dram fourth quarter 2013 intel integrated graphics represented units 65 pc graphics processor shipments however percentage represent actual adoption number shipped units end systems outfitted discrete graphics cards introduction intel hd graphics intel integrated graphics built motherboard northbridge part intel hub architecture known intel extreme graphics intel gma part platform controller hub pch design northbridge eliminated graphics processing moved die central processing unit cpu previous intel integrated graphics solution intel gma reputation lacking performance features therefore considered good choice demanding graphics applications 3d gaming performance increases brought intel hd graphics made products competitive integrated graphics adapters made rivals nvidia ati/amd intel hd graphics featuring minimal power consumption important laptops capable enough pc manufacturers often stopped offering discrete graphics options low-end high-end laptop lines reduced dimensions low power consumption important intel hd iris graphics divided generations within generation divided 'tiers increasing performance denominated 'gtx label january 2010 clarkdale arrandale processors ironlake graphics released branded celeron pentium core hd graphics one specification 12 execution units 43.2 gflops 900 mhz decode h264 1080p video 40 fps direct predecessor gma_x4500 featured 10 eus 800 mhz lacked capabilities january 2011 sandy bridge processors released introducing second generation hd graphics sandy bridge celeron pentium intel hd core i3 either hd 2000 hd 3000 hd graphics 2000 3000 include hardware video encoding hd postprocessing effects 24 april 2012 ivy bridge released introducing third generation intel hd graphics ivy bridge celeron pentium intel hd core i3 either hd 2500 hd 4000 hd graphics 2500 4000 include hardware video encoding hd postprocessing effects low-power mobile cpus limited video decoding support none desktop cpus limitation 12 september 2012 haswell cpus announced four models integrated gpus 128 mb edram iris pro gt3e package cpu separate die manufactured different process intel refers level 4 cache available cpu gpu naming crystalwell linux support edram expected kernel version 3.12 making codice_1 driver aware capable using integrated iris pro graphics adopted apple late-2013 15-inch macbook pro laptops retina display first time history series discrete graphics cards although low-end model also included late-2013 21.5-inch imac november 2013 announced broadwell-k desktop processors aimed enthusiasts also carry iris pro graphics following models integrated gpu announced broadwell processors skylake line processors launched august 2015 retires vga support supporting multi-monitor setups three monitors connected via hdmi 1.4 displayport 1.2 embedded displayport edp 1.3 interfaces following models integrated gpu available announced skylake processors new features speed increases support 4k uhd premium drm encoded streaming services media engine full hardware acceleration 8- 10-bit hevc vp9 decode new features hdcp 2.2 support new features hdmi 2.0 support vp9 10-bit profile2 hardware decoder new features 10 nm gen 11 gpu microarchitecture two hevc 10-bit encode pipelines three 4k display pipelines 2x 5k60 1x 4k120 variable rate shading vrs beginning sandy bridge graphics processors include form digital copy protection digital rights management drm called intel insider allows decryption protected media within processor previously similar technology called protected audio video path pavp intel quick sync video intel hardware video encoding decoding technology integrated intel cpus name quick sync refers use case quickly transcoding syncing video example dvd blu-ray disc format appropriate example smartphone quick sync introduced gen 6 sandy bridge microprocessors 9 january 2011 graphics virtualization technology announced supported iris pro gpus hd 2500 hd 4000 gpus ivy bridge cpus advertised supporting three active monitors many users found work due chipsets supporting two active monitors many common configurations reason chipsets include two phase-locked loops plls pll generates pixel clock certain frequency used sync timings data transferred gpu displays therefore three simultaneously active monitors achieved hardware configuration requires two unique pixel clocks asrock z87- h87-based motherboards support three displays simultaneously asus h87-based motherboards also advertised support three independent monitors opencl 2.1 2.2 possible software update opencl 2.0 hardware broadwell+ future software updates mesa support direct3d 9.3 implemented gallium3d-style drivers mesa intel driver intel developed dedicated sip core implements multiple video decompression compression algorithms branded intel quick sync video implemented completely partially intel releases programming manuals intel hd graphics devices via open source technology center allows various open source enthusiasts hackers contribute driver development port drivers various operating systems without need reverse engineering
|
Computer architecture
|
alphaserver alphaserver name given series server computers produced 1994 onwards digital equipment corporation later compaq hp name suggests alphaservers based dec alpha 64-bit microprocessor supported operating systems alphaservers tru64 unix formerly digital unix openvms meditech magic windows nt earlier systems alphabios arc firmware enthusiasts provided alternative operating systems linux netbsd openbsd freebsd alphaserver models rebadged white enclosures digital servers windows nt server market so-called white box models comprised following part roadmap phase alpha- mips- pa-risc-based systems favor itanium-based systems hp recent alphaserver systems reached end general availability 27 april 2007 availability upgrades options discontinued 25 april 2008 approximately one year systems discontinued support recent alphaserver systems ds15a ds25 es45 es47 es80 gs1280 provided hp services 2008 systems scheduled reach end support sometime 2012 although hp stated event may delayed approximate chronological order following alphaserver models produced alphaserver 2100 briefly sold digital 2100 alphaserver brand introduced alphaserver sc supercomputer constructed set individual ds20l es40 es45 servers called nodes mounted racks every node connected every node using quadrics elan3 interconnect systems designed used primarily high-performance technical computing alphaserver sc45 supercomputer still ranked 6 world late november 2004 alphaserver gs1280 originally supported maximum 16 microprocessors october 2003 number microprocessors supported increased 64 supported memory capacity doubled 8 gb per microprocessor
|
Computer architecture
|
walnut creek cdrom walnut creek cdrom walnut creek california early provider freeware shareware free software cd-roms company founded august 1991 bob bruce one first commercial distributors free software cd-roms company produced hundreds titles cd-roms ran busiest ftp site internet ftp.cdrom.com many years early years popular products simtel shareware ms-dos cica shareware microsoft windows sunny archives aminet archives amiga january 1994 published collection 350 texts project gutenberg one first published ebook collections walnut creek developed close relationship freebsd unix-like open source operating system project inception 1993 company published freebsd cd-rom distributed ftp employed freebsd project founders jordan hubbard david greenman ran freebsd servers sponsored freebsd conferences published freebsd books including complete freebsd 1997 freebsd walnut creek successful product according bruce 1995 onwards walnut creek also official publisher slackware linux walnut creek also gained fame codice_1 subdirectory de facto distribution center doom -engine modification community time users gained access high-speed internet connections demand software physical media decreased dramatically company merged berkeley software design inc. bsdi 2000 focus engineering effort similar freebsd bsd/os operating systems soon bsdi acquired telenet system solutions inc. internet infrastructure server supplier software assets bsdi freebsd slackware bsd/os acquired wind river systems 2001 remainder company renamed ixsystems wind river dropped sponsorship slackware soon afterwards freebsd unit divested separate entity 2002 freebsd mall inc. ixsystems server business acquired 2002 offmyserver reverted ixsystems name 2005 february 2007 ixsystems acquired freebsd mall walnut creek cdrom url time redirected simtel.net page found simtel shut march 15 2013
|
Operating systems
|
public key certificate cryptography public key certificate also known digital certificate identity certificate electronic document used prove ownership public key certificate includes information key information identity owner called subject digital signature entity verified certificate contents called issuer signature valid software examining certificate trusts issuer use key communicate securely certificate subject email encryption code signing e-signature systems certificate subject typically person organization however transport layer security tls certificate subject typically computer device though tls certificates may identify organizations individuals addition core role identifying devices tls sometimes called older name secure sockets layer ssl notable part https protocol securely browsing web typical public-key infrastructure pki scheme certificate issuer certificate authority ca usually company charges customers issue certificates contrast web trust scheme individuals sign keys directly format performs similar function public key certificate common format public key certificates defined x.509 x.509 general format constrained profiles defined certain use cases public key infrastructure x.509 defined nowiki rfc 5280 /nowiki tls updated replacement ssl server required present certificate part initial connection setup client connecting server perform certification path validation algorithm primary hostname domain name website listed common name subject field certificate certificate may valid multiple hostnames multiple websites certificates commonly called subject alternative name san certificates unified communications certificates ucc certificates contain field subject alternative name though many cas also put subject common name field backward compatibility hostnames contain asterisk certificate may also called wildcard certificate tls server may configured self-signed certificate case clients generally unable verify certificate terminate connection unless certificate checking disabled per applications ssl certificates classified three types- client certificates less common server certificates used authenticate client connecting tls service instance provide access control services provide access individuals rather devices client certificates contain email address personal name rather hostname also authentication usually managed service provider client certificates usually issued public ca provides server certificates instead operator service requires client certificates usually operate internal ca issue client certificates supported many web browsers services use passwords cookies authenticate users instead client certificates client certificates common rpc systems used authenticate devices ensure authorized devices make certain rpc calls s/mime protocol secure email senders need discover public key use given recipient get information email certificate publicly trusted certificate authorities provide email certificates commonly s/mime used communicating within given organization organization runs ca trusted participants email system certificates also used validate signatures programs ensure tampered delivery certificate identifying individual typically electronic signature purposes commonly used europe eidas regulation standardizes requires recognition self-signed certificate used sign certificates also sometimes called trust anchor certificate used sign certificates intermediate certificate must signed another intermediate certificate root certificate certificate used sign certificates instance tls/ssl server client certificates email certificates code signing certificates qualified certificates end-entity certificates certificate subject matches issuer signature verified public key types certificate self-signed self-signed certificates also often called snake oil certificates emphasize untrustworthiness common fields certificates certificates contain number fields listed note terms certificate x.509 representation certificate flat contains fields nested various structures within certificate european union electronic signatures legal documents commonly performed using digital signatures accompanying identity certificates largely signatures granted enforceability handwritten signatures eidas eu regulation x.509 trust model certificate authority ca responsible signing certificates certificates act introduction two parties means ca acts trusted third party ca processes requests people organizations requesting certificates called subscribers verifies information potentially signs end-entity certificate based information perform role effectively ca needs one broadly trusted root certificates intermediate certificates corresponding private keys cas may achieve broad trust root certificates included popular software obtaining cross-signature another ca delegating trust cas trusted within relatively small community like business distributed mechanisms like windows group policy certificate authorities also responsible maintaining up-to-date revocation information certificates issued indicating whether certificates still valid provide information online certificate status protocol ocsp and/or certificate revocation lists crls major software contains list certificate authorities trusted default makes easier end-users validate certificates easier people organizations request certificates know certificate authorities issue certificate broadly trusted particularly important https web site operator generally wants get certificate trusted nearly potential visitors web site policies processes provider uses decide certificate authorities software trust called root programs influential root programs browsers firefox generally use operating system facilities decide certificate authorities trusted instance chrome windows trusts certificate authorities included microsoft root program macos ios chrome trusts certificate authorities apple root program edge safari use respective operating system trust stores well available single os firefox uses mozilla root program trust store platforms mozilla root program operated publicly certificate list part open source firefox web browser broadly used outside firefox instance common linux root program many linux distributions like debian include package periodically copies contents firefox trust list used applications root programs generally provide set valid purposes certificates include instance cas may considered trusted issuing tls server certificates code signing certificates indicated set trust bits root certificate storage system common use certificates https-based web sites web browser validates https web server authentic user feel secure his/her interaction web site eavesdroppers web site claims security important electronic commerce practice web site operator obtains certificate applying certificate authority certificate signing request certificate request electronic document contains web site name company information public key certificate provider signs request thus producing public certificate web browsing public certificate served web browser connects web site proves web browser provider believes issued certificate owner web site example user connects codice_1 browser browser give certificate warning message user theoretically sure interacting codice_1 equivalent interacting entity contact email address listed public registrar example.com even though email address may displayed anywhere web site surety kind implied relationship purchaser certificate operator web site generator web site content may tenuous guaranteed best certificate guarantees uniqueness web site provided web site compromised hacked certificate issuing process subverted certificate provider opt issue three types certificates requiring degree vetting rigor order increasing rigor naturally cost domain validation organization validation extended validation rigors loosely agreed upon voluntary participants ca/browser forum certificate provider issue domain validation dv class certificate purchaser purchaser demonstrate one vetting criterion right administratively manage domain name certificate provider issue organization validation ov class certificate purchaser purchaser meet two criteria right administratively manage domain name question perhaps organization actual existence legal entity certificate provider publishes ov vetting criteria certificate policy acquire extended validation ev certificate purchaser must persuade certificate provider legal identity including manual verification checks human ov certificates certificate provider publishes ev vetting criteria certificate policy browsers generally offer users visual indication legal identity site presents ev certificate browsers show legal name domain use bright green color highlight change way user see legal identity owner verified web browser give warning user web site suddenly presents different certificate even certificate lower number key bits even different provider even previous certificate expiry date far future however change ev certificate non-ev certificate apparent green bar longer displayed certificate providers jurisdiction governments governments may freedom order provider generate certificate purposes law enforcement subsidiary wholesale certificate providers also freedom generate certificate web browsers come extensive built-in list trusted root certificates many controlled organizations may unfamiliar user organizations free issue certificate web site guarantee web browsers include root certificates accept genuine instance end users must rely developer browser software manage built-in list certificates certificate providers behave correctly inform browser developer problematic certificates uncommon incidents fraudulent certificates issued cases browsers detected fraud others time passed browser developers removed certificates software list built-in certificates also limited provided browser developer users degree applications free extend list special purposes company intranets means someone gains access machine install new root certificate browser browser recognize websites use inserted certificate legitimate provable security reliance something external system consequence public key certification scheme rely special setup assumption existence certificate authority spite limitations described certificate-authenticated tls considered mandatory security guidelines whenever web site hosts confidential information performs material transactions practice spite weaknesses described web sites secured public key certificates still secure unsecured http // web sites national institute standards technology nist computer security division provides guidance documents public key certificates
|
Computer security
|
smart card smart card chip card integrated circuit card icc physical electronic authorization device used control access resource typically plastic credit card sized card embedded integrated circuit many smart cards include pattern metal contacts electrically connect internal chip others contactless smart cards provide personal identification authentication data storage application processing applications include identification financial mobile phones sim public transit computer security schools healthcare smart cards may provide strong security authentication single sign-on sso within organizations several nations deployed smart cards throughout populations 1968 1969 helmut gröttrup jürgen dethloff filled several patents around identification card 1974 roland moreno patented secured memory card later dubbed smart card 1976 jürgen dethloff introduced known element called secret identify gate user usp 4105156 1977 michel ugon honeywell bull invented first microprocessor smart card two chips one microprocessor one memory 1978 patented self-programmable one-chip microcomputer spom defines necessary architecture program chip three years later motorola used patent cp8 time bull 1,200 patents related smart cards 2001 bull sold cp8 division together patents schlumberger subsequently combined internal smart card department cp8 create axalto 2006 axalto gemplus time world top two smart-card manufacturers merged became gemalto 2008 dexa systems spun schlumberger acquired enterprise security services business included smart-card solutions division responsible deploying first large-scale smart-card management systems based public key infrastructure pki first mass use cards telephone card payment french payphones starting 1983 télécarte microchips integrated french carte bleue debit cards 1992 customers inserted card merchant point-of-sale pos terminal typed personal identification number pin transaction accepted limited transactions paying small highway tolls processed without pin smart-card-based electronic purse systems store funds card readers need network connectivity entered european service mid-1990s common germany geldkarte austria quick wertkarte belgium proton france moneo netherlands chipknip chipper decommissioned 2001 switzerland cash norway mondex spain monedero 4b sweden cash decommissioned 2004 finland avant uk mondex denmark danmønt portugal porta-moedas multibanco private electronic purse systems also deployed marines corps usmc parris island allowing small amount payments cafeteria since 1990s smart cards subscriber identity modules sims used gsm mobile-phone equipment mobile phones widely used across world smart cards become common europay mastercard visa emv -compliant cards equipment widespread deployment led european countries united states started later deploying emv technology 2014 deployment still progress 2018 typically country national payment association coordination mastercard international visa international american express japan credit bureau jcb jointly plan implement emv systems historically 1993 several international payment companies agreed develop smart-card specifications debit credit cards original brands mastercard visa europay first version emv system released 1994 1998 specifications became stable emvco maintains specifications emvco purpose assure various financial institutions retailers specifications retain backward compatibility 1998 version emvco upgraded specifications 2000 2004 emv compliant cards first accepted malaysia 2005 later united states 2014 mastercard first company allowed use technology united states united states felt pushed use technology increase identity theft credit card information stolen target late 2013 one largest indicators american credit card information safe target made decision april 30 2014 would try implement smart chip technology order protect future credit card identity theft 2014 consensus america enough security measures avoid credit card theft smart chip necessary cost smart chip technology significant corporations want pay united states debate came online credit theft insecure enough united states invest technology adaptation emv increased significantly 2015 liability shifts occurred october credit card companies contactless smart cards require physical contact card reader becoming popular payment ticketing typical uses include mass transit motorway tolls visa mastercard implemented version deployed 2004–2006 u.s. visa current offering called visa contactless contactless fare collection systems incompatible though mifare standard card nxp semiconductors considerable market share us europe use contactless smart cards transport also grown use low cost chips nxp mifare ultralight paper/card/pet rather pvc reduced media cost used low cost tickets short term transport passes 1 year typically cost typically 10 pvc smart card larger memory distributed vending machines ticket offices agents use paper/pet less harmful environment traditional pvc cards greenpeace confidex see also transport/transit/id applications smart cards also introduced identification entitlement regional national international organizations uses include citizen cards drivers ’ licenses patient cards malaysia compulsory national id mykad enables eight applications 18 million users contactless smart cards part icao biometric passports enhance security international travel smart card may following generic characteristics since april 2009 japanese company manufactured reusable financial smart cards made paper contact smart cards contact area approximately comprising several gold-plated contact pads pads provide electrical connectivity inserted reader used communications medium smart card host e.g. computer point sale terminal mobile telephone cards contain batteries power supplied card reader iso/iec 7810 iso/iec 7816 series standards define chips financial cards used subscriber identity modules sims mobile phones programmed differently embedded different piece pvc chip manufacturers building demanding gsm/3g standards example although emv standard allows chip card draw 50 terminal cards normally well telephone industry 6 limit allows smaller cheaper financial card terminals communication protocols contact smart cards include t=0 character-level transmission protocol defined iso/iec 7816-3 t=1 block-level transmission protocol defined iso/iec 7816-3 contactless smart cards communicate powered reader rf induction technology data rates 106–848 kbit/s cards require proximity antenna communicate like smart cards contacts contactless cards internal power source instead use inductor capture incident radio-frequency interrogation signal rectify use power card electronics contactless smart media made pvc paper/card pet finish meet different performance cost durability requirements apdu transmission contactless interface defined iso/iec 14443-4 hybrid cards implement contactless contact interfaces single card dedicated modules/storage processing dual-interface cards implement contactless contact interfaces single card shared storage processing example porto multi-application transport card called andante uses chip contact contactless iso/iec 14443 type b interfaces ccid chip card interface device usb protocol allows smart card connected computer using standard usb interface allows smart card used security token authentication data encryption bitlocker typical ccid usb dongle may contain sim smart cards serve credit atm cards fuel cards mobile phone sims authorization cards pay television household utility pre-payment cards high-security identification access badges public transport public phone payment cards smart cards may also used electronic wallets smart card chip loaded funds pay parking meters vending machines merchants cryptographic protocols protect exchange money smart card machine connection bank needed holder card may use even owner examples proton geldkarte chipknip moneo german geldkarte also used validate customer age vending machines cigarettes best known payment cards classic plastic card roll-outs started 2005 u.s. asia europe followed 2006 contactless non-pin transactions cover payment range 5–50 iso/iec 14443 paypass implementation paypass implementations conform emv non-emv cards work like magnetic stripe cards common u.s. paypass magstripe visa msd cards hold maintain account balance payment passes without pin usually off-line mode security transaction greater magnetic stripe card transaction emv cards either contact contactless interfaces work normal emv card contact interface via contactless interface work somewhat differently card commands enabled improved features lower power shorter transaction times subscriber identity modules used mobile-phone systems reduced-size smart cards using otherwise identical technologies smart-cards authenticate identity sometimes employ public key infrastructure pki card stores encrypted digital certificate issued pki provider along relevant information examples include u.s. department defense dod common access card cac cards used governments citizens include biometric identification data cards provide superior two- three-factor authentication smart cards always privacy-enhancing subject may carry incriminating information card contactless smart cards read within wallet even garment simplify authentication however criminals may access data cards cryptographic smart cards often used single sign-on advanced smart cards include specialized cryptographic hardware uses algorithms rsa digital signature algorithm dsa today cryptographic smart cards generate key pairs board avoid risk one copy key since design usually n't way extract private keys smart card smart cards mainly used digital signatures secure identification common way access cryptographic smart card functions computer use vendor-provided pkcs 11 library microsoft windows cryptographic service provider csp api also supported widely used cryptographic algorithms smart cards excluding gsm so-called crypto algorithm triple des rsa key set usually loaded des generated rsa card personalization stage smart cards also made support national institute standards technology nist standard personal identity verification fips 201 turkey implemented first smart card driver license system 1987 turkey high level road accidents decided develop use digital tachograph devices heavy vehicles instead existing mechanical ones reduce speed violations since 1987 professional driver licenses turkey issued smart cards professional driver required insert driver license digital tachograph starting drive tachograph unit records speed violations driver gives printed report driving hours driver also monitored reported 1990 european union conducted feasibility study bevac consulting engineers titled feasibility study respect european electronic drivers license based smart-card behalf directorate general vii study chapter seven describes turkey experience argentina mendoza province began using smart card driver licenses 1995 mendoza also high level road accidents driving offenses poor record recovering fines smart licenses hold up-to-date records driving offenses unpaid fines also store personal information license type number photograph emergency medical information blood type allergies biometrics fingerprints stored chip card holder wishes argentina government anticipates system help collect 10 million per year fines 1999 gujarat first indian state introduce smart card license system 2005 issued 5 million smart card driving licenses people 2002 estonian government started issue smart cards named id kaart primary identification citizens replace usual passport domestic eu use 2010 1 million smart cards issued total population 1.3 million widely used internet banking buying public transport tickets authorization various websites etc start 2009 entire population belgium issued eid cards used identification cards contain two certificates one authentication one signature signature legally enforceable services belgium use eid authorization spain started issuing national id cards dni form smart cards 2006 gradually replaced older ones smart cards idea many bureaucratic acts could done online failure administration adapt still mostly requires paper documents personal presence august 14 2012 id cards pakistan replaced smart card third generation chip-based identity document produced according international standards requirements card 36 physical security features latest encryption codes smart card replaced nicop id card overseas pakistani smart cards may identify emergency responders skills cards like allow first responders bypass organizational paperwork focus time emergency resolution 2004 smart card alliance expressed needs enhance security increase government efficiency reduce identity fraud protect personal privacy establishing mandatory government-wide standard secure reliable forms identification emergency response personnel carry cards positively identified emergency situations widepoint corporation smart card provider fema produces cards contain additional personal information medical records skill sets 2007 open mobile alliance oma proposed new standard defining v1.0 smart card web server scws http server embedded sim card intended smartphone user non-profit trade association simalliance promoting development adoption scws simalliance states scws offers end-users familiar os-independent browser-based interface secure personal sim data mid-2010 simalliance reported widespread industry acceptance scws. ref name= http //www.simalliance.org/en t=/documentmanager/sfdoc.file.supply fileid=1279268442341 /ref oma maintaining standard approving v1.1 standard may 2009 v1.2 expected approved october 2012 smart cards also used identify user accounts arcade machines smart cards used transit passes integrated ticketing used many public transit operators card users may also make small purchases using cards operators offer points usage exchanged retailers benefits examples include singapore cepas ontario presto card hong kong octopus card london oyster card ireland leap card brussels mobib québec opus card san francisco clipper card auckland hop brisbane go card perth smartrider sydney opal card victoria myki however present privacy risk allow mass transit operator government track individual movement finland example data protection ombudsman prohibited transport operator helsinki metropolitan area council ytv collecting information despite ytv argument card owner right list trips paid card earlier information used investigation myyrmanni bombing uk department transport mandated smart cards administer travel entitlements elderly disabled residents schemes let residents use cards bus passes also used taxi concessionary transport one example smartcare go scheme provided ecebs uk systems use itso ltd specification schemes uk include period travel passes carnets tickets day passes stored value used pay journeys concessions school pupils students job seekers also supported mostly based itso ltd specification many smart transport schemes include use low cost smart tickets simple journeys day passes visitor passes examples include glasgow spt subway smart tickets made paper pet thinner pvc smart card e.g confidex smart media smart tickets supplied pre-printed over-printed printed demand smart cards used security token mozilla firefox web browser use smart cards store certificates use secure web browsing disk encryption systems veracrypt microsoft bitlocker use smart cards securely hold encryption keys also add another layer encryption critical parts secured disk gnupg well known encryption suite also supports storing keys smart card smart cards also used single sign-on log computers smart cards provided students schools colleges uses include smart health cards improve security privacy patient information provide secure carrier portable medical records reduce health care fraud support new processes portable medical records provide secure access emergency medical information enable compliance government initiatives e.g. organ donation mandates provide platform implement applications needed health care organization smart cards widely used encrypt digital television streams videoguard specific example smart card security worked malaysian government promotes mykad single system smart-card applications mykad started identity cards carried citizens resident non-citizens available applications include identity travel documents drivers license health information electronic wallet atm bank-card public toll-road transit payments public key encryption infrastructure personal information inside mykad card read using special apdu commands smart cards advertised suitable personal identification tasks engineered tamper resistant chip usually implements cryptographic algorithm however several methods recovering algorithm internal state differential power analysis involves measuring precise time electric current required certain encryption decryption operations deduce on-chip private key used public key algorithms rsa implementations symmetric ciphers vulnerable timing power attacks well smart cards physically disassembled using acid abrasives solvents technique obtain unrestricted access on-board microprocessor although techniques may involve risk permanent damage chip permit much detailed information e.g. photomicrographs encryption hardware extracted benefits smart cards directly related volume information applications programmed use card single contact/contactless smart card programmed multiple banking credentials medical entitlement driver license/public transport entitlement loyalty programs club memberships name multi-factor proximity authentication embedded smart cards increase security services card example smart card programmed allow contactless transaction also within range another device like uniquely paired mobile phone significantly increase security smart card governments regional authorities save money improved security better data reduced processing costs savings help reduce public budgets enhance public services many examples uk many using common open lasseo specification individuals better security convenience using smart cards perform multiple services example need replace one card wallet lost stolen data storage card reduce duplication even provide emergency medical information first main advantage smart cards flexibility smart cards multiple functions simultaneously id credit card stored-value cash card repository personal information telephone numbers medical history card easily replaced lost requirement pin form security provides additional security unauthorised access information others first attempt use illegally card would deactivated card reader second main advantage security smart cards electronic key rings giving bearer ability access information physical places without need online connections encryption devices user encrypt decrypt information without relying unknown therefore potentially untrustworthy appliances atms smart cards flexible providing authentication different level bearer counterpart finally information user smart cards provide parties useful devices customizing products services general benefits smart cards smart cards used electronic commerce internet though business model used current electronic commerce applications still use full potential electronic medium advantage smart cards electronic commerce use customize services example order service supplier deliver customized service user may need provide supplier profile boring time-consuming activity smart card contain non-encrypted profile bearer user get customized services even without previous contacts supplier plastic paper card chip embedded fairly flexible larger chip higher probability normal use could damage cards often carried wallets pockets harsh environment chip antenna contactless cards pvc cards crack break bent/flexed excessively however large banking systems failure-management costs offset fraud reduction production use disposal pvc plastic known harmful environment plastics alternative materials including chlorine free plastics paper available smart applications account holder computer hosts malware smart card security model may broken malware override communication input via keyboard output via application screen user application man-in-the-browser malware e.g. trojan silentbanker could modify transaction unnoticed user banks like fortis belfius belgium rabobank netherlands combine smart card unconnected card reader avoid problem customer enters challenge received bank website pin transaction amount reader reader returns 8-digit signature signature manually entered personal computer verified bank preventing point-of-sale-malware changing transaction amount smart cards also targets security attacks attacks range physical invasion card electronics non-invasive attacks exploit weaknesses card software hardware usual goal expose private encryption keys read manipulate secure data funds attacker develops non-invasive attack particular smart card model typically able perform attack cards model seconds often using equipment disguised normal smart card reader manufacturers may develop new card models additional information security may costly inconvenient users upgrade vulnerable systems tamper-evident audit features smart card system help manage risks compromised cards another problem lack standards functionality security address problem berlin group launched eridane project propose new functional security framework smart-card based point interaction poi equipment
|
Computer security
|
spybot – search amp destroy spybot – search destroy spyware adware removal computer program compatible microsoft windows free paid versions dating back first adwares 2000 spybot scans computer hard disk and/or ram malicious software spybot-s written german software engineer patrick michael kolla distributed kolla irish company safer-networking limited development began 2000 kolla still student wrote small program deal aureate/radiate conducent timesink programs two earliest examples adware spybot – search destroy released freeware personal users featureful versions available purchase corporate technician users buy commercial version paid versions contain anti-virus component uses bitdefender engine addition spyware adware detection disinfection spybot-s repair registry winsock lsps activex objects browser hijackers bhos pups http cookies trackerware heavy duty homepage hijackers keyloggers lsp tracks trojans spybots revision kinds malware also delete tracking cookies spybot-s immunize function block installation spyware occurs e.g modifying hosts file secure file deleter included spybot-s originally intended replace compliment anti-virus programs prior v. 2.1 spybot +av detect common trojans rootkits free-standing rootkit finder rootalyzer available programs supplied attached spyware adware refuse run present newer versions spybot replace spyware binaries inert dummies designed fool programs simply check presence spyware file order detect recently created programs efficiently detection updates released weekly improvements added languages better heuristic algorithms updates downloaded installed within software variety mirrors spybot-s available versions windows starting windows 95 supplied translated many languages several skins instructions available website enable users design skins technical support currently supplied means internet forums support e-mails usual response time 24 hours versions spybot-s awards including world class 2003 awards pc magazine editor choice pc user top buy 1 recommended zdnet wall street journal guardian msnbc cnn reviewers although pc magazine initially rated highly 2003 rating declined poor 2008 dismal 2012 improving fair 2014 newer versions program ver 2.2.25 ver 2.4 issued 2014 received 5/5 rating techradar 2018 techradar considered spybot among 4 best anti-malware software available version 1.5 better compatibility previous versions wine software allows running windows programs linux restores compatibility windows 95 faulty 1.4 version 1.6 said safer networking scan several times faster version 1.5 version 2.4 released july 2014 reported 2009 several commercial security products required users uninstall freely available spybot installed run due stated incompatibility memory-resident immunizer teatimer spybot real-time protection application makers spybot-s came conflict norton internet security compatibility issues 2006 symantec recommended uninstalling spybot-s installing norton internet security according safer networking satisfactory explanation provided decision antivirus professional mary landesman suggests possible explanation may stem graphical glitch teatimer module confirmation dialog official explanation safer networking stated error caused bug program used build code result bug users difficulty enabling norton internet security make necessary changes critical registry areas allowing launch computer startup aside mary landesman like safer networking concluded two programs issue one another bug fixed 1.5 release kaspersky anti-virus kaspersky internet security since version 2009 force users uninstall spybot installation process although serious incompatibility yet known discussion concluded kaspersky forum said install spybot kaspersky seems reluctant fix issue despite receiving several complaints incompatibility products might occur spybot tries modify hosts-file selected user immunization kaspersky interpret attempt harmfully manipulate file circumvented immunizing hosts-file spybot trend micro officescan followed norton kaspersky mcafee simply removing spybot without warning notification afterwards immunisation feature spybot – search destroy caused internet explorer 8 start slower expected fix kb969897 resolved problem addressing certain security vulnerabilities issued microsoft 2009 several malicious programs designed look like anti-malware software similar user interfaces program file names actually install spyware programs known rogue antispyware one program spywarebot program known rogue antispyware program fraudulently impersonates various anti-malware software including spybot search destroy however lookalike unlike spybot requires payment
|
Computer security
|
mh message handling system mh message handling system free open source e-mail client different almost mail reading systems instead single program made several different programs designed work command line provided shell unix-like operating systems another difference rather storing multiple messages single file messages separate file special directory taken together design choices mean easy natural script actions mail messages using normal shell scripting tools descendant mh continues developed name nmh designed unix philosophy mind mh composed separate programs codice_1 view message codice_2 see message titles codice_3 remove messages using codice_4 program possible select messages based sender example programs act different programs run separately different times communication arranged specially information mail currently selected stored files case codice_5 file user mh directory tree mh proposed r. stockton gaines norman shapiro developed bruce s. borden others rand corporation initial version mh created 1979 subsequently development taken marshall t. rose john l. romine working university california irvine last release mh 6.8.4 maintenance patch 6.8.3 release mh public domain nmh new mh current active version mh forked version mh 6.8.3 richard coleman working georgia institute technology incorporates lbl changes made mh late 80s van jacobson mike karels craig leres recent release nmh 1.7.1 march 7th 2018. nmh released bsd license performance mh much dependent file system features operating system runs every read message require starting separate program directory scan large directory file open data even accessed hand mailbox formats mbox use single file often require insertion removal data middle file messages read altered slow procedure cases mh much faster maildir storage format made popular qmail courier mail server improves upon several features first shown mh separate file per message separate directory per mail folder exploitation hardlinks advanced filesystem features improved performance space time mh inherently command line based system graphical interface original program xmh x window system application development xmh ceased similar tool called exmh developed tcl/tk last updated january 7 2004 exmh considered feature-complete little development beyond bug fixes emacs interface mh also provided mh-e project addition dedicated mh clients support mh mailboxes included several clients claws mail novell evolution mutt sylpheed
|
Internet protocols
|
next byte codes next byte codes nbc simple language assembly language syntax used program lego mindstorms nxt programmable bricks command line compiler outputs nxt compatible machine code supported windows mac os linux maintained john hansen mindstorms developer program member nbc compiler released mozilla public license integrated development environment ide bricx command center nbc debugger developed sorosydotcom downloaded freeware
|
Programming language topics
|
r. kent dybvig r. kent dybvig professor computer science indiana university bloomington bloomington indiana research focuses programming languages principal developer optimizing chez scheme compiler runtime system initially released 1985 together daniel p. friedman long advocated use scheme language teaching computer science professor emeritus retired indiana university iu join cisco 2011 contributions practical theoretical aspects computing information technology particular design development chez scheme association computing machinery acm named dybvig distinguished member 2006 first year association awarded distinguished ranks
|
Programming language topics
|
harold t. martin iii harold thomas martin iii born november 1964 former contractor booz allen hamilton accused stealing approximately 50 terabytes data national security agency nsa investigators reportedly difficulty determining martin engaged conventional espionage digital hoarding public reporting indicated united states government agencies apparently failed note effectively respond number issues martin security practices behaviors period 10 20 years martin earned bachelor degree economics math university wisconsin-madison 1989 master degree information systems george mason university 2004 time arrest martin pursuing phd computing university maryland baltimore county research area virtual interfaces exploration heterogeneous cloud computing architectures martin previously worked computer sciences corp tenacity solutions martin worked national security agency 2012 2015 including spending time elite tailored access operations unit albeit support capacity martin previously served surface warfare officer united states navy serving 1987 2000 including aboard uss seattle awarded kuwait liberation medal moved united states navy reserve first received access classified data 2015 still booz allen hamilton contractor transferred department defense office acquisition technology logistics l attempting trace source shadow brokers leak summer 2016 federal bureau investigation fbi alerted nsa internet post made martin allegedly communicated via twitter account hal_999999999 martin used twitter contact russian-based kaspersky lab cyber-security firm turn alerted national security agency federal bureau investigations used information provided kaspersky researchers obtain search warrant martin residence subsequently according united states department justice fbi discovered thousands pages terabytes data classified information martin residence personal vehicle including classified computer code martin reported stolen classified information simply walking secure workplaces possession prosecutors stated stolen classified information includes names covert intelligence officers according indictment martin stole materials central intelligence agency national security agency united states cyber command united states department defense national reconnaissance office according prosecutors evidence martin actually accessed files stole martin charged united states department justice willful retention national defense information martin entered plea guilty october 2016 hearing united states district court district maryland magistrate judge a. david copperthite sided prosecution agreeing martin flight risk would released pending trial fbi failure provide martin miranda warning led u.s. district court judge richard bennett rendering many martin statements inadmissible martin defense attorneys argued suffered mental health issues hoarding symptom martin agreed plead guilty december 2017 scheduled occur january 22 2018 martin pled guilty according court memorandum opinion dated december 3 2018 martin trial date scheduled june 17 2019 march 17 2019 martin agreed plead guilty willful retention national defense information deal called nine years prison three years supervised release fine 250,000 july 19 2019 martin sentenced nine years prison
|
Computer security
|
pl/p pl/p programming language acronym programming language prime computers mid-level programming language developed prime computer serve second primary system programming language fortran iv pl/p subset pl/i additions primos operating system prime 50 series computers written mostly pl/p later years certain primos modules written fortran iv primos early years rewritten pl/p pl/p widespread compiled programming language used commercial primos applications outpacing use prime c compiler cpl primos scripting language fortran iv compiler commercial applications
|
Programming language topics
|
hios mobile operating system hios customized version android mobile operating system developed hong kong based mobile phone company tecno mobile allows wide range user customization without requiring rooting mobile device operating system also bundled utility applications allow users free memory freeze applications limit data accessibility applications among others devices itel also part hiosu
|
Operating systems
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.